-
Pytanie z
A business is integrating smart doorbells into its access control system to enhance building security. The IT administrator needs to ensure that the smart doorbells can seamlessly communicate with the access control server. What technology is most suitable for enabling secure communication between the smart doorbells and the access control server in this scenario?
-
A. RFID (Radio-Frequency Identification)
-
B. Zigbee
-
C. Bluetooth Low Energy (BLE)
-
D. TLS (Transport Layer Security) encryption
Correct Wrong
The correct answer is D. In the context of integrating smart doorbells into an access control system, TLS (Transport Layer Security) encryption (D) is essential for ensuring secure communication between the smart doorbells and the access control server.
-
-
Pytanie z
A multinational corporation is dealing with a high volume of security events daily. Which aspect of SIEM is crucial in this scenario to ensure efficient incident detection and response?
-
A. Real-time monitoring of network traffic.
-
B. Encryption of sensitive data at rest.
-
C. Implementing biometric authentication for users.
-
D. Managing firewall rule sets.
Correct Wrong
In a scenario where a multinational corporation faces a high volume of security events, real-time monitoring of network traffic (option A) is crucial for efficient incident detection and response. SIEM allows organizations to analyze events as they occur, aiding in the identification of security incidents. Options B, C, and D are important security measures but are not the primary focus of SIEM in this context
-
-
Pytanie z
A company is hosting a large-scale event with a substantial number of temporary devices. The network administrator wants to efficiently manage IP address allocation during the event without causing disruptions. What DHCP lease time configuration would be most appropriate for this scenario?
-
A. Long lease time.
-
B. Short lease time.
-
C. Variable lease time.
-
D. Infinite lease time.
Correct Wrong
Hosting a large-scale event with temporary devices requires an efficient DHCP lease time configuration. A short lease time ensures that IP addresses are reclaimed quickly when devices leave the network, allowing for effective management and avoiding address shortages during the event.
-
-
Pytanie z
A software development team is building a real-time messaging application that requires low latency and reliable data delivery. Users have reported occasional delays in receiving messages, especially during peak usage. The network team suspects an issue with the Transmission Control Protocol (TCP) header. What TCP header feature is most likely causing these delays?
-
A. Window size
-
B. Checksum
-
C. Sequence number
-
D. Urgent pointer
Correct Wrong
The window size in the TCP header influences the flow control mechanism, determining how much data can be sent before an acknowledgment is received. If the window size is not optimized, it can lead to delays in real-time applications. Checksum, sequence number, and urgent pointer are important but less likely to directly impact delays in this context.
-
-
Pytanie z
A network administrator is tasked with verifying the configuration of a switch port before connecting a new device to the network. The administrator needs to check the VLAN membership, duplex settings, and port speed of a specific switch port. Which basic network platform command is MOST suitable for retrieving this information?
-
A. show vlan brief
-
B. show running-config
-
C. show interfaces status
-
D. show cdp neighbors
Correct Wrong
The correct command for retrieving information about a specific switch port, including VLAN membership, duplex settings, and port speed, is 'show interfaces status.' This command provides a concise overview of the operational status and configuration details of all switch ports.------------show vlan brief displays a summary of VLANs on the switch, including their names, IDs, and status, but it doesn't provide details about individual port configurations.-------------show running-config displays the entire running configuration of the switch, including interface configurations, but it can be overwhelming to find specific information about a single port within the extensive output.-----------show cdp neighbors shows information about Cisco Discovery Protocol (CDP) neighbors, which are devices directly connected to the switch, but it doesn't provide details about port configurations.
-
-
Pytanie z
In a corporate office, an employee holds the door open for an individual who claims to have forgotten their access card. The unauthorized person quickly enters the office space and attempts to gain access to sensitive information. What type of physical security attack is likely occurring in this situation?
-
A. Impersonation Attack
-
B. Piggybacking Attack
-
C. Vishing Attack
-
D. Dumpster Diving Attack
Correct Wrong
This scenario represents a Piggybacking Attack, where an unauthorized individual gains access to a secured area by exploiting the courtesy of an authorized person. The attacker takes advantage of the legitimate employee holding the door open, bypassing physical security measures.
-
-
Pytanie z
An organization is experiencing network connectivity issues, and users are unable to obtain IP addresses automatically. The network administrator suspects a problem with the DHCP service. Which ports should the administrator investigate to determine if DHCP communication between clients and servers is functioning properly?
-
A. 67/68
-
B. 53
-
C. 80
-
D. 161/162
Correct Wrong
In this scenario, the correct choice is ports 67/68. DHCP (Dynamic Host Configuration Protocol) uses these ports for communication between DHCP clients and servers. Investigating these ports allows the administrator to assess the status of DHCP requests and responses, helping identify and address any issues impacting IP address assignment.
-
-
Pytanie z
In a corporate network, users report connectivity issues and the inability to obtain valid IP addresses. After investigation, the network administrator discovers a device on the network distributing unauthorized IP addresses, causing conflicts. What type of attack is affecting the network in this scenario?
-
A. DNS Poisoning Attack
-
B. Smurf Attack
-
C. Rogue DHCP Attack
-
D. VLAN Hopping Attack
Correct Wrong
The described situation aligns with a Rogue DHCP attack, where an unauthorized device on the network is distributing DHCP leases, leading to IP address conflicts and connectivity issues for legitimate users.
-
-
Pytanie z
A company is implementing a new application that requires specific Quality of Service (QoS) settings to prioritize data traffic. What crucial element in the logical network diagram is the IT team likely examining to ensure proper configuration for QoS?
-
A. Port Configurations
-
B. Routing Tables
-
C. Firewall Rules
-
D. Bandwidth Utilization
Correct Wrong
The IT team is likely examining Port Configurations in the logical network diagram to ensure proper configuration for Quality of Service (QoS). Port configurations play a key role in specifying how network devices handle data traffic, allowing the team to prioritize traffic for the new application.
-
-
Pytanie z
In a large enterprise network with multiple tenants sharing the same physical infrastructure, the IT administrator needs to isolate the broadcast domains of each tenant. Which feature of Private VLANs would be most suitable for achieving this level of network segmentation?
-
A. Promiscuous Ports
-
B. Community VLANs
-
C. Isolated VLANs
-
D. Trunk Ports
Correct Wrong
Isolated VLANs within Private VLANs are specifically designed for segregating broadcast domains. Each tenant can be assigned to its own isolated VLAN, ensuring that the broadcast traffic from one tenant does not reach others. This level of network segmentation enhances security and privacy for each tenant in a shared physical environment.
-
-
Pytanie z
In a complex network topology, the network administrator is concerned about the possibility of network loops that could lead to broadcast storms. To prevent such issues and ensure a loop-free topology, which Ethernet switching feature should be implemented?
-
A. Quality of Service (QoS)
-
B. Port Mirroring
-
C. Power over Ethernet (PoE)
-
D. Spanning Tree Protocol (STP)
Correct Wrong
To prevent network loops and potential broadcast storms in a complex network topology, the network administrator should implement the Spanning Tree Protocol (STP). STP identifies and blocks redundant paths, creating a loop-free topology and ensuring network stability. QoS prioritizes traffic, Port Mirroring is for traffic analysis, and PoE delivers power to devices over Ethernet but does not address network loops.
-
-
Pytanie z
A multinational company has multiple email servers distributed across its regional offices. The network administrator needs to configure DNS records to specify the mail servers responsible for receiving emails on behalf of the company. What DNS record type should the administrator use to designate the mail servers for the domain?
-
A. A record.
-
B. PTR record.
-
C. MX record.
-
D. CNAME record.
Correct Wrong
To designate mail servers responsible for receiving emails, the network administrator should use MX (Mail Exchange) records. These records specify the mail servers' priorities and hostnames, directing incoming emails to the appropriate servers based on their priority level.
-
-
Pytanie z
A small office is redesigning its network infrastructure to accommodate an increasing number of workstations and ensure optimal connectivity for video conferencing applications. Considering the office’s requirements, which cable type and connector combination is the most appropriate for this scenario?
-
A. Cat 5e with RJ45 connectors
-
B. Cat 6 with BNC connectors
-
C. Cat 5e with SC connectors
-
D. Cat 6a with RJ11 connectors
Correct Wrong
-
-
Pytanie z
A network technician needs to remotely access and configure a router located in a different geographic location. The technician wants a tool that provides a text-based interface for interacting with the router’s command-line interface. Which network software tool is MOST suitable for this task?
-
A. Telnet
-
B. SSH
-
C. FTP
-
D. Terminal emulator
Correct Wrong
SSH offers a secure, encrypted channel for remote access, protecting the communication from eavesdropping and manipulation. It's the standard and secure choice for remote command-line access. Therefore, for secure and reliable remote access and configuration of the router, SSH is the most appropriate choice. It provides the necessary text-based interface, encryption for secure communication, and is widely supported by routers and network management tools.
-
-
Pytanie z
A company is planning to deploy a new wireless network in a crowded urban area with multiple neighboring WiFi networks. The network architect needs to ensure optimal performance and minimal interference. What functionality of a WiFi analyzer would be MOST beneficial in this situation?
-
A. Detecting MAC addresses
-
B. Spectrum analysis
-
C. Packet sniffing
-
D. Signal propagation analysis
Correct Wrong
In a crowded urban area with multiple WiFi networks, spectrum analysis is crucial for identifying the frequency bands with the least interference. This functionality enables the network architect to select the optimal channels for the new wireless network, ensuring minimal interference from neighboring networks and optimal performance.
-
-
Pytanie z
In a large enterprise network, the IT team is implementing multicast communication to efficiently deliver video updates to all employees simultaneously. The network administrator wants to ensure that IPv4 multicast addresses are used for this purpose. What range of IPv4 addresses should the administrator consider to be reserved for multicast communication in this scenario?
-
A. 224.0.0.0 to 224.0.0.255
-
B. 224.0.1.0 to 224.0.1.255
-
C. 239.0.0.0 to 239.255.255.255
-
D. 240.0.0.0 to 240.0.0.255
Correct Wrong
The range 239.0.0.0 to 239.255.255.255 is reserved for IPv4 multicast addresses. Using addresses within this range ensures efficient and purposeful multicast communication within the enterprise network.
-
-
Pytanie z
A small business is setting up a wireless network for its employees, and the network administrator wants to ensure a balance between security and user convenience. The employees frequently move between different departments and need a Wi-Fi connection that seamlessly transitions between access points. In this scenario, which encryption standard within WiFi Protected Access (WPA)/ WPA2 Personal should the administrator choose for the network?
-
A. WPA-PSK (TKIP)
-
B. WPA2-PSK (AES)
-
C. WPA-PSK (AES)
-
D. WPA2-PSK (TKIP)
Correct Wrong
-
-
Pytanie z
A network engineer is troubleshooting DNS performance issues in a distributed environment. The engineer observes that iterative lookups are taking longer than expected. What aspect of iterative lookups should the engineer investigate to identify and address the problem?
-
A. Time to Live (TTL) settings
-
B. Forward lookup zones
-
C. Root DNS server responsiveness
-
D. Caching mechanisms on the local DNS server
Correct Wrong
To identify and address the problem of iterative lookups taking longer than expected, the engineer should focus on investigating and optimizing the caching mechanisms on the local DNS server (Option D). Caching mechanisms are crucial for DNS performance, as they allow DNS servers to store previously queried records for a specified TTL. Efficient caching can significantly reduce the need for repetitive iterative lookups by serving cached responses to frequently requested domain names. If the caching mechanism is inefficient or if the cache is frequently cleared or too small, it can lead to increased DNS query times because the resolver may need to perform full iterative lookups more often than necessary. Investigating and optimizing caching mechanisms, including cache size, cache replacement policies, and ensuring that the cache is used effectively, can help address performance issues related to iterative lookups. --------------- A. Time to Live (TTL) settings determine how long a DNS record should be cached by a DNS server or a client before it is automatically refreshed. While TTL values can influence how frequently a DNS record is queried from the authoritative source, they are not directly related to the performance of iterative lookups themselves. TTL settings impact the duration a record is stored in cache, but not the iterative lookup process's efficiency. ------------ B. Forward lookup zones are used in DNS to resolve domain names to IP addresses. While they are essential for the DNS resolution process, the structure or configuration of forward lookup zones is not typically the direct cause of performance issues in iterative lookups. Iterative lookups involve querying multiple DNS servers until the final answer is found, rather than issues within a specific zone's configuration. ------------- C. Root DNS server responsiveness can affect the initial stages of an iterative lookup, especially if a DNS resolver needs to start the resolution process from the top of the DNS hierarchy. However, root DNS servers are highly reliable and optimized for performance, making them an unlikely primary source of iterative lookup delays, especially since most resolvers cache the addresses of the root servers and top-level domain (TLD) servers.
-
-
Pytanie z
A large enterprise is implementing a wireless network with enhanced security measures. To provide guest users with limited access, the network administrator decides to deploy a captive portal. What role does the captive portal play in this scenario?
-
A. Granting unlimited access to guest users.
-
B. Authenticating users based on MAC addresses.
-
C. Redirecting guest users to a login page before granting access.
-
D. Utilizing an open authentication method for user convenience.
Correct Wrong
-
-
Pytanie z
A financial institution has multiple branches in a city and needs a network setup that allows for secure and real-time communication between the central headquarters and branch offices. The institution values data security and requires a solution that supports the transmission of financial data over the network. Considering the security and real-time communication needs, which network type aligns with the financial institution’s requirements?
-
A. Local Area Network (LAN)
-
B. Wide Area Network (WAN)
-
C. Metropolitan Area Network (MAN)
-
D. Mesh Network
Correct Wrong
A Wide Area Network (WAN) is suitable for securely connecting geographically dispersed locations, making it the ideal choice for a financial institution with multiple branches in a city. WANs provide the necessary infrastructure for real-time communication and the secure transmission of financial data between the central headquarters and branch offices. This network type ensures that the financial institution can meet its data security and communication requirements effectively.
-
-
Pytanie z
In a corporate office with confidential documents and networking equipment, the IT security team has implemented locking cabinets as a preventive measure. How do locking cabinets contribute to the physical security of the office in this scenario?
-
A. Locking cabinets prevent network congestion.
-
B. Locking cabinets monitor environmental temperature.
-
C. Locking cabinets secure and restrict physical access to sensitive documents and equipment.
-
D. Locking cabinets optimize server performance.
Correct Wrong
Locking cabinets play a critical role in securing and restricting physical access to sensitive documents and networking equipment in a corporate office. By providing a physical barrier, they prevent unauthorized individuals from tampering with or accessing confidential materials. Options A, B, and D are not directly related to the primary purpose of locking cabinets in this context.
-
-
Pytanie z
A medium-sized organization is upgrading its network infrastructure and is considering implementing a Punchdown block Bix for cable management in the server room. What type of cable is most suitable for connecting the organization’s IP cameras to the Punchdown block Bix, ensuring efficient cable organization and reliable surveillance data transmission?
-
A. Coaxial cable
-
B. Twisted pair cable
-
C. Fiber optic cable
-
D. USB cable
Correct Wrong
Twisted pair cable is the industry standard for Ethernet networks used by most IP cameras. It's readily available, cost-effective, and well-suited for connecting cameras to the Punchdown block Bix for efficient organization and reliable data transmission. Coaxial cable, while commonly used for analog video signals, it's not the standard choice for modern IP cameras that transmit data over Ethernet networks. Fiber optic cable, while offering high bandwidth and immunity to interference, it's generally more expensive and might require specialized equipment for connection, making it less practical for cost-effective deployments in typical surveillance setups. Although some IP cameras have USB ports for configuration or local storage, connecting them to a Punchdown block Bix for general network connectivity wouldn't be the standard approach.
-
-
Pytanie z
A large multinational corporation is implementing a Voice over IP (VoIP) system to enhance communication among its globally dispersed offices. What networking device is essential for connecting the traditional Public Switched Telephone Network (PSTN) to the VoIP network, ensuring seamless communication between VoIP users and external telephone lines?
-
A. Router
-
B. Switch
-
C. Firewall
-
D. Voice gateway
Correct Wrong
The correct answer is D. In the scenario of integrating a Voice over IP (VoIP) system with the traditional Public Switched Telephone Network (PSTN) for global communication, a voice gateway is essential. The voice gateway acts as a bridge, converting analog voice signals from the PSTN into digital data for transmission over the VoIP network and vice versa, facilitating seamless communication between VoIP users and external telephone lines.
-
-
Pytanie z
. A network administrator is tasked with troubleshooting network performance issues in a corporate environment. Users have reported slow response times when accessing critical applications. After analyzing historical data, the administrator identifies a deviation from the established network performance baseline during peak usage hours. What is the most likely cause of the performance degradation?
-
A. DNS server misconfigurations
-
B. Inadequate network bandwidth
-
C. Firewall rule changes
-
D. Rogue DHCP server on the network
Correct Wrong
-
-
Pytanie z
In a scenario where a company’s server experiences frequent connection drops, a network administrator discovers that the server has an incorrect IP address. What is the most effective step for the administrator to take in this situation?
-
A. Upgrade the server’s network interface card (NIC)
-
B. Implement port security on network switches
-
C. Configure a static IP address for the server
-
D. Increase the server’s bandwidth allocation
Correct Wrong
Configuring a static IP address for the server ensures a consistent and correctly assigned address, preventing frequent connection drops. Upgrading the server's NIC, implementing port security, or increasing bandwidth allocation are not directly related to resolving incorrect IP address issues.
-
-
Pytanie z
A network technician is working on installing new network cabling in an office building. The technician needs to connect the individual twisted pairs of the cables to the corresponding slots on a patch panel. What tool should the technician use to achieve this, ensuring secure connections and minimal signal interference?
-
A. Cable tester
-
B. TDR (Time-Domain Reflectometer)
-
C. Cable certifier
-
D. Punchdown tool
Correct Wrong
In this scenario, the appropriate tool for securely connecting individual twisted pairs to a patch panel is a punchdown tool. The punchdown tool allows the technician to terminate the cables neatly and effectively onto the patch panel, ensuring a reliable and interference-free connection.
-
-
Pytanie z
A multinational company with a diverse workforce is exploring options to provide a consistent desktop environment for employees working from various locations. The IT team is looking for a cloud service model that allows users to access a standardized desktop environment with applications and settings regardless of their physical location. Which service model is best suited for this scenario?
-
A. Software as a Service (SaaS)
-
B. Infrastructure as a Service (IaaS)
-
C. Platform as a Service (PaaS)
-
D. Desktop as a Service (DaaS)
Correct Wrong
For the multinational company seeking a consistent desktop environment for remote employees, the most appropriate service model is Desktop as a Service (DaaS). DaaS allows users to access a virtualized desktop with applications and settings hosted in the cloud, providing a standardized experience regardless of the user's physical location.
-
-
Pytanie z
A cloud service provider is managing a large pool of virtual machines (VMs) for multiple clients with varying demand for IP addresses. The administrator is implementing CIDR notation to streamline IP address allocation. What is a key advantage of using CIDR notation in this scenario?
-
A. Simplified address management
-
B. Efficient utilization of IP addresses
-
C. Automatic IP address assignment
-
D. Fixed allocation of subnets
Correct Wrong
CIDR notation enables efficient utilization of IP addresses by allowing the cloud service provider to allocate address space dynamically based on client demand. This flexibility ensures optimal use of the available address pool for the varying needs of virtual machines.
-
-
Pytanie z
A network administrator is troubleshooting issues on a router and reviews the device logs. The logs contain entries with different logging levels/severity levels, including „Emergency,” „Alert,” and „Critical.” What does the presence of entries with these severity levels indicate, and how should the administrator prioritize their response?
-
A. Routine system operations; no immediate action is required
-
B. Potential network vulnerabilities; investigate and address the issues
-
C. Normal log entries; continue monitoring without intervention
-
D. Severe issues requiring urgent attention; prioritize investigation and resolution
Correct Wrong
The presence of entries with severity levels such as "Emergency," "Alert," and "Critical" in device logs indicates severe issues that require urgent attention. The administrator should prioritize investigating and resolving these issues promptly to prevent potential network disruptions or vulnerabilities.
-
-
Pytanie z
A multinational corporation is reviewing its disaster recovery plan and aims to minimize the downtime of its critical systems in the event of a disruption. The organization wants to establish a metric that quantifies the acceptable duration for recovery without causing significant impact. Which concept is most relevant for assessing and defining the acceptable downtime in the disaster recovery plan?
-
A. Recovery Time Objective (RTO)
-
B. Recovery Point Objective (RPO)
-
C. Mean Time to Repair (MTTR)
-
D. Mean Time Between Failures (MTBF)
Correct Wrong
In the context of disaster recovery planning and minimizing downtime, the relevant concept for quantifying the acceptable duration for recovery is the Recovery Time Objective (RTO). RTO represents the maximum allowable downtime for critical systems, guiding organizations in setting realistic goals for recovery in the event of disruptions.
-
GIPHY App Key not set. Please check settings