1. A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?
A) A. Logic bomb B) B. Social engineering C) C. Trojan horse D) D. Insider threat
2. A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?
A) A. Rack location B) B. Room number C) C. Media type D) D. Host-name
3. Which of the following physical security devices is used to prevent unauthorized access into a data-center?
A) A. Motion detector B) B. Video camera C) C. Asset tracking D) D. Smart card reader
4. A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Select TWO).(Select 2answers)
A) A. RJ45 B) B. DB-9 C) C. LC D) D. SFTP E) E. GBIC F) F. SC
5. A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC's IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?
A) A. 192.168.12.97 255.255.255.192 B) B. 192.168.12.97 255.255.255.224 C) C. 192.168.12.97 255.255.255.240 D) D. 192.168.12.97 255.255.255.248
Leave a comment