- Ethical Hacking Statement
- The Modern Security Operations Center
- The Windows Operating System
- Linux Basics
- Network Protocols
- Ethernet and IP Protocol
- Connectivity Verification
- Address Resolution Protocol
- The Transport Layer
- Network Services
- Network Communication Devices
- Network Security Infrastructure
- Attackers and Their Tools
- Common Threats and Attacks
- Network Monitoring and Tools
- Attacking the Foundation
- Attacking What We Do
- Understanding Defense
- Access Control
- Threat Intelligence
- Public Key Cryptography
- EndPoint Protection
- Endpoint Vulnerability
- Technologies and Protocols
- Network Security Data
- Evaluating Alerts
- Working with Network Security Data
- Digital Forensics and Incidents Analysis and response
1. For which discovery mode will an AP generate the most traffic on a WLAN?
- A. Passive mode
- B. Active mode
- C. Open mode
- D. Mixed mode
The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.
2. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?
- A. SSID
- B. ESS
- C. ad hoc
- D. BESS
The SSID is used to name a wireless network. This parameter is required in order
for a wireless client to attach to a wireless AP.
3. Which two protocols are considered distance vector routing protocols? (Choose two.)
- A. EIGRP
- B. RIP
- C. ISIS
- D. OSPF
- E. BGP
RIP and EIGRP are both considered distance vector routing protocols. OSPF and
ISIS are link-state routing protocols. BGP is a path vector routing protocol.
4. What information does an Ethernet switch examine and use to build its address table?
- A. Source MAC address
- B. Source IP address
- C. Destination IP address
- D. Destination MAC address
An Ethernet switch examines the source MAC address of an incoming frame. If the source MAC address is not in the MAC address table, the switch will add it to the table with the associated ingress Ethernet port.
5. Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?
- A. Layer 7
- B. Layer 3
- C. Layer 4
- D. Layer 2
When a router forwards traffic between LAN segments it encapsulates the Layer 2
frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router
encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.
6. At what layer of the OSI model do routers operate?
- A. Layer 3
- B. Layer 5
- C. Layer 4
- D. Layer 2
Routers operate at Layer 3 of the OSI model and forward packets between logical
networks.
7. Which wireless parameter refers to the frequency bands used to transmit data to a wireless access point?
- A. SSID
- B. Security mode
- C. Scanning mode
- D. Channel settings
An access point can be manually set to a specific frequency band or channel in
order to avoid interference with other wireless devices in the area.
8. What is a role of an intermediary device on a network?
- A. Runs applications that support collaboration for business
- B. Determines the path and directs data along the way to its final destination
- C. Forms the interface between the human network and the underlying communication network
- D. Functions as the primary source of information for end devices
Processes running on the intermediary network devices perform functions like
regenerating and re-transmitting data signals, maintaining information about what pathways exist through the network and internetwork, directing data along alternate pathways when there is a link failure, and permitting or denying the flow of data, based on security settings.
9. What information does an Ethernet switch examine and use to forward a frame?
- A. Destination IP address
- B. Source IP address
- C. Source MAC address
- D. Destination MAC address
A switch is a Layer 2 device that uses source MAC addresses to build a MAC
address table (a CAM table) and destination MAC addresses to forward frames.
10. Which device can control and manage a large number of corporate APs?
- A. Switch
- B. LWAP
- C. Router
- D. WLC
A wireless LAN controller (WLC) can be configured to manage multiple
lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized managementenvironment.
11. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)
- A. WLAN controller
- B. Ethernet switch
- C. Access point
- D. RADIUS authentication server
- E. Repeater
In addition to its roles as router, a typical SOHO wireless router acts as both a
wireless access point and an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used in enterprise deployments to manage groups of lightweight access points. A repeater is a device that enhances an incoming signal and retransmits it.
12. What technology is used to prevent Layer 2 loops?
- A. NTP
- B. ARP
- C. VTP
- D. STP
The Spanning Tree Protocol (STP), is enabled on switches to prevent Layer 2 loops
from forming when there are redundant physical paths.
13. Which sentence correctly describes the SVI inter-VLAN routing method?
- A. The encapsulation type must be configured on the SVI.
- B. Subinterfaces have to be created.
- C. A physical interface is needed for every VLAN that is created.
- D. An SVI is needed for each VLAN.
In order to create SVI inter-VLAN routing on a Layer 3 switch, the VLAN must
exist in the database and the SVI must be explicitly created. The only exception is VLAN1,which is created by default.
14. How are IP addressing designs affected by VLAN implementations?
- A. VLANs do not support VLSM.
- B. Each VLAN must have a different subnet mask.
- C. VLANs do not use a broadcast address.
- D. Each VLAN must have a different network number.
Each VLAN requires its own network number, broadcast address, and valid IP
addresses because each VLAN is a separate network. IP addressing schemes are frequently designed with the VLAN numbers as part of the design.