1. Which of the following OSI layers do TCP and UDP operate within?
A) A. Data link
B) B. Network
C) C. Session
D) D. Transport
E) E. Presentation
F) F. Application
2. A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet.Which of the following methods should be used to distribute the images while ensuring integrity?
A) A. Use a TFTP server and UDP protocol.
B) B. Use an FTP server and provide the file hash.
C) C. Use an HTTP server to share the file.
D) D. Use a modem and dial-up connection.
3. An administrator is redesigning a company's network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router.Which of the following would reduce the number of devices in this configuration?
A) A. Bridge
B) B. Multilayer switch
C) C. Switch
D) D. Next-generation firewall
4. A bookstore uses a Faraday cage to comply with credit card regulations. Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the MOST likely cause?
A) A. The Faraday cage is creating interference within the bookstore.
B) B. The Faraday cage prevents access by redirecting signals.
C) C. The Faraday cage is creating latency on the cellular network.
D) D. The Faraday cage is creating attenuation of the cellular network.
5. A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods would meet this requirement?
A) A. PEAP
B) B. WP2-PSK
C) C. Captive portal
D) D. EAP-TLS