- (Exam Topic 3)
ADSL modem connects to the provider's network using which of the following authentication techniques?
Correct Answer:
C
- (Exam Topic 3)
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 1: Select the tool that was used to create the cable test results.
Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.
Solution:
ACable Certifier provides “Pass” or “Fail” information in accordance with industry standards but can also show detailed information when a “Fail” occurs. This includes shorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 1)
Which of the following can be done to implement network device hardening (Select TWO).
Correct Answer:
CF
Network devices come with default credentials, the username and password that enables you to log into the device for configuration. Changing default credentials should be the first step in hardening a new device. As with any other system, avoiding common passwords adds security.
Keep network devices up to date. That means upgrading firmware, patching and updating as necessary to close any security gaps exposed over time.
Services on network devices like routers include common things, like Telnet and HTTP access; and also things you don’t normally see, like TCP and UDP small services, debugging and testing tools that primarily use ports 20 and lower. If enabled, these services can be used to launch DoS and other attacks. All modern Cisco devices have these disabled; Cisco’s hardening rules insist on disabling unnecessary services.
Using secure protocols hardens network devices. Don’t use Telnet to access a managed switch or router, for example, but use SSH so that the communication is encrypted.
Disabling unused ports on network devices enhances port security for access control. This includes standard IP ports and device ports, both physical and virtual for the latter.
- (Exam Topic 3)
169.254.1.100 is an IP address which would MOST likely come from which of the following?
Correct Answer:
C
- (Exam Topic 1)
A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following should the network administrator do to rule out any problems at Layer 1? (Choose two.)
Correct Answer:
AB