WITH SOLUTIONS GRADED A+
◉ People living near your business are using your guest Wi-Fi in
order to gain free Internet access and to download questionable
files. Which of the following can be done to most easily address this
issu. Answer: Reduce the wireless power levels - adjusting the
power level of anAP can be an easy way to decrease the radius in
which people can connect to your Wi-Fi. Leaving your power levels
at their default can lead to many unintended individuals seeing your
network
◉ Which protocol would be used to exchange information between
different Autonomous systems?. Answer: BSP - is an EGP (external
gateway protocol) and is used to exchange information between
autonomous systems.
autonomous systems. - A network or a group of networks
owned/controlled by a single entity
◉ Which of the following controls could be used to allow employees
entry into building to be recorded by a card reader?. Answer: Access
control vestibules - physical or logical list of who entered a
room/building. This could be a sign in sheet or even a complex
,system that reads RFID cards and records who enters/leaves in area
electronically
◉ Which of the following can be used to centrally manage
credentials for various accounts or privilege levels on network
devices?. Answer: TACACS+
◉ While troubleshooting a network you notice a connection
reporting Late collisions over a half duplex link. You verify that both
ends of the device are indeed running half duplex interfaces. Given
that information which of the following answers is the most likely
cause of this scenario?. Answer: The cable length is excessive -
whenever you see lake collisions that is a telltale sign that your cable
is running past its maximum recommended length for example
twisted-pair cables shouldn't be run further than 100 m ( 328ft)
◉ While configuring a load balancer between multiple systems
which of the following must be configured in order to ensure proper
connectivity during a fail over?. Answer: VIP - virtual IP an essential
part of configuring load balance systems as a single system
◉ Which of the following service models would most likely be used
to replace on premises servers with a could solution. Answer: IaaS -
client moves whole infrastructure to the cloud minus the hardware
of course which is always controlled by the CSP in cloud
deployments
,◉ Which of the following best mitigate a hackers frequent attempts
at brute forceing A company's password. Answer: Two factor
authentication, complex passwords. —
passwords are best protected with longer, more complex passwords
preferably pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for
"password security". Multi factor authentication protects your
password by preventing it from being a single point of failure now
we should require another factor in addition to our password such
as using a biometrics or a smart card
◉ After configuring new firewalls with the correct configuration to
be deployed to each remote branch, unneeded services were
disabled, and all firewalls rules were applied successfully. Which of
the following actions should be performed next to finish hardening
the firewalls?. Answer: Update the firewalls with current firmware
and software —
Keeping a device up today is an essential step in hardening any
system
◉ Which of the following solutions would allow for high speed, low
latency, and globally disperse content distribution?. Answer: Public
cloud —
, CDNs or content delivery networks are load balance networks that
are geographically separated in order to provide the best connection
for local users while also providing normal load balancing services.
This is just the idea of having many servers all around the world to
serve many people
◉ A new network was set up in order to facilitate more users in a
building near your companies HQ. The new network is connected to
the HQ's LAN via a fiber optic cable. However many users on the new
network are unable to access the companies Intranet despise being
able to access the Internet. Which of the following corrections would
most likely resolve this issue?. Answer: Correct the external firewall
gateway address —
Could be a misconfigured firewall
◉ Which of the following attacks consists of following closely behind
a real employee into a secure building by grabbing the door without
their knowledge?. Answer: Tailgating —
Is the act of following somebody into a secure area without their
knowledge
Piggybacking is following somebody into a secure area with their
knowledge