ITExams Pt3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following would be used when connecting devices that have different physical characteristics? A. A proxy server B. An industrial control system: C. A load balancer D. A media converter

A media converter

A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information? A. A B. AAAA C. CNAME D. PTR

AAAA

Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic? A. RIP B. EIGRP C. OSPF D. BGP

BGP

Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond? A. Virus B. Botnet C. ARP spoofing D. DDoS

DDoS

Which of the following would be used to forward requests and replies between a DHCP server and client? A. Relay B. Lease C. Scope D. Range

Relay

During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report: Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client? A. Electrical B. Humidity C. Flooding D. Temperature

Temperature

A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified in the SLA.Which of the following would BEST help measure the throughput? A. iPerf B. Ping C. NetFlow D. Netstat

iPerf

A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will the technician MOST likely use to accomplish this task? A. A bridge B. A media converter C. A repeater D. A router

A media converter

An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP? A. AES encryption B. Channel to the highest frequency within the band C. TKIP encryption protocol D. Dynamic selection of the frequency

AES encryption

Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring? A. Jitter B. Bandwidth C. Latency D. Giants

Bandwidth

Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number? A. EIGRP B. BGP C. IPv6 D. MPLS

EIGRP

A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues? A. Perform a site survey. B. Review the AP placement. C. Monitor channel utilization. D. Test cable attenuation.

Monitor channel utilization.

Which of the following is the primary function of the core layer of the three-tiered model? A. Routing B. Repeating C. Bridging D. Switching

Switching

Which of the following would be the MOST cost-effective recovery solution for a company's lower-priority applications? A. Warm site B. Cloud site C. Hot site D. Cold site

Warm site

A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line? A. netstat B. netstat -a C. netstat -e D. netstat -n

-n

Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations? A. 2 B. 4 C. 19 D. 100

19

A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests? A. 10.10.10.10 B. 127.0.0.1 C. 192.168.0.1 D. 255.255.255.0

192.168.0.1

Which of the following would MOST likely utilize PoE? A. A camera B. A printer C. A hub D. A modem

A hub

Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology? A. An increase in network security using encryption and packet encapsulation B. A network expansion caused by an increase in the number of branch locations to the headquarters C. A mandatory requirement to increase the deployment of an SDWAN network D. An improvement in network efficiency by increasing the useful packet payload

A network expansion caused by an increase in the number of branch locations to the headquarters

A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not.Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device? A. MAC table B. Neighbor Discovery Protocol C. ARP table D. IPConfig E. ACL table

ARP table

Which of the following provides guidance to an employee about restricting non-business access to the companyג€™s videoconferencing solution? A. Acceptable use policy B. Data loss prevention C. Remote access policy D. Standard operating procedure

Acceptable use policy

A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ? A. Active-active B. Warm C. Cold D. Cloud

Active-active

A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue? A. Adjust the proper logging level on the new firewall. B. Tune the filter for logging the severity level on the syslog server. C. Activate NetFlow traffic between the syslog server and the firewall. D. Restart the SNMP service running on the syslog server.

Adjust the proper logging level on the new firewall.

A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceroute from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings? A. Asymmetric routing B. A routing loop C. A switch loop D. An incorrect gateway

An incorrect gateway

A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal? A. Captive portal B. Geofencing C. Wireless client isolation D. Role-based access

Captive portal

A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the companyג€™s network hardware.The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.The following settings are common to all network configurations: Which of the following actions would MOST likely reduce this issue? (Choose two.) A. Change to WPA encryption. B. Change the DNS server to 10.1.10.1. C. Change the default gateway to 10.0.0.1. D. Change the DHCP scope end to 10.1.10.250. E. Disable AP isolation. F. Change the subnet mask to 255.255.255.192. G. Reduce the DHCP lease time to four hours.

Change the DHCP scope end to 10.1.10.250., Reduce the DHCP lease time to four hours.

A network administrator is reviewing the network device logs on a syslog server. The messages are normal, but the time stamps on the messages are incorrect.Which of the following actions should the administrator take to ensure the log message time stamps are correct? A. Change the NTP settings on the network device. B. Change the time on the syslog server. C. Update the network device firmware. D. Adjust the timeout settings on the syslog server. E. Adjust the SSH settings on the network device.

Change the NTP settings on the network device.

Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols? A. Client-to-site VPN B. Clientless VPN C. RDP D. Site-to-site VPN E. SSH

Client-to-site VPN

A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application? A. Clientless VPN B. Virtual desktop C. Virtual network computing D. mGRE tunnel

Clientless VPN

Which of the following is used to provide disaster recovery capabilities to spin up all critical devices using internet resources? A. Cloud site B. Hot site C. Cold site D. Warm site

Cloud site

A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate? A. Configuring DHCP snooping on the switch B. Preventing broadcast messages leaving the client network C. Blocking ports 67/68 on the client network D. Enabling port security on access ports

Configuring DHCP snooping on the switch

A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing anAPIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing? A. DHCP exhaustion B. A rogue DHCP server C. A DNS server outage D. An incorrect subnet mask

DHCP exhaustion

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure? A. Incorrect VLAN B. DNS failure C. DHCP scope exhaustion D. Incorrect gateway

DHCP scope exhaustion

A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network? A. Ensure all guests sign an NDA. B. Disable unneeded switchports in the area. C. Lower the radio strength to reduce Wi-Fi coverage in the waiting area. D. Enable MAC filtering to block unknown hardware addresses.

Disable unneeded switchports in the area.

A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Choose two.) A. Data loss prevention policy B. BYOD policy C. Acceptable use policy D. Non-disclosure agreement E. Disaster recovery plan F. Physical network diagram

Disaster recovery plan, Physical network diagram

A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used? A. Divide-and-conquer B. Top-to-bottom C. Bottom-to-top D. Determine if anything changed

Divide-and-conquer

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads? A. Elastic computing B. Scalable networking C. Hybrid deployment D. Multitenant hosting

Elastic computing

An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF? A. Temperature B. Humidity C. Smoke D. Electrical

Electrical

A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information.Which of the following actions should the network technician take to prevent data loss? A. Disable the user account. B. Lock the phone. C. Turn off the service. D. Execute remote wipe.

Execute remote wipe.

The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down? A. Redundant power supplies B. Uninterruptible power supply C. Generator D. Power distribution unit

Generator

Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns? A. Changing the VLAN of the web server B. Changing the server's IP address C. Implementing an ACL D. Installing a rule on the firewall connected to the web server

Implementing an ACL

A technician discovered that some information on the local database server was changed during a file transfer to a remote server. Which of the following should concern the technician the MOST? A. Confidentiality B. Integrity C. DDoS D. On-path attack

Integrity

A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause? A. The configuration of the encryption protocol B. Interference from other devices C. Insufficient bandwidth capacity D. Duplicate SSIDs

Interference from other devices

A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected? A. Isolating the guest network B. Securing SNMP C. MAC filtering D. Disabling unneeded switchports

Isolating the guest network

A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal? A. Link aggregation B. Jumbo frames C. Port security D. Flow control E. Lower FTP port

Jumbo frames

A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue? A. Flow control B. Jumbo frames C. Duplex D. Port mirroring

Jumbo frames

Which of the following can have multiple VLAN interfaces? A. Hub B. Layer 3 switch C. Bridge D. Load balancer

Layer 3 switch

Which of the following network devices can perform routing between VLANs? A. Layer 2 switch B. Layer 3 switch C. Load balancer D. Bridge

Layer 3 switch

Which of the following devices have the capability to allow communication between two different subnetworks? (Choose two.) A. IDS B. Access point C. Layer 2 switch D. Layer 3 switch E. Router F. Media converter

Layer 3 switch, Router

At which of the following OSI model layers does an IMAP client run? A. Layer 2 B. Layer 4 C. Layer 6 D. Layer 7

Layer 7

A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue? A. MTTR B. MOU C. NDA D. SLA

MOU

A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric? A. MTBF B. MTTR C. RPO D. RTO

MTBF

Which of the following topologies requires the MOST connections when designing a network? A. Mesh B. Star C. Bus D. Ring

Mesh

Which of the following BEST describes hosting several businesses on the same physical infrastructure? A. Hybrid B. Elasticity C. IaaS D. Multitenancy

Multitenancy

Which of the following can be used to decrease latency during periods of high utilization of a firewall? A. Hot site B. NIC teaming C. HA pair D. VRRP

NIC teaming

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data? A. Syslog server messages B. MIB of the attacked firewall C. Network baseline reports D. NetFlow aggregate data

NetFlow aggregate data

A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data? A. Packet capture B. iPerf C. NetFlow analyzer D. Internet speed test

NetFlow analyzer

A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution? A. Out-of-band access B. Split-tunnel connections C. Virtual network computing D. Remote desktop gateways

Out-of-band access

Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling? A. RJ11 B. LC ports C. Patch panel D. F-type connector

Patch panel

To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the following can be configured to fulfill this requirement? A. QoS traffic classification B. Port mirroring C. Flow control D. Link Aggregation Control Protocol

Port mirroring

A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the following is MOST likely the cause of the issue? A. Port security B. Port tagging C. Port aggregation D. Port mirroring

Port security

Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem? A. F-type B. RJ45 C. LC D. RJ11

RJ11

A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue? A. Enable IGMP snooping on the switches. B. Implement another DHCP server. C. Reconfigure port tagging for the video traffic. D. Change the SSID of the APs.

Reconfigure port tagging for the video traffic.

During a risk assessment, which of the following should be considered when planning to mitigate high CPU utilization of a firewall? A. Recovery time objective B. Uninterruptible power supply C. NIC teaming D. Load balancing

Recovery time objective

An international company is transferring its IT assets, including a number of WAPs, from the United States to an office in Europe for deployment. Which of the following considerations should the company research before implementing the wireless hardware? A. WPA2 cipher B. Regulatory impacts C. CDMA configuration D. 802.11 standards

Regulatory impacts

A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements? A. FTP B. TFTP C. SMTP D. SFTP

SFTP

A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access? A. SSO B. LDAP C. EAP D. TACACS+

SSO

A technician is consolidating a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration? A. Seamless roaming B. Basic service set C. WPA D. MU-MIMO

Seamless roaming

After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information? A. SNMP OID values B. NetFlow data export C. Network baseline configurations D. Security information and event management

Security information and event management

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use? A. Network access control B. Least privilege C. Multifactor authentication D. Separation of duties

Separation of duties

An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ? A. Spanning Tree Protocol B. Open Shortest Path First C. Port mirroring D. An interior gateway protocol

Spanning Tree Protocol

A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation? A. Latency B. Jitter C. Speed D. Bandwidth

Speed

A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch: Which of the following is a cause of the issue on port 1/3? A. Speed B. Duplex C. Errors D. VLAN

Speed

Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs? A. Split tunnel B. Full tunnel C. Site-to-site tunnel D. Virtual desktop

Split tunnel

Which of the following is a benefit of the spine-and-leaf network topology? A. Increased network security B. Stable network latency C. Simplified network management D. Eliminated need for inter-VLAN routing

Stable network latency

A network administrator needs to configure a server to use the most accurate NTP reference available. Which of the following NTP devices should the administrator select? A. Stratum 1 B. Stratum 2 C. Stratum 3 D. Stratum 4

Stratum 1

After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes.Which of the following would be BEST to use for these notifications? A. Traps B. MIB C. NetFlow D. Syslog

Syslog

An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating? A. Management information bases B. System baseline C. Network device logs D. SNMP traps

System baseline

Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.) A. TIA-568-A - TIA-568-B B. TIA-568-B - TIA-568-B C. RJ11 D. RJ45 E. F-type

TIA

A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.Which of the following is the MOST likely cause for the failure? A. The network engineer is using the wrong protocol. B. The network engineer does not have permission to configure the device. C. SNMP has been secured with an ACL. D. The switchport the engineer is trying to configure is down.

The network engineer is using the wrong protocol.

Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.) A. They used the wrong type of fiber transceiver. B. Incorrect TX/RX polarity exists on the link. C. The connection has duplexing configuration issues. D. Halogen light fixtures are causing interference. E. One of the technicians installed a loopback adapter. F. The RSSI was not strong enough on the link.

They used the wrong type of fiber transceiver., Incorrect TX/RX polarity exists on the link.

Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. SNMP B. Link state C. Syslog D. QoS E. Traffic shaping

Traffic shaping

An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment? A. Uptime B. NetFlow baseline C. SNMP traps D. Interface statistics

Uptime

Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time? A. Using a tone generator and wire map to determine the fault location B. Using a multimeter to locate the fault point C. Using an OTDR in one end of the optic cable to get the fiber length information D. Using a spectrum analyzer and comparing the current wavelength with a working baseline

Using an OTDR in one end of the optic cable to get the fiber length information

A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer? A. Port duplex settings B. Port aggregation C. ARP settings D. VLAN tags E. MDIX settings

VLAN tags

A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform? A. Validate the findings in a top-to-bottom approach. B. Duplicate the issue, if possible. C. Establish a plan of action to resolve the issue. D. Document the findings and actions.

Validate the findings in a top-to-bottom approach.

A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue? A. Verifying if an encryption protocol mismatch exists. B. Verifying if a captive portal is active for the WLAN. C. Verifying the minimum RSSI for operation in the device's documentation. D. Verifying EIRP power settings on the access point.

Verifying if a captive portal is active for the WLAN.

Which of the following devices is used to configure and centrally manage access points installed at different locations? A. Wireless controller B. Load balancer C. Proxy server D. VPN concentrator

Wireless controller

When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does thisBEST represent? A. SSO B. Zero Trust C. VPN D. Role-based access control

Zero Trust

A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use? A. show interface B. show config C. show route D. show arp

show interface


Conjuntos de estudio relacionados

Intro to Business chapter 5 and 6

View Set

States and Change of Matter Unit Review

View Set

Transforming the Global Environment Midterm

View Set

ACCT165 Chapter 3 Review Questions

View Set

FL DCF Child Care Identifying and Reporting Child Abuse and Neglect (CAAN) 2019

View Set