Combined All Nework+ Questions w/Answers

¡Supera tus tareas y exámenes ahora con Quizwiz!

A new small business needs a network solution that provides at least 50Mbps of bandwidth and supports full duplex communication. Which of the following meets those needs? A. 10/100 layer 2 switch B. 2.4GHz 802.11g C. 5.0GHz 802.11a D. 10Base2 Ethernet

A. 10/100 layer 2 switch

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248

A. 255.255.255.0

A managed switch offers which of the following benefits over an unmanaged switch? (Select TWO). A. 802.1q B. SNMP C. Gigabit D. Layer 2 forwarding E. Fewer collision domains

A. 802.1q B. SNMP

Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting? A. A 110 block B. A demarc C. A DB-9 D. A smart jack

A. A 110 block

Kim, a network administrator, is configuring a switch with an LACP port group for uplink. She plugs in the secondary uplink of the group, and shortly thereafter receives widespread reports that the network is malfunctioning. Which of the following is MOST likely the cause? A. A network loop was created due to a misconfiguration of the port group. B. The port on the switch for the new secondary link was never enabled. C. The LACP group was mistakenly configured to do layer 2 + 3 + 4 hashing for its link balancing. D. The LACP group was only configured to do layer 2 hashing for its link balancing.

A. A network loop was created due to a misconfiguration of the port group

Which of the following DNS record types provides the hostname to IP address mapping? A. A record B. NS record C. CNAME record D. MX record

A. A record

Lisa, a network technician, has implemented DHCP on the network last week. Employees are now reporting duplicate IP addresses and network connectivity errors. Which of the following would cause duplicate IP addresses on the network? A. A second DHCP server is on the network. B. The network IP leases are expiring and not renewing. C. The DNS record A pointers are incorrect. D. The DHCP server has run out of IP addresses to issue to clients.

A. A second DHCP server is on the network

Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding

A. CSMA/CA

A new network printer needs to be installed in the finance department. The switch port, server, and printer NIC have been configured properly but no link light is coming up when the printer is plugged into the wall port. Which of the following tools would Jeff, an administrator, use to diagnose the problem? A. Cable tester B. Protocol analyzer C. OTDR D. Crimper

A. Cable tester

Which of the following protocols is used to assign IP addresses to network devices? A. DHCP B. UTP C. FTP D. TCP/IP

A. DHCP

Jeff, a user, reports very slow network access. He has spoken to other users, and no one else is experiencing network problems. Which of the following is the NEXT step in troubleshooting this issue? A. Determine if anything has changed. B. Upgrade the user to a gigabit speed. C. Replace the user's network card. D. Set the switch port to full-duplex

A. Determine if anything has changed

Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Zach perform FIRST before responding to the ticket? A. Determine if anything has changed. B. Test a theory to determine a cause. C. Establish a plan of action to resolve the problem. D. Escalate the problem if necessary.

A. Determine if anything has changed

Before installing a wireless network, which of the following should Kim, a network technician, take into consideration to reduce signal exposure for war drivers? A. Device placement B. MAC address filtering C. User authentication D. Encryption protocols

A. Device placement

Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? A. Enable mixed mode B. Disable SSID C. Disable encryption D. Enable 'n' only mode

A. Enable mixed mode

Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue? A. Enable wireless multimedia (WMM) for QoS B. Use the 40MHz channels in the 2.4GHz band C. Enable access point antenna isolation D. Limit the clients to 802.11g compatible laptops

A. Enable wireless multimedia (WMM) for QoS

Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO). A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP

A. High availability B. Fault tolerance

Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following? A. IP filtering B. Application filtering C. MAC filtering D. Port filtering

A. IP filtering

Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID

A. Incorrect DNS

Lisa, an administrator, attempts to open a web page and sees the following error: 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7

A. Layer 1

Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside? A. Network B. Data link C. Transport D. Session

A. Network

To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following? A. Only the 5GHz band B. Only the 2.4GHz band C. Only the 900MHz band D. Both 2.4GHz and 5GHz bands

A. Only the 5GHz band

Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support? A. PoE and QoS B. LACP and OSPF C. 802.1x and 802.11n D. NAT and VTP

A. PoE and QoS

Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device's MIB. Which of the following should she use? A. SNMP B. Traffic analysis C. Syslog D. Asset management

A. SNMP

Kim, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Kim's wireless network to differentiate it from other wireless networks and still provide the BEST performance and security? (Select TWO). A. SSID B. Channel C. Antenna type D. Wireless standard E. NAT

A. SSID B. Channel

Which of the following defines the range of IP addresses a DHCP server can assign? A. Scope B. Lease C. Reservation D. Subnet

A. Scope

A company has decided to increase wireless infrastructure security by moving from WEP encryption to WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem? A. The users who cannot connect are using older NICs without WPA2 support. B. The users who cannot connect are in areas without wireless coverage. C. The users who cannot connect have not been placed in the correct VLAN. D. The users who cannot connect have not specified the correct signal strength.

A. The users who cannot connect are using older NICs without WPA2 support.

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach's theory? A. Traffic analysis B. SNMP C. History logs D. System logs

A. Traffic analysis

Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). A. WPA encryption B. Changing wireless channels C. MAC filtering D. Changing wireless speed standards E. SSID disable

A. WPA encryption C. MAC filtering

Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem? A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable. B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. C. Manually adjust the duplex mode on the server's link. D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable

Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following commands can Zach use to BEST troubleshoot this issue? A. netsh B. nslookup C. ipconfig D. tracert

A. netsh

Which of the following is a Class A private IP address? A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0.100

B. 10.1.1.45

1000BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet). B. 100 meters (328 feet). C. 500 meters (1640 feet). D. 1000 meters (3280 feet).

B. 100 meters (328 feet).

Which of the following cables covers the LONGEST distance? A. 10GBaseT B. 10GBaseFR C. 100BaseTX D. 1000BaseX

B. 10GBaseFR

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389

B. 53

Lisa, a technician, is asked to install a wireless network for two neighboring buildings. Which of the following wireless signals will MOST easily penetrate obstructions, such as walls and doors? A. 802.11a B. 802.11g C. 802.11n 5GHz D. 802.11n 5GHz wide band

B. 802.11g

Which of the following services would have assigned the IP address 169.254.1.89? A. DHCP B. APIPA C. IDS D. DNS

B. APIPA

Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets Kim wants to use the workstation's MAC address. Which of the following protocols would provide the needed information? A. DHCP B. ARP C. DNS D. PING

B. ARP

A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should Jeff, a technician, complete to allow these new employees access to the wireless network? A. Frequency settings should be changed. B. Additional WAPs should be installed. C. Channels should be changed. D. VLANs should be added

B. Additional WAPs should be installed

Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected.

B. An incorrect subnet mask has been entered in the WAP configuration.

After installing new cabling, Kim, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem? A. Multimeter B. Cable certifier C. Cable tester D. Toner probe

B. Cable certifier

Jeff, a network technician, arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should Jeff use to attempt to discover the problem? A. Network maps B. Change management C. Baselines D. Cable management

B. Change management

Kim, a new employee, is unable to get to the department's server while other employees are having no issues. The network administrator has verified that Kim has permission to the server and the workstation is able to get to other network resources. Which of the following is the MOST likely cause? A. The department server is having network issues. B. Kim's workstation is a part of the wrong VLAN. C. The onboard NIC has outdated drivers installed. D. The wireless NIC has not been enabled for Kim's workstation

B. Kim's workstation is a part of the wrong VLAN.

The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location? A. Smart jack B. MDF C. VPN D. 66 block

B. MDF

Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue? A. Incorrect VLAN tagging B. Missing helper addresses C. Wrong default gateway D. Improper routing protocols

B. Missing helper addresses

Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information? A. History logs B. Network sniffer C. Network maps D. Traffic shaping

B. Network sniffer

After a brownout, Zach, a user, can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue? A. Switching loop B. Power failure C. Broadcast storm D. Duplicate IP address

B. Power failure

Which of the following network optimization methods would be BEST to implement to increase bandwidth for an internal streaming video server? A. ISDN B. QoS C. Upgrade to 10baseT D. Buffer overflow

B. QoS

Zach, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO). A. WAPs B. Routers C. Patch panels D. Hubs E. Bridges F. VLANs

B. Routers F. VLANs

Which of the following routing protocols utilizes only hop count as a metric, broadcasts its routing table every 30 seconds by default, and has a MAXIMUM hop count of 15? A. Interior Gateway Routing Protocol (IGRP) B. Routing Information Protocol (RIP) C. Open Shortest Path First (OSPF) D. Border Gateway Routing Protocol (BGP

B. Routing Information Protocol (RIP)

Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Zach checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet0/10 Switchport trunk encapsulation dot1q Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections? A. The servers have not had VLAN tagging enabled on their NICs. B. Speed and duplex have not been set. C. VLAN tagging was not set on the trunk. D. The servers have been connected with CAT5 cable.

B. Speed and duplex have not been set.

Jeff, a technician, is troubleshooting a PoE switch used for voice. Users report that their phones turn off and reboot often. Which of the following is MOST likely the cause? A. Phone adapter failure B. Switch power failure C. Mismatched MTU D. Wrong subnet mask

B. Switch power failure

Clients are unable to connect to the wireless network. The network is secured with WPA2- Enterprise. Which of the following is MOST likely the cause of the problem? A. MAC address authentication is being used. B. The RADIUS server is down. C. The users are using incorrect passwords. D. The PSK is wrong.

B. The RADIUS server is down

Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port. Which of the following configuration changes would facilitate access? A. Traffic filtering B. Trunking C. MAC filtering D. Port mirroring

B. Trunking

Lisa, a network technician, would like to keep the IP address of the Human Resource department's server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employee workstations. Which of the following would BEST allow this and have the ability for the server to keep the same IP address? A. Implement a set of static IPs for the entire human resource department. B. Use a DHCP reservation for the server IP address. C. Use a small DHCP scope for the human resource department. D. Connect the server to a router in the network closet on the same floor.

B. Use a DHCP reservation for the server IP address.

Lisa, a network technician, is troubleshooting a port on a switch that does not allow other devices to communicate to each other. Which of the following is MOST likely the cause? A. Wrong DNS server B. VLAN assignment C. Bad SFP module D. Missing routes

B. VLAN assignment

For security reasons Zach, a network technician, wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs? A. VPN concentrator B. Virtual servers C. Wireless D. Multimode fiber

B. Virtual servers

The location where the Telco wiring stops and the clients wiring starts is known as the: A. MDF. B. demarc. C. IDF. D. 66 block

B. demarc.

A small business would like to connect a second building on their property to the network. The building is about 200 meters (656 feet) away from the main building. Which of the following would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building? A. 10GBase-LW B. 1000Base-LX C. 1000Base-SX D. 1000BaseT

C. 1000Base-SX

Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443

C. 143

Lisa, a technician, is asked to install a wireless router in a company's public café area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A. Content filtering on the wireless access point B. Allow traffic from the wireless access point C. Block traffic from the wireless access point D. Packet filtering on the wireless access point

C. Block traffic from the wireless access point

Kim, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Kim use to connect the two switches? A. CAT3 cable B. Serial cable C. Crossover cable D. Rollover cable

C. Crossover cable

Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach's own country. Which of the following security measures could he use to set up this functionality? A. MAC filtering B. Port filtering C. IP filtering D. TLS

C. IP filtering

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause? A. Improper grounding B. TXRX reversed C. Incorrect termination D. Outdated NIC drivers

C. Incorrect termination

Which of the following has to be defined to guarantee a computer always has a private IP address of 10.4.0.5? A. Scope B. Lease C. Reservation D. Dynamic IP addressing

C. Reservation

Zach, a network technician, is installing a 48 port switch. Zach is configuring the switch to avoid switch looping. Which of the following should the technician enable? A. Full duplex B. MAC filtering C. Spanning tree D. Port mirroring

C. Spanning tree

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following? A. Packet sniffing B. Packet filter C. Stateful inspection D. Content filter

C. Stateful inspection

Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement? A. MS-CHAP B. Kerberos C. TACACS+ D. PKI

C. TACACS+

Zach, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem? A. The wrong cable type has been used. B. IDS has shut down the computer's switch port. C. The port on the switch is configured incorrectly. D. Spanning tree protocol was implemented.

C. The port on the switch is configured incorrectly.

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue? A. Increased uptime B. Caching engines C. Traffic shaping D. Load balancing

C. Traffic shaping

A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Kim, a network administrator, is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering? A. CAT5e connection between offices via the patch panel located in building's communication closet. B. CAT5e cable run through ceiling in the public space between offices. C. VPN between routers located in each office space. D. A WEP encrypted wireless bridge with directional antennae between offices.

C. VPN between routers located in each office space.

Zach, a technician, is installing a new wireless network. There are currently no wireless devices in the area. Which of the following should Zach consider before installing the new devices? A. Frequencies B. SSID broadcast C. WAP placement D. Channels

C. WAP placement

Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters) from the house. Zach wants to extend the Internet connection from the home to the garage. Which of the following technologies would MOST likely accommodate this range? A. DVI cable B. Bluetooth C. Wireless D. CAT3 cable

C. Wireless

Which of the following uses copper wiring? A. 10GBaseER B. 10GBaseLW C. 100BaseFX D. 1000BaseT

D. 1000BaseT

Jeff, a network administrator, detects an existing 802.11g signal on channel 5. Which of the following channels would be the LEAST likely to interfere with the existing signal? A. 1 B. 6 C. 9 D. 11

D. 11

Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present? A. Reverse ARP B. Full duplex on the fiber link C. PoE D. 802.1q trunking

D. 802.1q trunking

During the day Kim, an administrator, noticed the network slowing down. Within an hour, the network was showing 100% utilization. While investigating the issue, Kim notices that most of the traffic is coming from one switch. Which of the following scenarios is MOST likely the cause? A. The switch was configured for QoS and was bottlenecking all traffic. B. Kim has implemented VLAN trunking on the switch. C. A user has moved a laptop from one wall jack to another triggering port security. D. A user plugged both ends of a patch cable into the switch jacks.

D. A user plugged both ends of a patch cable into the switch jacks.

Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use? A. Network maps B. Cable management documentation C. Wire schemes D. Baseline

D. Baseline

When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following? A. DB loss B. Dispersion C. Collisions D. Cross-talk

D. Cross-talk

Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically? A. Kerberos B. BIND C. WINS D. DHCP

D. DHCP

Which of the following OSI layers performs error detection using a Frame Check Sequence? A. Session B. Transport C. Physical D. Data link

D. Data link

Which of the following BEST describes the point at which an ISP's responsibility for an Internet connection ends? A. Router B. MDF C. IDF D. Demarc

D. Demarc

Zach, a user, cannot access any network resources. The technician has determined that the problem is isolated to Zach, and that there have not been any changes to his workstation or switch port recently. Which of the following steps in the troubleshooting methodology should the technician do NEXT? A. Establish a plan of action to resolve the problem. B. Implement preventative measures. C. Implement the solution or escalate as necessary. D. Establish a theory of probable cause.

D. Establish a theory of probable cause

Zach, a customer, wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer? A. CAT3 B. CAT5 C. CAT6 D. Fiber

D. Fiber

A layer 3 switch can move packets between subnets based on which of the following criteria? A. 802.1q tag B. Port C. Application D. IP address

D. IP address

Jeff, a user, reports getting a "This page cannot be displayed" error message in his web browser. However, Jeff can ping the default gateway. Which of the following is the MOST likely cause of the problem? A. SSL certificates are expired B. Incorrect WINS server C. The browser is unsupported D. Incorrect DNS settings

D. Incorrect DNS settings

At which of the following layers does HTML operate? A. Layer 2 B. Layer 3 C. Layer 5 D. Layer 7

D. Layer 7

Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use? A. CAT5e B. CAT6 C. Coaxial D. Multimode fiber

D. Multimode fiber

Which of the following OSI model layers is between the data link and transport layers? A. Presentation B. Physical C. Session D. Network

D. Network

Kim, a company's network technician, receives a report in the morning about Internet servicebeing down at the site. Kim was informed yesterday that there was a water main break in front of the site, and repair work was going to be performed. She notices that there are workers currently performing the repair. To test to make sure there are no internal network issues, a laptop is plugged into the border router to test connectivity to the Internet. The laptop fails to connect to the Internet. Which of the following should be performed according to the network troubleshooting methodology? A. Ask the accounting department if all bills were paid to the Internet service provider. B. Verify the Internet is fully restored and notify employees of the restoration. C. Question the employees of the severity of the Internet outages by email. D. Notify employees of the outage and contact the service provider of the demarc.

D. Notify employees of the outage and contact the service provider of the demarc.

Kim, a network technician, is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer? A. MAC filtering B. IP address C. PoE D. Port speed

D. Port speed

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows: End A. orange-white, orange, green-white, blue, blue-white, green, brown-white, brown End B. green-white, green, orange-white, blue, blue-white, orange, brown-white, brown Which of the following should Kim do to complete the installation? A. Re-end the provided cable, keeping the wiring the same. B. Use the provided cable. C. Purchase a crossover cable. D. Purchase a straight-through cable.

D. Purchase a straight-through cable.

Which of the following protocols uses port 3389? A. IMAP B. DHCP C. SSH D. RDP

D. RDP

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity? A. Behavioral Based IDS B. Signature Based IDS C. Behavioral Based IPS D. Signature Based IPS

D. Signature Based IPS

Which of the following VPN methods is BEST used for connecting a remote office to the main company office? A. WEP-to-WPA B. RDP-to-RAS C. Client-to-site D. Site-to-site

D. Site-to-site

Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario? A. Event logs B. Baselines C. Change management D. Syslog

D. Syslog

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem? A. The subnet mask is incorrect. B. A routing loop has occurred. C. Jeff used a crossover cable to connect the switch to the gateway. D. The server is missing default-gateway information.

D. The server is missing default-gateway information.

Logically separating the ports on a switch without physically separating them can be done using which of the following? A. Routing tables B. Hub logic C. Spanning tree protocol D. VLANs

D. VLANs

Creating a uniform user environment throughout the network can BEST be achieved by using which of the following? A. Honeypots B. Virtual switches C. Virtual PBX D. Virtual desktops

D. Virtual desktops

Jeff, a network technician, is concerned about the environmental effects of power consumption and heat from network resources. Limited space is also a concern. Which of the following technologies should be implemented? A. Circuit switching B. Network address translation C. Power over Ethernet D. Virtual servers

D. Virtual servers

Users have reported slow access times when retrieving information from a server on the company's network. Which of the following tools would provide access time information on each segment of the network to reach the server? A. arp B. route C. ipconfig D. tracert

D. tracert


Conjuntos de estudio relacionados

Breeds of Companion Animals: Dogs - Herding Dogs Student NotesHerding Dogs

View Set

Social Psychology Unit 1 (CH 3,4,5)

View Set

Quiz 1 Questions, Quiz 2, Quiz 3, Quiz 4, Quiz 5, Quiz 6, Quiz 7, Quiz 8, Quiz 9, Quiz 10, Quiz 11, Quiz 12, Quiz 13, Virology - Exam 1, Virology - Exam 2, Virology Exam 3, Virology Final

View Set

Unit 5: Using Statistics in the Social Sciences

View Set

Lesson 3 China , japan and the Koreas / Chapter 34

View Set