-
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail?()
A . Virus
B . Worm
C . Trojan
D . Executable
-
Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.
What should you do?()
https://assets.asklib.com/images/image2/2018073116270156354.jpg
A . A
B . B
C . C
D . D
-
You have just created a new VLAN on your network. What is one step that you should include in your VLAN-based implementation and verification plan? ()
A . Verify that trunked links are configured to allow the VLAN traffic.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
D . Verify that different native VLANs exist between two switches for security purposes.
-
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
A . Executable
B . Trojan
C . Virus
D . Worm
-
A switch that is to be added to the production network has been preconfigured (trunks, VLANs, VTP, and STP) and was tested in your lab. After installing the switch into the network, the entire network went down. What might explain what happened? ()
A . The new switch happened to be running Cisco Catalyst operating system, while the other network switches were running Cisco IOS Software.
B . The configuration revision of the new switch was higher than the configuration revision of the production VTP domain.
C . The link costs on the new switch are set to a high value, causing all ports on the new switch to go into a forwarding mode and none into blocking mode, thereby causing a spanning-tree loop.
D . The ports connecting to the two switches have been configured incorrectly. One side has the command switchport mode access and the other switchport mode trunk.
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
A . Wireless router
B . Hub
C . Repeater
D . Wireless network adapter
-
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
A . RFC 1149
B . RFC 3704
C . RFC 1918
D . RFC 2827
-
After making some network changes you power off and then power on your Cisco router. What sequence of events occurs when a router is powered up?()
A . Perform POST, locate configuration statements, apply configuration statements, locate Cisco IOS software, and load Cisco IOS software.
B . Locate Cisco IOS software, load Cisco IOS software, locate configuration statements, apply configuration statements, and perform POST.
C . Test software routines, POST, load configuration files, load Cisco IOS software, test Cisco IOS software.
D . POST, locate Cisco IOS software, load the Cisco IOS software, locate configuration statements, and apply configuration statements.
E . Load and test IOS, load configuration files, test software routines, POST.
-
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A . An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B . The counters were deleted.
C . The ARP cache was removed.
D . The IP EIGRP neighbor relationship was cleared manually.
-
You have just created a new VLAN on your network for inter-VLAN routing. What is one step that you should include in your VLAN-based implementation and verification plan?()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the proper IP address space assigned to it for the new VLAN.
D . Verify that the VLAN virtual interface has been correctly created and enabled.
-
You use OSPF as your network routing protocol. You use the command show ip route and you see several routes described as O, O IA, O E1, and O E2. What routes are in your area?()
A . O IA
B . O E1
C . O E2
D . O
-
You have just created a new VLAN on your network for inter-VLAN routing. What is one step that you should include in your VLAN-based implementation and verification plan?()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the proper IP address space assigned to it for the new VLAN.
D . Verify that the VLAN virtual interface has been correctly created and enabled.
-
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
A . Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
B . Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
C . Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
D . Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas network
-
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()
A . Permit administrators to use an HTTP interface to manage servers remotely
B . Permit only administrators to connect to the servers’ Telnet service
C . Permit administrators to manage the servers by using Microsoft NetMeeting
D . Require administrators to use Remote Desktop for Administration connections to manage the server
-
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
A . Network management
B . Network optimization
C . Network security
D . Content storage networking
-
Rate your level of proficiency with configuring, managing, and troubleshooting access to resources, such as files, folders, offline files, shared folders, and local and network printers.()
A . Very High
B . High
C . Moderate
D . Low
E . Very Low
-
You have just created a new VLAN on your network. What is one step that you should include in your VLAN based implementation and verification plan? ()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the VLAN was added on all switches with the use of the show vlan command.
C . Verify that the switch is configured to allow for trunking on the switch ports.
D . Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
-
Your network has a mixture of Fast Ethernet and Gigabit Ethernet links. What needs t o be done to ensure optimal data routing when using OSPF?()
A . Nothing. OSPF will determine the most optimal path for routing data by default.
B . Adjust the hello and dead timers for more rapid detection of link failures.
C . Increase the reference - bandw idth used to calculate the interface default metrics, on all routers in your network.
D . Set the priority values on every broadcast interface to ensure that the designated and backup designated routers are the routers with the most processor and memory resources.
-
You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform?()
A . Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B . Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C . Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D . Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
-
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
A . Enable Internet Connection Sharing
B . Enable on-demand dialing
C . Enable sharing a modem on one computer on the network
D . Configure a DHCP Server
E . Disable Internet Connection Sharing
F . Configure all the other computers to be DHCP enabled.
-
Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain.
Your company has a print device that is used to print payroll checks. The print device is physically attached to the parallel port of one of the client computers. This print device's tray is loaded with checks at all times. You have shared this printer on the network as ChkPrinter and retained the default permissions.
A payroll application runs on a server named HRserv. Every Wednesday at 5:00P.M, the application prints paychecks from employees on this printer. The payroll application runs as a Windows 2000 service on HRserv.
You need to configure ChkPrinter so that only the payroll application will be able to use the printer.
What should you do?
A.Configure the share name for ChkPrinter to be ChkPrinter$. Configure the payroll application to print to this new share name.
B.Configure ChkPrinter so that it is available only from5:00 P.Mto5:30 P.M
C.Configure ChkPrinter to allow the HRserv domain account print permissions for ChkPrinter. Remove print permissions for the Everyone group.
D.Configure ChkPrinter to allow all HRserv domain accounts Print permissions for ChkPrinter. Change the permissions to deny print on ChkPrinter for the Everyone group.
-
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.
However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
F. None of the above