Which OSI layer relies on burned-in hardware addresses?
1. Session
2. Data link
3. Network
4. Transport
A company wants to connect devices so that there are many redundant interconnections. Which topology should the company use?
1. Ad-hoc
2. Star
3. Bus
4. Mesh
Match network protocols and services to the OSI model layer in which they are implemented. To answer, drag the appropriate OSI layer to each protocol or service. An OSI layer may be used once, more than once, or not at all.
1. DHCP Application
2. SMTP Network
3. ICMP Transport
4. TCP Data link
5. DNS Physical
6. FTP Presentation
Session
A company has deployed a new Microsoft Windows server behind a firewall. A systems administrator has been experiencing problems querying and modifying items in Active Directory from a remote location using an LDAP-based application. Which protocol should be allowed through the firewall?
1. UDP port 53
2. TCP port 22
3. TCP port 636
4. TCP port 3389
5. UDP port 69
A network technician is concerned about the risk of tailgating in their environment. What should the technician do to mitigate the risk?
1. Implement an access control vestibule.
2. Implement a shredding policy.
3. Implement a data lifecycle policy.
4. Implement an MFA.
Which statement describes traffic shaping?
1. Excess traffic is immediately dropped.
2. Excess traffic is buffered until bandwidth is available.
3. Excess traffic is marked with a decreased priority.
4. Excess traffic is returned to the sending node.
A company contracts with a cloud provider. The cloud provider is responsible for virtualized hardware, storage, and network support. The company is responsible for installing, licensing, and maintaining the operating system and server applications.
Which type of service does this describe?
1. PaaS
2. SaaS
3. SECaaS
4. IaaS
A company routes Cat 5e UTP cabling through a part of its manufacturing floor that generates a great of EMI. The cables are routed loosely through the ceiling, about 3 meters above the equipment. Computers connected to the cabling experience communication errors any time the equipment is running. The company needs a reliable, cost-effective solution. Management will not authorize converting to fiber optic cabling. What should the company do?
1. Reroute the cable through the exisiting power conduit.
2. Reroute the cable along the floor.
3. Replace the Cat 5e UTP cable with Cat 5e STP cable.
4. Replace the Cat 5e UTP cable with Cat 6 UTP cable.
A company wants to implement an authentication and authorization solution for network devices that also directly supports device management. What should the company use?
1. Kerberos
2. RADIUS
3. TACACS+
4. SNMP
Which statement best describes a warm backup recovery site?
1. The site has computer equipment, network hardware, and data communication installed and configured with a current duplicate of critical data.
2. The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.
3. The site has the necessary facilities infrastructure to support business operations with computer and network hardware stored onsite, but this equipment is not setup nor configured for use.
4. The site has the necessary facilities infrastructure to support business operations but not computer or network hardware.
A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update? (Select two.)
1. Rack diagram
2. Physical network diagram
3. Standard operating procedure
4. Change management document
5. Logical network diagram
Where in a network architecture is STP most likely to be disabled?
1. Core layer
2. Access layer
3. Distribution layer
4. Top-of-rack switch
Match network types with their descriptions. To answer, drag the appropriate network type to each description. A network type may be used once, more than once, or not at all.
1. A collection of connected LANs over a large geographic area, enabling devices in different locations to communicate.
2. Interconnection of devices near each other, such as in an office, organized around an individual, and often using Bluetooth connections.
3. Connected LANs over a relatively small geographic area, such as connecting all of a company’s buildings in the same location.
4. High-speed data network giving several LAN servers access to consolidated block-level storage, using either FC or iSCSI-based networks.
A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:
Users authenticate with a user ID and password
All communication between the server and client is encrypted
Open ports on the perimeter firewall are kept to a minimum
No certificate is required at the server or client
What should the company select as a solution?
1. TFTP
2. FTP
3. FTPS
4. SFTP
Which two items would be specified as part of an SLA?
1. Minimum server software and configurations
2. Password change requirements
3. Availability and uptime
4. Help desk response time
5. Minimum server hardware configurations
A company’s network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do?
1.Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets.
2. Deploy a DHCP relay agent in the 192.168.2.0 subnet.
3. Open UDP port 53 on each of the routers.
4. Configure IP exclusions for the 192.168.4.0 and 192.168.4.128 subnets.
Which layer of the OSI model are web browsers and email clients implemented at?
1. Layer 7
2. Layer 5
3. Layer 4
4. Layer 6
Which primary benefit does VRRP provide?
1. Availability
2. Confidentiality
3. Authentication
4. Integrity
A NIDS reports several attempts to download files from an external IP address. The Technical Services department determines that the source is a website that is made to look like a site from which network users download reference materials and blank PDF forms. Users enter the correct URL for the website but are being sent to a different IP address. Which type of attack is this?
1. ARP poisoning
2. Evil twin
3. DNS poisoning
4. VLAN hopping
Which of the following best describes a primary use case for infrastructure as code (IaC)?
1. Data center interconnections
2. Policy-based authentication
3. Transport agnostic networking
4. Automated provisioning
Accompanied deploys a host as shown in the exhibit. The host needs to be configured with the static address. What values should be used to configure the host? To answer, drag the appropriate value to each configuration parameter. A value may be used once, more than once, or not at all.
The IP address should be 192168.4.57
The subnet mask should be 255.255.255.192
The default Gateway should be 192.168.4.1
The address 192.168.4.57 is a valid host address on the 192.168.4.0/26 subnet. Valid addresses range from 192.168.4.1 through 192.168.4.62. A subnet mask of 255.255.255.192 is equivalent to a class list inter domain routing value of/26. The default gateway is the router interface facing the subnet, which is 192.168.4.1 in the scenario. 
Which protocol provides time synchronization service over global Internet?
1. IPAM.
2. ICMP
3. NTP
4. SNMP
A recent network audit has highlighted the security issues on the access point shown in the exhibit. What should the company do?
1. Change the authentication method WPA–TKIP
What is the Primary use of an intermediate distribution frame (IDF) in a network infrastructure?
1. to perform Network Address Translation (NAT) for devices.
2. to route traffic between different VLAN segments.
3. to facilitate connectivity for end-users and devices.
4. to protect the network from external threats.