1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which layer's diagram would show asset IDs, cable links, and wall/patch panel/switch port IDs?
Data Link (Layer 2)
Application
Logical (IP/Layer 3)
PHY (Physical layer)
PHY (Physical layer)
What is the standard method of sanitizing an HDD?
Overwriting
Degaussing
Shredding
Incineration
Overwriting
What historical method might IT departments have used for tracking IP usage?
Physical logbooks
Static files
Oral tradition
Cloud-based databases
Static files
Which of the following is the BEST approach when a configuration has drifted from its baseline?
Always revert to the golden configuration.
Update the baseline template without testing.
Perform testing to determine whether to revert.
Ignore the drift as it is usually insignificant.
Perform testing to determine whether to revert.
Why should configuration changes only be made with a service request ticket?
To ensure that the activity of network personnel is recorded
To increase the speed of changes
To bypass the approval process
To eliminate the need for documentation
To ensure that the activity of network personnel is recorded
What is the purpose of a rack diagram?
To record the position of each appliance in the rack
To map out the logical flow of data within the network
To track software versions installed on network devices
To document the physical location of employees within an office
To record the position of each appliance in the rack
Why is it important to stay up to date with system security advisories?
To stay informed about vulnerabilities
To monitor the stock market for technology companies
To ensure compliance with IT audit standards
To keep track of new IT products
To stay informed about vulnerabilities
Why is it important to track software license usage in an asset inventory?
To monitor employee internet usage
To track the company's profit margins
To ensure compliance with the vendor's licensing agreement
To evaluate the company's branding strategies
To ensure compliance with the vendor's licensing agreement
What is a configuration backup used for when applying an update?
To serve as a fallback
To reduce the time required for the update
To enhance the performance of the update
To comply with software licensing agreements
To serve as a fallback
What is referred to as configuration drift?
The act of backing up a CI's configuration
The process of updating a CI's baseline
The initial setup of a CI's configuration
The deviation of a CI from its baseline
The deviation of a CI from its baseline
What role does a Change Advisory Board (CAB) play in change management?
It documents the need for change.
It approves major or significant changes.
It implements the changes directly.
It creates the Request for Change (RFC) documents
It approves major or significant changes.
What does the Secure Erase (SE) command do on HDDs?
Encrypts all data on the drive
Marks all blocks as empty
Performs a single pass of zero-filling
Physically destroys the drive
Performs a single pass of zero-filling
Which backup mode creates a snapshot-type image of the whole system?
Configuration file
Incremental backup
Differential backup
State/bare metal
State/bare metal
What is the primary purpose of using physical network diagrams?
To capture the complex relationships between network elements
To document the physical location of employees
To track software installations on network devices
To monitor real-time network traffic
To capture the complex relationships between network elements
Which agreement is most likely to be used between two companies to protect shared sensitive information?
Employment Contract
Memorandum of Understanding (MOU)
Service Level Agreement (SLA)
Non-Disclosure Agreement (NDA)
Non-Disclosure Agreement (NDA)
What is the primary function of an availability monitor?
To increase the speed of a service
To manage network bandwidth
To trigger an alarm for service unscheduled downtime
To update digital certificates
To trigger an alarm for service unscheduled downtime
What does an IP scanner do?
Encrypts network traffic
Creates spreadsheets
Establishes the logical topology of the network
Edits images
Establishes the logical topology of the network
What metric measures the actual amount of data transferred over a network?
Memory usage
Throughput
Bandwidth
CPU utilization
Throughput
Which Nmap scan type is less stealthy due to its use of the operating system to attempt a full TCP connection?
Port range (-p)
UDP scans (-sU)
TCP SYN (-sS)
TCP connect (-sT)
TCP connect (-sT)
What is the purpose of using the -sV or -A switch with Nmap?
To limit the scan to the local network only
To increase the speed of the scan
To disable logging of the scan results
To probe for software versions on each port
To probe for software versions on each port
Which type of scanners use specially crafted probes to locate hosts that might be configured not to respond to pings?
Graphic design software
Security-oriented scanners
Email management systems
Spreadsheet analysis tools
Security-oriented scanners
What does an availability monitor check for in an HTTP service to confirm availability?
A 302 status code
A 404 status code
A 200 status code
A 500 status code
A 200 status code
What does Nmap use to determine whether a host is present when used without switches?
It sends an email to the network administrator.
It pings and sends a TCP ACK packet to ports 80 and 443.
It performs a full database scan.
It listens for any active Bluetooth devices.
It pings and sends a TCP ACK packet to ports 80 and 443.
Which of the following is NOT information that CDP can report?
MAC address table sizes
Power over Ethernet usage
Device ID/hostname
IOS version
MAC address table sizes
What is a basic type of IP scanning mentioned in the document?
Email filtering
Color correction
Spreadsheet analysis
Host discovery
Host discovery
Which feature allows Nmap to work out hop counts?
-sn switch
--script switch
--traceroute switch
-p switch
--traceroute switch
What should you consider doing if a server hosting a service is overloaded?
Throttle client connections.
Decrease the server's memory.
Increase network congestion.
Disable the Spanning Tree Protocol (STP).
Throttle client connections.
What does a configuration monitor do when there is a change to a device's production configuration?
It generates logs, alerts, or alarms.
It updates the baseline configuration.
It disconnects the device from the network.
It automatically reverts the change.
It generates logs, alerts, or alarms.
What is the primary function of Cisco Discovery Protocol (CDP)?
To provide a secure tunnel for data transmission
To assign IP addresses to devices on a network
To encrypt data traffic between Cisco devices
To discover information about directly connected Cisco devices
To discover information about directly connected Cisco devices
What can cause a broadcast storm in a network?
Low CPU utilization
Switching loops
Insufficient storage space on network devices
High bandwidth availability
Switching loops
What is the purpose of a community string in SNMP?
To identify the network topology
To increase network speed
To encrypt data packets
To serve as a type of password
To serve as a type of password
What is a major security weakness of SNMP v2c?
It supports too many users.
It uses strong encryption by default.
It sends community strings in plaintext.
It restricts management operations to known hosts.
It sends community strings in plaintext.
What mode in SNMPv3 does not encrypt packets but requires authentication?
authPriv
privAuth
noAuthNoPriv
authNoPriv
authNoPriv
An organization is using the Simple Network Management Protocol (SNMP) for remote management and monitoring of servers and network appliances and must deploy an agent to each device.
Where are the statistics relating to the activity of each device kept?
Get
OID
Trap
MIB
MIB
Which version of SNMP supports encryption and strong user-based authentication?
SNMP v2c
SNMP v4
SNMP v1
SNMP v3
SNMP v3