network +

¡Supera tus tareas y exámenes ahora con Quizwiz!

A company runs call center services with 25 agents. Agents report that their softphones have random quality issues. Which performance parameter should be verified in the network?

the maximum of 150 ms of delay

A network technician wants to deploy a new virtual firewall. The firewall has to support three interfaces: G0/0, G0/1, and G0/2. What should the technician configure at the VM level for these interfaces?

vNIC- virtual Network Interface Card

A company needs to have a reliable record of everyone who enters or leaves a locked secure are of the building. What should the company use?

video surveillance

For redundancy purposes, a network engineer installs a new router and enables a load balancer protocol. What type of address should he assign as a default gateway to end devices?

virtual IP

Which is the BEST option for increasing availability of a networks gateway router group?

First Hop Redundancy Protocol- FHRP

An employee wants to install an AP at their desk. Which should they consult FIRST?

AUP

Which statement describes traffic shaping?

Excess traffic is buffered until bandwidth is available.

A company contracts with a cloud provider. The cloud provider is responsible for virtualized hardware, storage, and network support. The company is responsible for installing, licensing, and maintaining the operating system system and server applications. Which type of service does this describe?

(IaaS) Infrastructure as a service

Headquarters requests a new IP subnet. The solution must meet the following requirements: IPv4 class A address type Private IP address At least 15 usable IP addresses within the range. Which subnet would meet the requirements?

10.10.10.128/27

Which is the most cost-effective standard that supports 10Gbps transfers up to distances of 300 meters?

10GBASE-SR (SHORT RANGE)

A client is configured with an IP address, 192.168.1.2/16. Which address will the client use for subnet broadcasts?

192.168.255.255

A company is preparing to deploy a wireless LAN (WLAN) in a newly constructed office space. The network design specifies the minimum channel bandwidth requirement as 80MHz. Which standard should the access points support?

802.11ac

PC1 is unable to access the internet in the network shown in the exhibit. What is the MOST likely cause?

A rogue DHCP server

A company wants to create a site-to-site VPN. Maximum security is required. Which set of protocols should the company use?

AES (advanced encryption standard) for encryption and SHA512 for hashing (secure hash algorithm)

A policy includes the following statement: "Employees are not allowed to use company equipment to copy or distribute copyrighted material without the written permission of the holder of the copyright." Which policy would this statement be part of?

AUP

Where in a network architecture is STP MOST likely to be disabled?

Access layer

Users report that they cannot access any resources on the internet using an FTP client. It is determined that the connections have been denied by the firewall. All hosts from the local subnet of 192.168.1.0/25 should have access. Which ACL rule should the company implement?

An outbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21

What are the implications of allowing inbound port 3389 on a NAT gateway?

Attackers can attempt brute force attacks on user desktops.

Network devices in one area of the office building experience communication problems. A cable tester shows that the signal on the RX pair is lower than expected. What is this an indication of?

Attenuation

Which is considered an exterior routing protocol?

BGP

An organization wants to implement physical controls to mitigate the risk of breaches. Which is the organization MOST likely to use?

Biometrics

What is the logical topology of a network wired with multilayer switches?

Bus

An office is configured with APs as shown in the exhibit. The office was originally configured with AP1 only, but the users farthest from the AP had problems connecting. There were also intermittent problems with bandwidth saturation. After installing AP2, users near the center of the office have trouble connecting and communicating and are experiencing latency problems. What should technicians do to correct the problem?

Change AP2 to channel 6

A junior network engineer receives a new router to configure. Which two configuration tasks should the engineer perform BEFORE he copies a standard configuration template onto the router?

Change the default username and password & update the firmware.

A security engineer installs an SSL certificate and an endpoint security package on a server. The deployment of a dedicated agent on a member server fails with the following error message: Error code: SSL_SEC_ERROR_EXPIRED_CERTIFICATE. License has expired! What should the engineer do first?

Check time settings. NTP- Network Time Protocol

A network technician discovers a router being managed on port 23. What should the technician do FIRST?

Configure SSH (Secure Shell)

Which OSI layer relies on burned-in hardware addresses?

Data Link

A router must forward a packet to a subnet for which it does not have a route. Which route will the router MOST likely utilize?

Default route

A company's network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do?

Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets.

A company's network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do?

Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets.

A company's ecommerce platform frequently crashes due to heavy traffic loads. Which is the BEST option for improving site availability for end users?

Deploy a web server farm and configure active/active load balancing

What type of attack is designed to flood a server with traffic, either crashing the server or making it unavailable?

DoS

A company is designing a wireless LAN deployment. To help secure the network, the company wants to use an authentication protocol option that requires a client certificate on each wireless client. Which authentication protocol option should the company use?

EAP-TLS

A network administrator must configure a wireless controller to allow authentication for devices that do not support EAP. Once configured, client authentication must be automatic. However, unauthorized users should not be able to access network resources. Which of the following actions should the administrator take?

Enable PSK authentication on the controller

Users report that they have lost access to a network shared drive. They open a new help ticket and expect a quick resolution to the problem. What should a technician do next?

Gather more information from users

A company recently implemented a bring your own device (BYOD) policy and is adding security controls over personal devices. The company wants to ensure that some managed apps and most company data will be unavailable when a device leaves the corporate campus. What should the company use to implement this?

Geofencing

Which two items would be specified as part of an SLA?

Help desk response time, availability and uptime, application response time, performance benchmarks

A network administrator is concerned about ESD in a data center. Which monitor will the administrator MOST likely deploy to validate this concern?

Humidity

Which mechanism monitors and manages virtual machine instances?

Hypervisor

PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem?

IP helper address on router 1

A company has configured some services and applications using a PaaS platform. The network team wants to create a secure connection from an onsite router to the new platform. Which of the following would be the BEST protocol to implement?

IPsec

At what point in a troubleshooting methodology is it appropriate to escalate a problem?

If it is determined that preventive measures are appropriate & if the problem results in downtime

During a DDoS attack, a technician is unable to access a critical router. What should the technician do to prevent this issue in the future?

Implement out-of-band management

Which network device uses ASICs to handle the packet switching for inter-VLAN communication?

L3 switch

The connection between an access and distribution is over utilized. Which should a network engineer use to increase bandwidth between the switches?

LACP

In a two tier datacenter network, servers are connected to which type of switch?

Leaf

Which device would be used to distribute user requests across all servers in a farm?

Load Balancer

A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device. Continuity plans will depend on how frequent the device is likely to fail. Which value should be used to determine this?

MTBF

What device should the company use to connect to the MAN?

Media converter

An office area is prewired with Cat 5e cable. Technicians need to test cable continuity. Cable terminates at a 110 block in a secure server room. RJ-45 jacks are installed at the device end of each cable. One technician will go from jack to jack with a loopback plug. What should the technician working in the server room use?

Multimeter

An organization plans a new 802.11 deployment. The organization wants to maximize performance by allowing simultaneous communication streams between clients and WAPs. Which should the organization deploy?

Multiple Input, Multiple Output (MU-MIMO)

Maintains its own file system, and data access is through remote file system I/Q.

NAS

Which layer of the OSI model do routers operate at?

Network

Which of the following is a limitation of vSwitch technology?

Network traffic cannot flow between vSwitches on the same host.

Which routing protocol requires each node to build a complete network map?

OSPF- Open Shortest Path First

A technician determines there is a break in the fiber optic cable routed between two buildings. The technician needs to determine the distance to the break. What should the technician use?

OTDR- optical time-domain reflectometer

A company is charging its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update?

Physical network diagram & Logicalnetwork diagram

A network engineer is concerned about the security of sensitive east-west traffic flows. Which is the BEST option for addressing this concern?

Place firewalls between datacenter network segments.

An organization plans to deploy WAPs in all offices. Due to cost constraints, some mounting locations will only be reachable using CAT 6a cabling. Which of the following should the organization also plan to deploy to ensure that WAPs function properly?

PoE+

Which is the BEST tool or technology for ensuring the performance of Voice over IP (VoIP) applications?

QoS

Threat of flooding causes a company to move large vertical filing cabinets from the basement to the main office area. Users start complaining of problems connecting to the WLAN and delayed response from the network. Network analysis shows a high level of corrupted packets. What is the most likely cause?

Reflection

Users report that messages about duplicate IP addresses keep displaying on their computers. What should technicians suspect as a cause?

Rogue DHCP server

Following updates to A records, a client is no longer able to connect a web server. What should be done FIRST?

Run ipconfig /flushdns on the client.

Emulates directly attached storage for servers accessing storage.

SAN

Preferred solution when extreme high-speed data transfer is required.

SAN

Structured as a dedicated network consisting of multiple storage devices.

SAN

Which technology will an organization MOST likely deploy to manage industrial machinery?

SCADA

What is used with multimode fiber?

SFP- Small form-factor pluggable

A company must implement additional monitoring and analysis to meet compliance requirements related to work done for new costumers. The company needs a solution that can collect log, event, and other security information from a variety of sources and correlate and analyze threats. It should provide for long-term storage of the data collected and be able to identify trending threats. What type of device solution should the company use?

SIEM

Which DNS resource record type is used to identify and locate web servers in a network?

SRV- resource record

A company is expanding its office space. The current space is configured as a wired network. The new space will be set up as a wireless network. The company needs to identify potential sources of interference in the network office space. What should the company use?

Spectrum Analyzer

A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and managements throughout the company. What should the company use to help endure this?

Standard operating procedure (SOP)

A company wants to implement an authentication and authorization solution for network devices that also directly supports device management. What should the company use?

TACACS+ Terminal Access Controller Access- Control System Plus

A user reports their laptop cannot connect to the network. Which action is a network technician MOST likely to perform after establishing a theory of probable cause?

Test connectivity to a remote server with ping

A company deploys six new computers that are configured for automatic address assignment to the 192.168.4.0/26 subnet. The DHCP server that hosts the scope for the subnet is deployed on the same subnet. Four of the new computers are able to lease valid IP addresses. The remaining two computers have the following addresses: 169.254.12.7 169.254.14.2 What is most likely wrong?

The DHCP scope is exhausted.

An ISP has suffered several unscheduled outages every day for a week. What is the MOST likely result of this activity?

The SLA will be violated

Which mechanism is used by TCP to set up and synchronize a new TCP/IP connection?

Three-way handshake

A network engineer has installed three gigabit switches. The switches will provide access to NAS devices for end users. What should the engineer configure to avoid a bottleneck in the network with big file transfers?

Trunks with port aggregation

A company wants to open a new office. A wireless site survey reveals that there are 12 access points in the area immediately around the office and they use channels 1, 6, and 11. What should the company do to address the interference problem?

Use the 5 GHz band.

An organization plans to contract with a cloud service provider (CSP) for a disaster recovery site that will host backup critical system hardware. When the primary datacenter fails, data will be restored, and the secondary site will be activated. Costs must be minimized. Which type of disaster recovery site should the organization deploy?

Warm Site

A network administrator has captured the following messages on the firewall: 10.10.10.10.64391>188.12.1.1:80 188.12.1.1:80>10.10.10.10:64391 10.10.10.10:64392>83.122.1.1:80 Which application has generated that traffic?

Web browser

A copmany is sertting up the wireless LAN (WLAN) shown in the answer area. The company must determine which antennas to use. The risk of intercepting the signal between the buildings must be minimized. Full coverage must be provided inside of each building. Which antennas should the company use?

access points should use 5 dBi omnidirectional antennas and 14 dBi both right facing bridge A left facing bridge B

A company has a Dynamic Host Configuration Protocol (DHCP) server with all of the subnet addresses specified as an IP address scope. The company deploys a new physical server as a database server in the 192.168.4.0/24 subnet. Applications that use the database server require the server to always have the same IP address. Company policy forbids the use of static addressing. What should the company do to set the addressing for the database server?

configure an IP address reservation

A network engineer must ensure communications between an organization's branch offices and main HQ cannot be eavesdropped on. What should the engineer do?

configure site-to-site VPN between locations

An email server responds to a clients EHILO as shown below. what should be done to enhance the systems security?

enable transport encryption on port 587

Which of the following is an example of valid multifactor authentication factors?

facial recognition and PIN

A network technician troubleshoots connectivity to a server. The technician needs to determine if a connection from a client is active as well as the port being used for the connection. Which tool should the technician use?

netstat

A network engineer is troubleshooting a network performance issue. Which tool can the engineer use to view packet headers and content in ASCII or hex?

tcpdump

The network support team needs to determine whether data is being encrypted when it is sent over the network. Which process should the team use?

packet analysis

The host shown in the exhibit is unable to communicate with other network hosts. This is a recent problem. Each subnet has a subnet mask of 255.255.255.0. The technical team needs to determine whether the TCP/IP protocol stack loaded and whether the computer's NIC is working. Which command should they run?

ping 127.0.0.1

the host shown in the exhibit is unable to communicate with other network hosts. This is a recent problem. Each subnet has a subnet of 255.255.2550. The technical team needs to determine whether the TCP/IP protocol stack loaded and whether the computers NIC is working. which command should they run?

ping 127.0.0.1 - this is the IPv4 loopback address, which is used to test TCP/IP stack and NIC without sending traffic out to the network

Part of a company's network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All clients computers currently have valid IP addresses. Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem. What is the most likely cause?

port 53 is blocked on the 192.168.1.1 interface


Conjuntos de estudio relacionados

Chapter 15 - Integumentary Problems

View Set

chapter 15 assessing head and neck

View Set

Supply Chain Test #1 (Ch. 1,2,4,5,14)

View Set

Bio II Exam 1 Study tool questions

View Set