Q1. Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?
A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.
B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates.
C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies.
D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.
Answer: A
Q2. After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked?
A. Server host file
B. Subnet mask
C. Local hosts file
D. Duplex settings
Answer: C
Q3. Which of the following helps prevent routing loops?
A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon
Answer: D
Q4. A network technician has received comments from several users that cannot reach a particular website. Which of the following commands would provide the BEST information about the path taken across the network to this website?
A. ping
B. netstat
C. telnet
D. tracert
Answer: D
Q5. CORRECT TEXT
Alter recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.
Instructions: Verify the settings by using the command prompt, after making any system changes. Next, restore connectivity by making the appropriate changes to the infrastructure. When you have completed these steps, select the Done button to submit.
Answer:
On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128, then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.
Q6. Which of the following is the main difference between TCP and UDP?
A. TCP data flows in two directions, while UDP data flows from server to client.
B. The TCP header implements flags, while the UDP header does not.
C. The TCP header implements checksum, while the UDP header does not.
D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.
Answer: B
Q7. A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?
A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering
Answer: C
Q8. Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?
A. Compromised system
B. Smurf attack
C. SQL injection attack
D. Man-in-the-middle
Answer: A
Q9. A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody
Answer: D
Q10. A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted?
A. HCL
B. MSDS
C. SLA
D. HVAC
Answer: B
Q11. A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.
Answer: B
Q12. A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?
A. Public SaaS
B. Private SaaS
C. Hybrid IaaS
D. Community IaaS
Answer: B
Q13. Which of the following is an example of an IPv4 address?
A. 192:168:1:55
B. 192.168.1.254
C. 00:AB:FA:B1:07:34
D. ::1
Answer: B
Q14. An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?
A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups
Answer: A
Q15. A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?
A. Hardware firewall
B. Proxy server
C. Software firewall
D. GRE tunneling
Answer: C