100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Jason Dion Practice Exam 1 Questions and Answers 2025. $22.49   Add to cart

Exam (elaborations)

Jason Dion Practice Exam 1 Questions and Answers 2025.

 9 views  0 purchase
  • Course
  • Jason Dion
  • Institution
  • Jason Dion

Jason Dion Practice Exam 1 Questions and Answers 2025.

Preview 4 out of 42  pages

  • September 12, 2024
  • 42
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Jason Dion
  • Jason Dion
avatar-seller
AIMHigher
1



Jason Dion Practice Exam 1 Questions and Answers 2025.

You are working as a network administrator and are worried about the
insider threat.
possibility of anYou want to enable a security feature that would remember
the Layer
address 2 connected to a particular switch port to prevent someone from
first
unplugging
a workstation from the switch port and connecting their laptop to that same
switch of
Which port.
the following security features would BEST accomplish
this goal?

b. ACL security
a. Port
c.
NAC
d. 802.1x - a. Port
security
Explanatio
n
OBJ-4.3: Port security, also known as persistent MAC learning or Sticky
MAC, is afeature that enables an interface to retain dynamically learned
security
MAC addresses
when the switch is restarted or if the interface goes down and is brought
backisonline.
This a security feature that can be used to prevent someone from
unplugging theirand connecting their laptop to the network jack without
office computer
permission
the sinceconnected to that network jack would only allow the
switch port
computer
original with
MAC the
address to gain
connectivity.
You just started work as a network technician at Dion Training. You have
been asked
check if DHCPto snooping has been enabled on one of the network devices.
Which of the
following commands should you enter within the command line
interface?

b.
a. show route
config
c. show
diagnostic
d. show interface - b. show
config
Explanatio
n
OBJ-5.3: The "show configuration" command is used on a Cisco networking
device to
display the device's current configuration. This would show whether or not
the DHCP was enabled on this device. The "show interface" command is
snooping
used on
Cisco a
networking device to display the statistics for a given network
interface.
"show Thecommand is used on a Cisco networking device to display
route"
the current
state of the routing table for a given network device. The "show diagnostic"
command
used is
on a Cisco networking device to display details about the hardware
on
andeach node in a networked
software
device.
An administrator has configured a new 250 Mbps WAN circuit, but a
bandwidth
test shows speed
poor performance when downloading larger files. The
download initially



1

,2


reaches close to 250 Mbps but begins to drop and show spikes in the
over time.speeds
download The administrator checks the interface on the router and sees
the following: show interface eth 1/1 GigabitEthernet 1/1 is up, line is up
DIONRTR01#
Hardware is
GigabitEthernet, address is 000F.33CC.F13A Configured speed auto,
actual 1Gbit,
configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged,
port state isWhich of the following actions should be taken to improve
forwarding
the network for this WAN connection?
performance

a. Replace eth1/1 with a 1000Base-T
b. Configure the interface to use full-
transceiver
duplex
c. Assign the interface a 802.1q tag to its
own
d. VLAN
Shutdown and then re-enable this interface - c. Assign the interface a
802.1q
its own tag to
VLAN

OBJ-5.5: The WAN interface (eth 1/1) is currently untagged and is being
Explanation
assigned
default to the
VLAN (VLAN 1). If there are numerous devices in the default VLAN,
the VLAN
may be overloaded or oversubscribed leading to a reduction in
the network To solve this issue, you would assign the WAN interface to a
performance.
VLANtraffic
less with or to its own VLAN. By adding an 802.1q tag (VLAN tag) to the
interface,
can assignyou
it to its own individual VLAN and eliminate potential
overloading or issues. The interface is already set to full-duplex (fdx) and
oversubscription
it operating in full-duplex (fdx). Therefore, the issue is not a duplexing
shows
mismatch.that The
the interface is already using a GigabitEthernet, so you do
configuration
not needthe
replace to transceiver with a 1000Base-T module. Also, the physical layer
is working
properly and a link is established, as shown by the output "GigabitEthernet
showing
1/1 is up",the current transceiver is functioning properly at 1 Gbps. While
issuing thecommand and then re-enabling the interface could clear any
shutdown
errors,
the based status
interface on shown we have no indications that errors are being
detected or
reporte
d.
Dion Training Solutions is launching their brand new website. The website
needs to beaccessible to our students and reachable 24x7. Which
continually
networking
would BEST concept
ensure that the website remains up at all
times?

b. Cold
a. Snapshots
site
c. Warm
site
d. High availability - d. High
availability

OBJ-3.3: High availability is a concept that uses redundant technologies and
Explanation
to ensure that a system is up and accessible to the end-users at all times.
processes
Snapshots,
warm sites, and cold sites may be useful for recovering from a disaster- t
type will
they event,
notbu
ensure high availability. High availability (HA) is a
component system
technology of a that eliminates single points of failure to ensure
continuous
operations or uptime for an extended
period.
2

,3


What is the network ID associated with the host located at
192.168.0.123/29?
a.
192.168.0.96
b.
c.
192.168.0.112
192.168.0.120
d. 192.168.0.64 - c.
192.168.0.120
Explanatio
OBJ-1.4: In classless subnets using variable-length subnet mask (VLSM), the
n
ID is the first IP address associated within an assigned range. In this
network
example,isthe
notation CIDR
/29, so each subnet will contain 8 IP addresses. Since the IP
address
provided is 192.168.0.123, it will be in the
192.168.0.120/29
Dion Training has anetwork.
single-mode fiber-optic connection between its main
office and
satellite its located 30 kilometers away. The connection stopped
office
working, soused
technician a an OTDR and found that there is a break in the cable
approximately
12.4 kilometers from the main office. Which of the following tools is
required
fiber opticto fix this
connection?
a. Cable
crimper
b. Media
converter
c. Cable
snips
d. Fusion splicer - d. Fusion
splicer
Explanatio
n
OBJ-5.2: A fusion splicer is used to create long fiber optic cable lengths
by splicing
multiple cables together or to repair a break in a fiber optic cable. A
used
cable to join the
crimper is internal wires of a twisted pair cable with metallic pins
houses connector,
plastic inside a such as an RJ-45 connector. A cable snip or cable cutter
is used
cut to cables into shorter lengths from a longer spool of wound
copper
cable. A media
converter is a layer 1 networking device that connects two different media
types,
as such twisted pair cable and a fiber
a copper
optic
A homecable.
user reports to a network technician that the Internet is slow when
they
to attempt
use their smartphone or laptop with their Wi-Fi network. The network
administrator
logs into the admin area of the user's access point and discovers that
multiple are
devices unknown
connected to it. What is MOST likely the cause of
this issue?
a. The user is connected to a
botnet
b. An evil twin has been
implemented
c. A successful WPS attack has
occurred
d. The user is experiencing ARP poisoning - c. A successful WPS attack has
occurred
Explanatio
n
OBJ-4.2: Wi-Fi Protected Setup (WPS) allows users to configure a wireless
network
without typing in the passphrase. Instead, users can configure devices
by pressing
buttons or by entering a short personal identification number (PIN).
Unfortunately,
is fairly easy toWPS hack and unknown devices can then connect to your
network without
3

, 4


permission. This is the most likely cause of the issue described in the
an evil twin,
question. If itthe
wastechnician would not have been able to log in to the admin
area of to
device thesee the connected devices. ARP poisoning consists of
abusing the in ARP to corrupt the MAC-to-IP mappings of other
weaknesses
devices on
network. thewould not affect the number of devices connected to the
This
access point,
though, only the switching of their traffic once they connect. A botnet is a
collection of
internet-connected devices infected by malware that allow hackers to
control
From them.
the description in the question, there is no evidence that the
user's laptopare
smartphone or infected with malware. Even if one was infected, it is
would bethey
unlikely infected
both with the same malware since laptops and smartphones
run different
operating
systems.
You are configuring a network to utilize SNMPv3 to send information from
devices back to an SNMP manager. Which of the following SNMP options
your network
should you
enable to ensure the data is transferred
confidentially?

a. authPriv
c.
b. authEncrypt
authProtect
d. authNoPriv - a.
authPriv
Explanatio
n
OBJ-3.1: In SNMPv3, the authPriv option ensures that the communications
are sent
with authentication and privacy. This uses MD5 and SHA for
authentication
and and DES
AES for privacy and
encryption.
Your network is currently under attack from multiple hosts outside of the
network.
type Whichis most likely
of attack
occurring?

b.
a. Spoofing
DDoS
c. On-path
attack
d. Wardriving - b.
DDoS
Explanatio
n
OBJ-4.2: A Distributed Denial of Service (DDoS) attack occurs when
multiple
flood thesystems
bandwidth or resources of a targeted system or network. A
of Service (DDoS)
Distributed Denial attack is an attempt to make an online service
unavailable by it with traffic from multiple sources. Spoofing is the act of
overwhelming
disguising a
communication from an unknown source as being from a known, trusted
source.
path An on-
attack is an attack where the attacker secretly relays and
possibly alters the
communications between two parties who believe they are directly
communicating
each other. The with
attacker makes independent connections with the victims
and relays between them to make them believe they are talking directly to
messages
over
each aother
private connection. Wardriving is the act of searching for Wi-
Fi wireless usually from a moving vehicle, using a laptop or
networks,
smartphone.
Lynne is a home user who would like to share music throughout the
computers in her house using an external USB hard drive connected to a
router that she purchased over
4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AIMHigher. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77857 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.49
  • (0)
  Add to cart