Time limit: 0
Quiz Summary
0 of 70 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the practice exam, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the practice exam successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 70
1. Question
Your organization relies heavily on the Windows SMB protocol for file and printer sharing. Microsoft recently announced that attackers can take advantage of a vulnerability in the SMB protocol and all services should be suspended until further notice. Which of the following ports SHOULD you add to your access control lists (ACLs) to temporarily block incoming SMB packets?
CorrectIncorrect -
Question 2 of 70
2. Question
An organization has 5 Ethernet switches connected using a bus topology. Each switch has 4 different VLANs and all of them communicate through inter-VLAN routing. Which of the following network topologies BEST describes the above scenario?
CorrectIncorrect -
Question 3 of 70
3. Question
Which of the following protocols is used by servers, switches, routers, and computers to synchronize their time over a network?
CorrectIncorrect -
Question 4 of 70
4. Question
Sort the layers (from layer 1 to layer 7) to form the OSI Model.
-
Data link
-
Physical
-
Network
-
Session
-
Presentation
-
Application
-
Transport
View Answers:
CorrectIncorrect -
-
Question 5 of 70
5. Question
Which type of connector should be used to plug a telephone into the wall and the handset into the telephone?
CorrectIncorrect -
Question 6 of 70
6. Question
What type of cloud services can allow you to increase or decrease IT resources as needed to meet changing demand?
CorrectIncorrect -
Question 7 of 70
7. Question
Which of the following concepts is the process of adding additional information when data is traveling in OSI or TCP/IP model?
CorrectIncorrect -
Question 8 of 70
8. Question
Which of the following is the difference between connectionless and connection-oriented services? (Select TWO)
CorrectIncorrect -
Question 9 of 70
9. Question
Which of the following IP addresses are not valid Class A network IDs? (Select TWO)
CorrectIncorrect -
Question 10 of 70
10. Question
Which of the following cloud services requires the least amount of user management, where a service provider manages everything, and the end-user just uses the software?
CorrectIncorrect -
Question 11 of 70
11. Question
Nick has just connected his new keyboard to his PC to play his favorite online games wirelessly. Which of the following types of networks is he using?
CorrectIncorrect -
Question 12 of 70
12. Question
What is the last available address that can be assigned to a host associated with the network located at 72.29.189.2/27?
CorrectIncorrect -
Question 13 of 70
13. Question
Which layer of the Open Systems Interconnection (OSI) model is responsible for providing connectionless and connection-oriented services to applications?
CorrectIncorrect -
Question 14 of 70
14. Question
A network technician has been notified that a connection where the public switched telephone network ends and the private network of the customer begins has intermittent issues. Which of the following is the place where the connection MOST likely has problems with?
CorrectIncorrect -
Question 15 of 70
15. Question
A network engineer is tasked with designing the Classless (variable-length subnet mask) IP scheme for a new campus network. Which of the following number of subnet bits is required to create 200 subnets?
CorrectIncorrect -
Question 16 of 70
16. Question
A network technician is connecting to a server to modify the DHCP configuration. DHCP’s new configuration is to lease the last 50 usable IP addresses in subnet 88.9.4.0/23. Which of the following IP addresses could be leased as a result of your new configuration?
CorrectIncorrect -
Question 17 of 70
17. Question
A network technician is tasked with installing an access point to connect all devices wirelessly. What type of network would the technician end up creating?
CorrectIncorrect -
Question 18 of 70
18. Question
Drag and drop the 802.11 wireless standards into their respective fields.
Sort elements
- 802.11g
- 802.11n
- 802.11a
-
2.4 GHz
-
2.4 GHz / 5 GHz
-
5 GHz
CorrectIncorrect -
Question 19 of 70
19. Question
Drag and drop the various 802.11 wireless standards into their respective frequencies.
Sort elements
- 802.11g
- 802.11a
- 802.11n
-
2.4 GHz
-
5 GHz
-
2.4 GHz / 5 GHz
CorrectIncorrect -
Question 20 of 70
20. Question
A junior network engineer designs a network for a new small office with 9 devices. Firstly, the engineer creates a list of devices he would use for the local area network (LAN). Which of the following devices should the engineer avoid using?
CorrectIncorrect -
Question 21 of 70
21. Question
A network technician has been notified that the wireless network is experiencing slowness and has been asked to recommend a solution to increase the speed of the network. Which of the following technologies should the technician implement?
CorrectIncorrect -
Question 22 of 70
22. Question
A wireless technician is called to ensure 360-degree wireless coverage within the organization. The technician first examines the antenna type and the place where the antenna is being installed. Which of the following types of antenna should be installed to provide connectivity in all directions?
CorrectIncorrect -
Question 23 of 70
23. Question
A network technician is tasked with troubleshooting network connectivity issues within an organization. Employees complain that they aren’t able to connect to the local storage area network. Which of the following is the MOST likely issue?
CorrectIncorrect -
Question 24 of 70
24. Question
Which type of network device operates at layer 3 of the OSI model and uses routing tables to understand where traffic is coming from and where it should go?
CorrectIncorrect -
Question 25 of 70
25. Question
Which of the following actions should be taken to increase the security of SCADA networks? (Select TWO)
CorrectIncorrect -
Question 26 of 70
26. Question
Drag and drop the dynamic routing protocols into their respective fields.
Sort elements
- RIP
- OSPF
- EIGRP
- BGP
-
A distance-vector routing protocol that employs the hop count as a routing metric
-
A link-state routing protocol that was developed for IP networks and is based on the Shortest Path First algorithm
-
An advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration
-
A gateway protocol that enables the internet to exchange routing information between autonomous systems
CorrectIncorrect -
Question 27 of 70
27. Question
A network engineer is tasked with configuring a dynamic routing protocol within an organization. The dynamic routing protocol should support fast converge time, be scalable, and be usable by non-Cisco devices. Which of the following routing protocols does the engineer need to enable and configure in order to accomplish the task?
CorrectIncorrect -
Question 28 of 70
28. Question
Which of the following terms refers to an organization’s documented rules regarding what needs to be done, and who can access particular network resources?
CorrectIncorrect -
Question 29 of 70
29. Question
A physical diagram represents how a network looks, while a logical diagram represents how the traffic flows on the network.
CorrectIncorrect -
Question 30 of 70
30. Question
Which of the following terms represents the maximum tolerable length of time that a computer or system can be down after a failure occurs?
CorrectIncorrect -
Question 31 of 70
31. Question
Which of the following policies allows employees in an organization to use their personally owned devices for work-related activities?
CorrectIncorrect -
Question 32 of 70
32. Question
A technician was called to fix a faulty router on a Wednesday. The router malfunctioned twice on that day, and the technician had to spend an hour in total repairing the router. Which of the following would BEST represent the MMTR?
CorrectIncorrect -
Question 33 of 70
33. Question
Which of the following is a valid SNMP Object Identifier?
CorrectIncorrect -
Question 34 of 70
34. Question
Which of the following types of agreements sets the expectations between the service provider and the customer and describes the services to be delivered?
CorrectIncorrect -
Question 35 of 70
35. Question
Which of the following network documentations is shown in the figure below?
CorrectIncorrect -
Question 36 of 70
36. Question
A network technician is tasked with assessing any network failure points within an organization. As part of the assessment process, the technician receives information from various devices about their status. Which of the following logs would provide the MOST relevant information to assess the network?
CorrectIncorrect -
Question 37 of 70
37. Question
Which of the following networking metrics BEST describes a connectivity problem on wired networks that is caused by delayed packets due to network congestion?
CorrectIncorrect -
Question 38 of 70
38. Question
Multifactor authentication combines two or more independent credentials: what the user knows (password), what the user has (security token) and what the user is (biometric verification). True or False?
CorrectIncorrect -
Question 39 of 70
39. Question
Drag and drop the common networking attacks into their respective fields.
Sort elements
- Social engineering
- Rogue access point
- Evil twin
-
Uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
-
Any unauthorized WLAN radio that is connected to a corporate network.
-
A fake Wi-Fi network that looks like a legitimate access point to steal victims’ sensitive details.
CorrectIncorrect -
Question 40 of 70
40. Question
Which of the following networking attacks redirects online traffic to a fraudulent website that resembles its intended destination?
CorrectIncorrect -
Question 41 of 70
41. Question
Which of the following passwords you would choose to make your account harder to be hacked? (Select TWO)
CorrectIncorrect -
Question 42 of 70
42. Question
Which of the following process comprises scanning devices on a network for missing software updates and keeping the devices updated to avoid security threats?
CorrectIncorrect -
Question 43 of 70
43. Question
A network technician is tasked with implementing a solution to increase the local area network security within an organization. All of the company’s external-facing servers (Web server, FTP server) should be placed in a separate area in order to be accessible from the internet, and the rest servers (Mail server, Storage server) of the internal LAN to be unreachable. Which of the following techniques does the technician need to implement to meet the requirement?
CorrectIncorrect -
Question 44 of 70
44. Question
Which of the following is used in a distributed denial-of-service (DDoS) attack?
CorrectIncorrect -
Question 45 of 70
45. Question
A hacker introduces corrupt Domain Name System (DNS) data into a DNS resolver’s cache to redirect users either to the wrong websites or to his own computer. What type of DNS attack does the hacker implement in this scenario?
CorrectIncorrect -
Question 46 of 70
46. Question
In which of the following types of malware does an attacker prevent users from accessing their system or personal files and demand a ransom payment in order to regain access?
CorrectIncorrect -
Question 47 of 70
47. Question
A cybercriminal stole the personal information or confidential information of a victim by peering over the target’s shoulders. What type of attack did the cybercriminal perform?
CorrectIncorrect -
Question 48 of 70
48. Question
Which of the following VPN solutions is used to connect two local area networks utilized by businesses that want to provide their employees secure access to network resources?
CorrectIncorrect -
Question 49 of 70
49. Question
Which of the following protocols is used in the AAA framework to provide centralized authentication for users who want to gain access to the network?
CorrectIncorrect -
Question 50 of 70
50. Question
A rogue postal worker sits in a post office and intercepts letters written between two people. This postal worker can read private messages and even edit the contents of those letters before passing them along to their intended recipients. What type of attack is this an example of?
CorrectIncorrect -
Question 51 of 70
51. Question
Which of the following types of attacks is shown in the figure below?
CorrectIncorrect -
Question 52 of 70
52. Question
Any device that uses the same frequency range as the wireless network can cause interference. True or False?.
CorrectIncorrect -
Question 53 of 70
53. Question
Assuming you are on a Windows environment, next to each description, type the command to complete each task.
-
-
Check if a networked device is reachable:
-
Allows you to query DNS servers for resource records:
-
Display the IP address, subnet mask, and default gateway for all adapters:
-
View and manipulate the IP routing table:
-
Display entries in the Address Resolution Protocol (ARP) cache:
-
CorrectIncorrect -
-
Question 54 of 70
54. Question
Your co-worker tells you he has a problem accessing his email. What is the first step of the troubleshooting methodology process?
CorrectIncorrect -
Question 55 of 70
55. Question
Assuming you are working on a Windows environment. Type the command-line command to display all connections and listening ports on your device. (Type the command without parameters)
-
C:\Users\ExamsDigest>
CorrectIncorrect -
-
Question 56 of 70
56. Question
You are trying to update your co-worker’s workstation. Unfortunately, the update can’t be finished, and instead, you get the following error message: “Windows Update cannot currently check for updates because the service is not running.” Which of the following actions should you perform next to solve the issue?
CorrectIncorrect -
Question 57 of 70
57. Question
You may receive a message popping up on certain websites when using Microsoft IE that says “The security certificate has expired or is not yet valid“. Which of the following settings needs to be changed on your workstation to fix the error?
CorrectIncorrect -
Question 58 of 70
58. Question
Your manager’s computer was hacked. After many hours of work, you identify all the affected files and successfully remove the malware from his system. What is the NEXT step you should perform after verifying full system functionality?
CorrectIncorrect -
Question 59 of 70
59. Question
You are setting up a new wireless network for a new department. After finishing the installation of the wireless access points and the configuration of the DHCP server, you need to test if everything works as expected, so you turn on the laptop and connect to the network. Your laptop is automatically assigned an IP address of 192.168.1.2 from the DHCP server. On the terminal, you type the command
ping 192.168.1.1
to check if the default gateway responds, and sure enough, it works. You open Google Chrome and attempt to connect to examsdigest.com, but you cannot connect. Instead, you get an error. Afterward, you attempt to ping the IP address for the ExamsDigest web server (87.2.5.99) and it responded successfully. Which of the following is MOST likely the cause of this issue?CorrectIncorrect -
Question 60 of 70
60. Question
Which of the following tools does a technician need to cut a cable with minimal damage to insulation?
CorrectIncorrect -
Question 61 of 70
61. Question
Which of the command-line tools produces the following result?
CorrectIncorrect -
Question 62 of 70
62. Question
Users within an office building report wireless connectivity is sporadic. A wireless technician troubleshooting the issue notices there are multiple Wireless Access Points in the same room using the same frequency band. Which of the following is causing the issue?
CorrectIncorrect -
Question 63 of 70
63. Question
Which of the following software tools does a technician use to capture and analyze packets flow through a network?
CorrectIncorrect -
Question 64 of 70
64. Question
A network engineer is tasked with troubleshooting a web server reachability issue. The engineer first needs to review the A records of the server. Which of the following command-line tools should the technician use to find the A records?
CorrectIncorrect -
Question 65 of 70
65. Question
What is the network ID associated with the host located at 192.168.0.4/26?
CorrectIncorrect -
Question 66 of 70
66. Question
Nick has been hired to configure the firewall of the ACME Corporation. He needs to allow customers to visit their web pages over a secure connection. Which of the following ports must be allowed through the firewall?
CorrectIncorrect -
Question 67 of 70
67. Question
Which of the following IPs are private networks? (Select TWO).
CorrectIncorrect -
Question 68 of 70
68. Question
Drag and drop the disaster recovery terms into their respective fields.
Sort elements
- RPO
- RTO
- MTTR
- MTBF
-
A period of time in which an enterprise’s operations must be restored following a disruptive event
-
A maximum tolerable length of time that a computer or system can be down after a failure occurs
-
The average time it takes to repair and restore a component or system to function
-
The average time that equipment is operating between breakdowns or stoppages
CorrectIncorrect -
Question 69 of 70
69. Question
A network technician is connecting to a Cisco switch to check the status of the interfaces. After typing, the
show interface
command he notices there are 259429 CRC errors on the interface FastEthernet0/13. Which of the following is MOST likely the issue?CorrectIncorrect -
Question 70 of 70
70. Question
An attacker breaks into a password-protected computer by systematically entering every word in a dictionary as a password. What type of attack does the attacker carry out?
CorrectIncorrect