final net

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A technician has gathered information on a network issue, and has determined the affected area. Which of the following would be the next step in resolving this issue?

The technician should check to see if there have been any recent changes to this area of the network

Which of the following DNS record types are used to support IPv6 address resolution queries?

AAAA

The connector type used to connect a serial cable to a computer is the ______ ?

DB-9

You are working on a plan to upgrade your company's WLAN design. You would like to move from 802.11n to 802.11ac as the company's new WLAN protocol standard.What unique benefits would your company achieve if you implement 802.11ac? Select all that apply.

Provides support for HD video streaming to multiple devices Supports speeds from 290 to 1300 Mbps within 80 MHz Backward and forward compatible with 802.11n devices

A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that is capable of transmitting at 1Gbps. Which of the following would be the best way to connect these two buildings?

Fiber optic cable

What is the first task performed by a router when routing an incoming packet?

Find the most precise matching prefix in the routing table

vWhich of the following statements are true regarding hubs? (Select all that apply.)

Hubs have no ability to improve network performance. Hubs forward broadcast traffic by default.

Which of the following protocols is used by the ping command?

ICMP

Which of the following is not a valid DNS record type?

IDS

You are troubleshooting a client's Linux workstation. You need to determine if the network interface is active or inactive.Which of the following tools would best allow you to determine the state of the client's workstation?

IFCONFIG

Which of the following values must be included in a DHCP lease?

IP address, Subnet mask, Default gateway

You need to create a VPN. You have chosen L2TP to create the tunnel. Which protocol would provide you with the best data encryption solution?

IPSec

SNMP is the Internet-based protocol used to manage devices on IP networks. Which version provides the greatest level of security?

SNMPv3

Which of the following values, measured at the user device, is used to compare the level of the Wi-Fi signal to the level of background noise?

SNR

Which of the following WAN technologies uses dense wavelength division multiplexing (DWDM)?

SONET

When implementing a WAP, which of the following can be disabled to help prevent unauthorized people from locating the network?

SSID

Which one of the following cloud service models would allow a consumer to exercise the least amount of control over the cloud infrastructure components?

SaaS

______________ is a technology used to connect networks over large distances without the use of physical medium.

Satellite communication

When configuring a wireless access point, which of the following principals should be used to select a channel to operate on?

Select the channel with the frequency range least used in the given area

The feature which allows remote computers to connect to a specific computer within a private LAN is known as:

Port forwarding

Which of the following layers of the OSI Model is above the Session layer?

Presentation

A technician has just finished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do next?

Test the solution

When would a network technician be most likely to configure the wireless devices connecting to a network to use WPA2-PSK?

To set up a secure wireless network without an enterprise authentication server

Why would a network designer incorporate a Faraday Cage into his network design?

To shield devices from electro-magnetic fields

____________ is a technique used to extend existing VLANs into a new or existing switch.

Trunking

Which of the following protocols is used to support WAN communications but never uses a physical cable as a communications medium?

WiMAX

Which two commands, of those shown below, could be used by a network technician to troubleshoot FQDN-to-IP-address resolution on computers running a Linux operating system?

dig nslookup

Netstat is a command line tools used to:

display listening sockets and established connections on the local computer

When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which of the following network devices is the laptop plugged into?

hub

You need to create a storage area network capable of transmitting data at 10GB per second speeds. At the same time, you have a very limited budget. Which of the solutions shown below would best allow you to create the storage area network at the lowest possible cost?

iSCSI

You need to set up a new storage area network. Your company recently upgraded all switches to 10G Ethernet.Which of the storage standards shown below would be best supported on your network?

iSCSI

You are troubleshooting a client's computer on your local network. You need to find the IP address assigned to this system. Which of the following tools could you use to best obtain the information you need?

ipconfig

Which of the following commands would allow the technician to identify the currently assigned DNS server for any computer on the network?

nslookup

Grace has received several trouble tickets for users who report that they cannot access an Intranet site. She needs to know if all clients are attempting to take the same path to the remote server. Which of the commands shown below should Grace use to gather this information?

pathping

An email sent to users with web links that direct them to malicious websites is an example of what type of attack?

phishing

When using the ping utility, which switch pings a network device until stopped?

ping -t

Which of the following options can be set or configured using a DHCP server?

preferred DNS server addresses TFTP server addresses

Which of the following services do TCP connections provide to application layer protocols that UDP does not?

reliable message transport is ensured using an error recovery scheme

VLAN hopping is a method of attacking a network by:

sending packets to a port that is not normally accessible from a given end system.

The greatest difference between an IDS and an IPS is that:

the IPS blocks malicious activity while the IDS only alerts about malicious activity.

Which of the following statements is true regarding the pin-outs on a straight-through cable?

the pin-outs must be the same on both ends of a cable

When would you use a crimping tool?

to attach an RJ-45 connector to a UTP cable

When would a technician use the route print command?

to display a PC's current IP routing table

Under what circumstances would a network technician use the NBTSTAT command?

to manage and troubleshoot the NetBIOS cache located on a computer running the Windows operating system

When would you use a punch down tool?

to reconnect wires to the termination block

Which of the following utilities will produce the results displayed below? Tracing route to 172.30.9.78 over a maximum of 30 hops 1 2ms 1ms 2ms 172.30.0.78 Trace complete

tracert

A content filter uses __________________________ to determine where on the network a data packet or request should be forwarded.

up-to-date signature files

After adding a new cable segment to the network, what is the next action that the technician should take?

update the wiring schematics

Which of the following is an invalid MAC address?

00:1F:3Z:5D:9E:95

Which of the following pairs should be crossed to create a crossover cable?

1,2 and 3,6

An administrator needs to create a subnet that will accommodate between 4,000-6,000 hosts on the same subnet. Which of the following network addresses would the administrator use to accommodate this request? (Hint: pay attention to the "slash" notation.)

10.10.1.0/19

Which of the following IPv4 address pairs would be able to share files on a network using a hub?

10.254.2.220/16 and 10.254.2.222/16

Which of the following is the maximum cable length in a 100Base-T network?

100 meters or 328 feet

Which of the following cable standard has the highest effective range at a greater distance?

1000Base-LX

Which of the following LAN types would utilize CAT5 UTP?

100Base-TX

Which of the following cable designations indicates a cable group or type that transmits data at a maximum rate of 100Mbps per direction? (Select two)

100Base-TX 100Base-T

Which of the following technologies is best suited for a point-to-point circuit that is 6 kilometers (3.7 miles) in distance?

10GBase-LR

Which of the following 10-Gigabit Ethernet transmission types is the least expensive to install?

10GBase-T

Which of the following is the length of a MAC address?

12 hexadecimal characters

Which of the following is the number of bits used for IPv6?

128

Which of the following is the standard data transmission rate for an OC-3 line?

155.52Mbps

Which of the following would be an IP address received from APIPA?

169.254.0.100

Automatic private internet protocol addressing (APIPA) assigns IP addresses from which of the following ranges?

169.254.x.x

Which of the following is a routable public class A address?

19.16.18.1

A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0/24 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed?

192.168.0.0/22

A network administrator is configuring a server to provide file sharing for offices across the company. Which of the following addresses would be acceptable to set on a device?

192.168.0.25

A new segment needs to be added to a network to provide access for 64 servers. Which of the following subnets will provide the needed access and still conserve IP addresses?

192.168.1.0/25

Convert the following binary string to its dotted decimal address:11000000.10101000.01100111.00010100

192.168.103.20

You have been asked to allocate IP address space to accommodate a staff of seven sales people, two administrative support staff members, and one manager. You allocate the 192.168.5.48/28 subnet.Based on these facts, identify the last usable IP address in the subnet allocation.

192.168.5.62

Which of the following is the maximum segment distance of a 100Base-FX network?

2,000 meters or 6,561 feet

A network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classless interdomain routing notation (CIDR) as which of the following?

220.100.100.100/24

In a Class A subnet, a host ID may occupy a maximum of:

24 bits

Which of the following ports is not used with a connectionless protocol?

25

A technician is setting up a public server for their company. The IP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?

255.0.0.0

Which of the following subnet masks indicate a subnet with fewer than 2 available IP network addresses?

255.0.0.0

Which of the following subnet masks would allow two hosts on the same subnet to use the IP addresses 172.16.11.1 and 172.16.12.1?

255.255.240.0

Feedback A network technician is responsible for setting up four branch offices for a company. Each office will have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnet masks should be chosen?

255.255.255.224

Which of the following subnet masks will produce the smallest subnet size for a point-to-point network link?

255.255.255.252

Two clients are directly connected via RJ-45 and CAT5e cables and communicate using IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response?

3 and 6

An IPv4 address is made up of four octets. How many bits are contained in each octet?

8

MIMO is a key feature in the __________ standard.

802.11n

Which protocol is required to support VLAN trunking?

802.1q

_________ allows for multiple logical subnets to coexist on a single physical switch.

A VLAN

What is an MDF?

A cable rack that interconnects and manages the telecommunications wiring between itself and any number of intermediate locations

Users at a branch office have informed a technician that access to static web content is slow from their location. It is determined that most users are visiting the same site repeatedly throughout the day. Which of the following would improve WAN utilization?

A caching proxy server at the branch

A network technician discovers that the phone company has installed the smart jack in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room. Which of the following should be requested?

A demarc extension

Which statement below best describes a rollback plan?

A document that would be used to restore a system to its original condition in the event that an upgrade failed.

What is packet filtering?

A feature commonly found on firewalls that looks at the source IP and destination IP for each incoming packet then routes each packet accordingly

Which of the following is not an example of social engineering?

A malicious command is intentionally typed into a web-based form that causes large amounts of data to be deleted.

Which of the following statements best describes a Mesh network?

A network containing six switches where each switch is physically linked to all other switches

What is a port scan?

A port scan is a method for determining which ports on a network device are open.

Which of the following would limit the availability of the types of sites that users on a LAN have access to?

A proxy server

__________________ is used to forward traffic between hosts with two different network addresses.

A router

You have just added a new subnet to your company's network. You want to secure the subnet and the resources on that subnet by defining:* Which users are permitted to read, edit or create files on a newly added file server* Which network technicians have the ability to modify port settings on a new switch* What traffic is allowed to pass through a new network firewallWhich feature, of those shown below, would best allow you to accomplish all three tasks?

ACLs

What purpose does an ACL serve?

ACLs control access to resources by defining the permission assigned to specific users or groups of users.

If static addressing is not configured and the DHCP server for a network is unavailable, which of the following will a PC use to configure its IP address?

APIPA

Which protocol or service will a computer failover to if a DHCP server cannot be found?

APIPA

Name the type of attack in which a malicious actor sends falsified Address Resolution Protocol messages over a local area network for the purpose of linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

ARP Poisoning

A(n) ______ is a document stipulating constraints and practices that a user must agree to before they can be granted access to a corporate network or the Internet.

Acceptable Use Policy

Which of the following physical security devices is an example of a preventative security device?

Access badge

Which of the following defines the main purpose of dynamic routing?

Adapts quickly to network changes without manual entries

You send a message from your computer to a broadcast address. Who will receive that message?

All computers on the subnet

A network technician is troubleshooting a network issue that has just been reported. Which of the following troubleshooting steps should the technician take first to help resolve this issue?

Ask the user who reported the issue to explain the symptoms in detail

Man-in-the-middle attacks can be successfully blocked by the appropriate use of ____________ methods.

Authentication

Which of the following is not a type of interior gateway protocol (IGP)?

BGP

Which of the following routing protocols would a technician use if they needed to connect multiple large networks together where routers advertise all routes to each other?

BGP

Data messages that are exchanged across the switches within an extended LAN that uses a spanning tree protocol topology are known as _____________ .

BPDUs

Which ISDN circuit contains two 64Kbps B channels and one 16Kbps D channel?

BRI

A policy that defines what type of electronic items an employee can use at work, the standards that those items must meet, and the level of support that the employee can expect when using the items at work is known as a _______ .

BYOD

In what way does Point-to-Point Tunneling Protocol supply data encryption for clients communicating over a VPN?

By using a shared-secret key

221.17.101.223/28 is an example of which kind of notation?

CIDR

_____ and ___ are two examples of DNS record types.

CNAME; A

Which of the following Ethernet protocols is designed to avoid signal collisions?

CSMA/CA

Which of the following Ethernet protocols is designed to recover from signal collisions rather than avoid them?

CSMA/CD

You have hired a networking design and implementation firm to install the cabling for your company's local area network. Before the technicians leave your site, you want to receive a written report demonstrating that the network was installed correctly that all cables are capable of supporting a connection.Which of the following tools would the technician be most likely to use to provide you with the guarantee you need?

Cable certifier

Which of the following would be used before a technician crimps a connector to a UTP/STP cable?

Cable stripper

Which of the following standards was proposed to support 10-Gigabit Ethernet over copper data transmission?

Cat 6a

You have recently been hired as the network manager for a company named HomeCare. You are trying to correct a connectivity problem for the sales department, but you find that the switch is not configured as described in the network diagram. After further investigation, you find that the document was last reviewed in 2015 while the new switch was installed earlier this year by your predecessor. What process did the previous network administrator forget when installing the new switch?

Change management

Two networks in different offices have been using DHCP scopes that were set up to support a network ID of 192.168.0.0/24. Last week, the offices were consolidated and all clients placed on a single network. Now, the office is running out of IP addresses to assign to clients. Which of the following actions would allow you to solve the problem most efficiently?

Change the subnet mask to 255.255.254.0.

You have installed four802.11g access points with speeds of 54Mbps on your wireless network. Now you want to increase the bandwidth up to108Mbps. Which feature could you enable on these access points to achieve the required bandwidth?

Channel bonding

Your office hosts many company sales meetings and client training events. During these sessions, the wireless network inside the conference room becomes saturated with client requests. You examine the problem and find that most of the client requests are coming from smart phones and laptops. You need to improve the wireless network's performance. Which feature should you enable to achieve this requirement?

Channel bonding

Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors?

Channel overlap

A network technician is installing a series of three access points to cover the entire wing of a building. Each access point has a wired connection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?

Channels 1-6-11

The IP address, 68.142.0.119, is an example of which address class?

Class A

The IP address, 224.142.73.14, is an example of which address class?

Class D

A network with multiple devices needs to have a smaller broadcast domain while working with a small budget. Which of the following is the best solution?

Create VLANs

You just repaired a failed server and have added it back to the network.What action should you take next to obtain a picture of the server's performance now that it is repaired and back online?

Create a baseline report of the repaired server.

Jan just purchased a new computer. After reading the system setup instructions, she connects to the manufacturer's web site and downloads a backup copy of the OEM software.What should Jan do next to make sure that the backup software has not been compromised during the download process?

Compare file hashing values

Your company has just implemented an Acceptable Use Policy that defines how company computers may be used to access various web sites. If a user tries to access a web site that does not comply with the acceptable use standards, you want that user to be denied access to the site and to receive a pop-up message explaining why the site is blocked. What type of device could you add to the network that would allow you to accomplish this goal?

Content filter

You have been asked to justify the planned addition of a proxy server to your company's network. From the list below, select two benefits or features commonly supported by a proxy server. (Choose two).

Content filtering Website caching

When all routers in a network agree about the path from one point to another, the network is said to be which of the following?

Converged

Users at a remote office connected to headquarters are using a dynamic routing protocol. There are several paths to headquarters in the event of a route failure. The network technician has noticed that when a failure occurs, there is a time lag of several minutes until service is restored. Which of the following describes the time lag?

Convergence

Which of the following is the metric used for OSPF?

Cost

You are in the process of setting up a network for a small office with only three users. The network design includes plans to create a DNS server. However, it may be two or three weeks before you can build that server. In the meantime, the users need the ability to access specific services using their fully qualified domain names. Which action, of those listed below, would best allow you to provide a temporary solution for the office staff?

Create a local host file on the three computers used by the office staff

Tom wants to update his company's systems with the most recently released vendor service packs. At the same time, he wants to be sure deploying these service packs will not cause any problems for the users to depend on server-based applications.What should Tom do to protect both the company servers and users?

Create a test lab and run all updates in that environment first.

You are creating a distribution server so that branch offices can receive software updates from your company's programmers. Recently, a branch office downloaded an update and found that the file contained a new virus. Although you were able to contain and clean the infection, you must find a way to ensure that future updates are verified as "clean" before they are installed on branch computers.Which of the solutions shown below would best help you to accomplish that task?

Create an MD5 hash for each file and make that information easily available to branch IT personnel

After a power outage, several switches lose their current configuration, but the core router is still working properly. The switches affected are not able to connect to the network. After further investigation, the network administrator is able to identify the affected areas, establish the cause, and determines that escalation is not required. Which of the following would be the next step that the network administrator should perform?

Create an action plan and solution

A technician is creating a patch cable to connect two PCs for file sharing. Which of the following cables should the technician use?

Crossover

Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used?

Crossover

Which of the following issues is not an issue commonly found on wireless networks?

Crosstalk

____________________ is a problem that can occur from bundling network cables together too tightly.

Crosstalk

Some users are unable to access the network. A technician determines that the computers that were unable to access the network have an IP address of 169.254.0.1. Which of the following network services should the technician check?

DHCP

The ___ protocol is used to dynamically assign IP addresses to network devices.

DHCP

Which of the following network segments is located outside the firewall?

DMZ

Which of the following standards is used to support data transmissions over a cable TV infrastructure using coaxial cable?

DOCSIS

VLANs are implements at the _________ layer of the OSI model.

Data Link

A computer named Client1 is assigned an IP address with a lease period of 21 days. At which point in time would Client1 contact the DHCP server with its first request to renew the IP address lease?

Day 11

The ISPs responsibility for an Internet connection ends at the _______ .

Demarc

You have been asked to troubleshoot a failing server. You examine the server and have identified the symptoms. Which of the following steps should you take next?

Determine the scope of the problem

Rob receives a call from a user who says that he cannot connect to any local resources, such as printers or file servers, but he can connect to the Internet. In order to resolve this problem for the user, Rob decides to look at the configuration settings configured for the switch port to which the user's computer is attached. Rob finds nothing wrong on that switch. Rob then connects to the root switch and sees the following message: *Mar 1 06:45:26.232: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on FastEthernet0/1 (2), with S2 FastEthernet0/1 (99). What is the next action must Rob take to resolve the user's problem?

Determine which device is incorrectly configured

Which of the following backup techniques is used to capture all the data that has changed since the last full backup?

Differential

You have just resolved a problem on your company's network using a standard 7 step troubleshooting procedure. After the problem is completely resolved, what is the final step that you must take to close out the issue?

Document the entire process

What type of IP addressing requires the least amount of administrative effort to update devices on the network?

Dynamic

Which of the following is the difference between static and dynamic routing?

Dynamic routes are added automatically

Which of the following network components does not operate on Layer 2 of the OSI Model?

Hub

Which of the protocols, listed below, would you be most likely to use in order to send data between two autonomous systems?

EGP

You manage a network that uses spanning tree protocol. You need to keep the network secure by ensuring that an attacker could not inject false information about the status of existing switch ports into the network. Which action could you take that would best protect your network from this type of attack?

Enable BPDU guard or BPDU filter on the switches

You have determined to make your wireless LAN as secure as possible. You install one 802.11n WAP and one 802.11g WAP. You configure both devices with a WPA2 pre-shared key. You also enable MAC filtering and you disable the SSID broadcast feature.After the WLAN is installed and tested, you give your coworkers the SSID and the pre-shared key. As they attempt to join the network, some users report connection problems. What action should you take that will most likely resolve the reported connection problems?

Enable SSID broadcasting

You manage a network for a large organization with several regional offices. It was recently brought to your attention that one branch office consistently has the lowest volume of malware incidents in the company. All users at each office use the same company desktop image and are controlled by the same group policies. All locations subscribe to the same security policies. Of the factors shown below, which one is most likely to have been implemented at the office with the fewest security issues?

End-user awareness training

Danny is a junior level network technician. Today he was asked to resolve a problem which he cannot answer. What action should Danny take next?

Escalate the issue to a senior network associate

You upgrade a network switch. After the upgrade, members of the HR department call to complain that they can no longer connect to the Internet. No other employees have the same problem. You ask a member of the HR department to logon to a workstation in the test lab. The user is able to connect to the Internet. What action should you take next to resolve the problem?

Examine the VLAN port assignments on the upgraded switch

An attack on a computer system that takes specific advantage of a known vulnerability is called a(n):

Exploit

Which of the following would not cause RFI (interference) on a wireless network?

Failure to enable SSID broadcasting

Which of the following cable types is used in a 100Base-FX network?

Fiber

What is the best protection against malware attacks caused by newly discovered vulnerabilities in software and firmware?

Implement a formal patch management process

Which of the following actions would not be taken by a network or system administrator to implement network device hardening? Select all that apply.

Implement spanning tree algorithm on Layer 2 network devices. Perform system backups.

What is the key purpose of a SDN controller?

It provides the ability to deploy consistent access point configurations from a central location.

A user is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?

Incorrect DNS

Two features that make 1000BaseT superior to 100BaseTX are ___________________ and __________________________ .

Increased speed; Full duplex transmission

Which one of the following cloud service models would allow a consumer to exercise the highest level of control over the cloud infrastructure components?

Infrastructure

In addition to handling incoming traffic, what is benefit of using a load balancer on a network?

It reduces the burden on individual appliances

A user reports that their computer is running much more slowly than usual. After running several tests, you discover that a large number of ICMP requests are being sent from the computer to an address that is not part of your company's network. After carefully cleaning the computer to remove the malicious software that triggered the attack, you are ready to restore the computer to the network. What action should you take to prevent such a situation from occurring again?

Install anti-malware on the computer.

Your company uses a variety of server-based applications include a web server, SQL database server, directory services server, and email server. Some of these applications run on Linux platforms and others run on different versions of Microsoft Windows. To improve network security, you need to install each application on a unique machine. However, you also need to minimize system costs. What technology could you use that would allow you to meet both your security and cost containment goals?

Install each application on a unique virtual server

In what way does a DLP policy help keep a company network more secure?

It documents the actions and responsibilities that users must assume to ensure that sensitive and critical data does not leave the company network.

Which one of the following statements is false with regard to subnetting a network?

It is easier to design, deploy, and troubleshoot

What purpose does the Syslog protocol serve?

It is used to log different types of events that might occur on a variety of network devices such as routers, switches, firewalls, some printers and some web servers.

Jan is troubleshooting his SOHO network. The company sends a new server to be added to the network two days before Christmas, but the server cannot be seen by any of the users. The office is always closed from December 24th through January 1st and reopens on January 2nd.When Jan returns to the office, he finds that new server can connect to the local network without problems but the office secretary's computer can longer connect to the network.What setting or feature should Jan look at first to resolve this problem?

Jan should examine the DHCP scope configured for the LAN.

Which of the following protocols authenticates a PC to the server using a ticket issued to it by the authentication service?

Kerberos

Which layer of the OSI Model is responsible for managing the session between two end-user application processes such as browsing the Internet?

Layer 5

A _______ is used to modify the time a device will hold an IP address provided through DHCP.

Lease

What is the highest severity level that a syslog server can be configured to store?

Level 7

__________________ requires the Installation of specialized devices in between network resources and the Internet to distribute network requests and ensure availability of resources to all hosts.

Load balancing

Louise is a level 1 network technician. She assists users who call to remote network issues. Very few of these users have a strong background in networking technology and are not always familiar with network devices.Which of the tools listed below would be the most helpful to both Louise and the users during their troubleshooting sessions?

Logical diagrams

You have just added a new wireless network in your company's conference room. Now you need to update the appropriate documentation. Which document should you update?

Logical network diagram

Which of the following cables would a technician make in order to identify a physical interface problem?

Loopback

You are configuring a wireless network. To keep the network secure, you want to ensure that intruders would still be unable to access the network even if they were to access the wireless encryption key. Which feature should you configure?

MAC filtering

The antenna and channelization properties used in 802.11n are _____________ and ____________ .

MIMO; ODFM

_________ is used by telecommunications carriers to segregate customer traffic over long fiber links.

MPLS

Which of the following is a characteristic of jumbo frames?

MTU size greater than 1500

You need to implement a network topology that will continue working for all remaining hosts if a single machine's connection to the network were to break. Which of the following network topologies would meet that requirement? Select all that apply.

Mesh Star

Which one of the protocols shown below would you use if you needed to configure a router to share a single public IP address among multiple devices on a local area network?

PAT

Which ISDN circuit has 32 channels, with the first channel being reserved for framing and synchronization and the seventeenth channel being served for signaling?

PRI

Mike is a network administrator for Blue Skies Travel. The first message to hit his email this morning is a notice from Speedway Systems. The email is to inform all customers that a flaw was found in their most popular line of Layer 2 switches. The company wants to assure their customers that the vulnerability has been patched in the most current release of this product.Blue Skies Travel has several of these switches in place on their network. Which of the following actions will Mike take to make the Speedway switches on their network more secure?

Mike will upgrade the firmware on the affected switches.

An IDS is used for which of the following purposes?

Monitors inbound and outbound network connections in order to identify suspicious activity

A technician needs to identify the type of fiber being used in a distribution panel. The marking the technician finds on the cable is 62.5/125. Which of the following optical cables has the technician found?

Multi-mode fiber

15 computers on your company's network are set to participate in a video conference at 9:00am today. Which of the following addressing schemes will the conferencing application most likely use to minimize the volume of traffic generated by the video conference?

Multicast addresses

Which of the following can operate at both layers 2 and 3 of the OSI model?

Multilayer Switch

An administrator configures a device that functions at the network layer, and also has 24 collision domains. What type of device did the administrator configure?

Multilayer switch

Which of the following cable types are used in a 10GBase-SR network?

Multimode fiber

You are configuring a branch office network for 14 users. All computers on this network will share a single Internet connection. You have contacted a local internet Service Provider and obtained an IP address for this office. What service do you now need to configure so that the IP address you have can be shared by the users in the office?

NAT

Which of the following does not refer to a service hosted in the Cloud?

NaaS

At which layer of the OSI Model does IP operate?

Network

The ______ layer of the OSI Model handles the routing of data across segments.

Network

Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the best method to monitor this device?

SNMP

The most cost-effective method of protecting a large number of networked systems from Internet-based attacks is:

Network-based firewall

Which of the following network devices would a network administrator use to create a DMZ?

Network-based firewall

Joe has a small wired network in his home. The network includes a small router that has four Ethernet ports. All four ports are currently in use connecting existing systems together.Recently, Joe was given a laptop and a printer by his employer so that he could occasionally work from home. He also bought his daughter a new laptop as a graduation gift. Now Joe needs to find a way to connect the new devices to the network without disconnecting any of the existing devices. On the advice of his best friend, Joe purchases a wireless access point and installs it in an area of the house that is closest to the greatest number of networked devices. Was Joe able to connect all network devices to his home network after installing the new wireless access point? Why or why not?

No; installing the WAP closest to the greatest number of wired devices would not increase the number of available connections for all devices to the same network.

Which of the following tools would be used to test the break in a fiber connection on the network?

OTDR

A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and reporting that connections keep dropping and network speeds are unusable. Which of the following is the MOST likely cause of this issue?

Overcapacity

A network made up of interconnected devices operating in the range of a single person, typically 10 meters, is known as a ________ .

PAN

A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?

Packet sniffer

You manage the LAN for a physician's group practice. At this office, all devices are assigned static IP addresses. Because the physician's frequently redefine the office space, you need to adopt best practices that will minimize any issues associated with frequent equipment moves. Which of the following best practices can help you achieve this goal? Choose two.

Patch panel labeling Wall plate labeling

A hub operates on the ________________ layer of the OSI Model.

Physical

Which of the following activities will not be possible if the gateway IP address is set incorrectly on a client's machines?

Pinging a remote computer

You are installing a new phone system that requires only one cable to provide data transfer abilities and supplies power to the device. What feature must be supported by your switches to ensure that the installation of the new phone system is successful?

PoE

What is QoS?

QoS is a set of techniques to manage network resources.

Which of the following protocols should be used when implementing 802.1x so that when a user logs into the network, the authentication server communicates to the network switch and assigns the user to the proper VLAN?

RADIUS

Which one of the protocols shown below is commonly used with 802.1x to provide remote authentication services on wide area networks?

RADIUS

Which of the following routing protocols use hop count as the metric value?

RIP

Which of the following routing protocols would provide the slowest convergence time?

RIP

Which of the following is the best reason to install plenum cable?

Reduces toxic gas released during a fire

The function of OSI Layer 4 is to provide:

Reliable delivery of packets

A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?

Replace RIP with a link-state routing protocol such as OSPF

Why do Ring networks have less likelihood of collisions than Bus networks?

Ring networks use token passing method to determine which host can transmit data

You have received several reports this morning from users who cannot connect to the company network. As you investigate the problem, you notice that all the uses who have reported this problem are working from wireless devices. Further, you notice that all wireless devices are trying to connect to a network SSID that displays as ACMECO.You realize that the business next door is named Acme Company. While you do not believe that your network is under malicious attack, you still have a security problem to address. What type of security problem have you just encountered?

Rogue access point

Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

Rogue access points

Multiple users are reporting no connectivity after a recent power outage. An administrator needs a cable to plug their laptop into the router in order to be able to console into it. Which of the following would the administrator need to make this connection?

Rollover

Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?

SC

Voice over IP (VoIP) depends on two protocols. What are they?

SIP and RTP

Which of the following is the name given to an official commitment that exists between a service provider and a client used to define aspects of the IT services provided such as quality, availability, and specific responsibilities?

SLA

You need to transfer a file between two systems. Which of the following protocols would not help you accomplish this task?

SMTP

Which of the ports shown below are most commonly associated with protocols used to ensure secure email services? Choose all that apply.

SMTP IMAP4 IMAP4 over SSL

The best cable types to use in an environment where electromagnetic interference is a problem are ___________________ and _______________ .

Shielded twisted pair; Multimode fiber

While troubleshooting a DHCP server configuration, you find that the address pool is full of active leases. At the same time, you know that not all of the workstations that have lease assignments are on the network. How could you best free up unused IP address assignments on the DHCP server?

Shorten the lease time on the DHCP server

The difference between 10Base-T and 100Base-T is:

Shorter timing between Ethernet frames

You are configuring a WAP for a small office. Which parameter would you configure to limit access to the office area?

Signal strength

_____________ allows administrators to remotely verify the configurations settings of __________ -capable devices.

Simple Network Management Protocol, SNMP

You have been asked to replace a large number of fiber optic cables on your company's local area network. The network currently uses older single-mode devices and adapters.You know that switching to multimode cables will save the company a substantial amount of money. What type of cables should you purchase and why?

Single-mode cables; you cannot use multimode cables unless you also upgrade the devices and adapters to multimode.

You need to implement a two-factor authentication strategy for the users at your company. Which two item would best help you achieve this goal?

Smart card and password

Your company uses a T1 connection. What is the name of the device used at the demarc to connect your network to the local carrier's network?

Smart jack

You need to cut a UTP cable into equal 50 meter lengths. Which of the following tools would you use?

Snips

You need to implement an additional authentication factor to the remote servers in order to make them compliant with the company's new multi factor authentication policy. Which of the following is not a type of authentication factor found in a multifactor authentication implementation?

Something you create

You have just implemented a new network management application. The purpose of installing the application is to allow the network administrator to generate and analyze network data and then act on that information to improve network performance.You need to make sure that anyone assigned the role of network administrator will know how to use the application and how to optimize the network according to company standards. Which of the following documents would you update to achieve that goal?

Standard operating procedure

Two servers and five workstations are connected using a 100Base-T network. Which of the following physical topologies is used?

Star

Your Company is opening a new branch office and you have been selected to set up the network. The offices that the branch will use are already wired with shielded twisted pair wire. You want to use the existing infrastructure so which of the following topologies you create?

Star

A ________________ cable is used to connect a single network node to a switch or hub.

Straight

Which of the following devices allows segregation of collision domains but not broadcasting domains?

Switch

Which of the following network components operates on Layer 2 of the OSI Model?

Switch

Which of the following WAN technologies do not use fiber as a transmission medium? Choose all that apply.

T1 ADSL E1

Which of the following is the most common pin-out configuration used when crimping RJ-45 connectors?

T568A/B

Which remote access protocol, implemented almost exclusively by Cisco, performs similarly to RADIUS?

TACACS+

_____________________ is a proprietary protocol which provides access control for routers, network access servers and other networked computing devices.

TACACS+

A technician has tested cable and has established it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?

TDR

A company plans to implement a Cloud network using the Platform as a Service service model. What level of access to the network would the company most likely have?

The ability to deploy applications

Which of the statements given below best describes the term "latency"?

The amount of time that it takes for a client to respond to a simple network request

While analyzing the contents of the IP routing table in a router, the administrator notices the routes shown in the table below.Which of the following best describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4? 192.169.1.0/24 172.16.31.1 ethernet0 192.168.2.0/24 172.16.31.1 ethernet0 172.16.31.0/24 derectly connect ethernet0 0.0.0.0/0 172.16.3.2 ethernet0

The packet will be forwarded to 172.16.31.2

You are monitoring network traffic and observe that packets originating from a single IP address on a specific server display multiple MAC addresses in the source address portion of each packet header. Why would a single server's NIC transmit packets that appear to come from multiple MAC address sources?

The server hosts multiple virtual machines. Each MAC address represents one of the virtual machines.

A DHCP enabled computer on the network is changing IP addresses and the technician wants to have the same IP address assigned for that computer. Which of the following would be implemented?

The technician needs to add the computer to the reservation list

A wireless connection is said to be suffering from "bounce". What does that mean?

The wireless signal is weakened because it is reflecting off metal surfaces between the WAP and the client.

A user contacts a technician and states that they are unable to access the network. The technician discovers that the IP address of the workstation is 169.254.142.34. Which of the following has occurred?

The workstation has obtained an APIPA address

You are testing a newly installed wireless network. You find that the wireless signal from one of the WAPs can only be found in one specific corner of the room. Why would this type of behavior occur?

The wrong antenna type was installed on the WAP

Your company network is configured as a star topology. An employee accidentally disconnects her computer from the network cable to which it is connected. What will happen to the company network?

There will be no change to network performance.

In what way are the two protocols, FTP and TFTP alike?

They can both be used to access data on a remote computer.

You asked Jack, a new network technician, to replace a failed router on the company network. Before you announce that the new router is up and running, you want to double-check Jack's work. You find that all ports have been with the correct IP address assignments and the port facing the Internet is in an "Up" state. However, all ports facing the local area network are still shutdown.If you leave the ports in shut down mode, what effect with this have on your users?What action might you have for?

They will not be able to connect to any device beyond their subnet.

Joe is a junior network technician. He has been working with your team to upgrade the installed fiber on your network. Your team has replaced several SFPs and Joe was asked to reconnect the existing systems to the new SFPs. After reconnecting the fiber cables, Joe is perplexed. None of the restored links are working.What action should you ask Joe to take to resolve this problem?

Transpose the fiber pairs.

Which of the following transport protocols should be used to avoid retransmitting lost packets?

UDP

Which of the following protocols can be found at the transport layer? Choose two.

UDP TCP

Which of the following is an advantage of 100Base-T over 100Base-FX?

Uses a more flexible cable

You are the network administrator for a small office. Visitors need the ability to connect to the Internet, but they must not be able to connect to the company server. Employees need the ability to connect to both the company server and to the Internet. All the connections are managed by the same switch. Which technology shown below would best allow you to meet these requirements?

VLAN

You are a network administrator for Global Technologies. Early Sunday morning, you receive a call that the company's network is experiencing periodic outages at multiple locations.You want to connect to the network from home so that you can begin troubleshooting this issue immediately. Which two protocols, of those shown below, would best allow you to create a secure connection to the network?

VPN and SSH

Which of the following devices would be used to securely monitor and actively manage external connections?

VPN concentrator

You need to minimize the amount of time you spend administratively supporting the network. Your network is configured to use multiple VLANs. Which protocol could be added to the switches achieve your goal?

VTP

You have just implemented a storage area network, but you are concerned because throughput and network traffic efficiency on the SAN is much lower than you expected.You have analyzed network traffic patterns and realize that much of the performance issues you see come from the large amounts of data generated by the new SAN.Which of the following actions should you take to help alleviate this problem?

Verify that all devices on the network can support the use of jumbo frames

You are troubleshooting a SOHO network. The customer has reported that he cannot connect to the Internet from any home device. In talking further with this customer, you find that he recently remodeled his home office and moved both the router and the DSL cable modem from one side of the room to the other. You ask the customer if the LED light next to the port labeled Internet on the DSL cable modem is lit. The customer replies that the Internet port LED light is not lit, but that there other lights on the device which are lit.What action should you take next?

Verify that the router is connected to the DSL cable modem.

Alan manages the network for a small credit union. He has been asked to configure 6 new desktop computers for the bank tellers sitting on the main floor of the credit union.Alan needs to be sure that each computer is configured with an identical desktop configuration and application configuration. Which technology, of those shown below, would best help Alan achieve this goal?

Virtual desktops

Lee needs to create a test environment that will serve the following purposes: * allow in-house programmers to test applications on machines configured identically to the production workstations * allow system administrators to test patches and hot fixes before rolling them out to computers in service * provide storage for fully configured backup systems * keep all systems under full control of the companyLee was asked to spend as little money as possible on the solution. Which of the following technologies would best allow Lee to meet the objectives?

Virtual machine

Compared to other methods used to ensure wireless network security, which of the following statements is true about WEP?

WEP is the least secure option available for wireless networks today.

Under what circumstance would it be better to use a manually assigned IP address than one assigned through a service such has DHCP?

When a change in the assigned IP address would make it impossible to find a needed host or other device

What purpose does a routing table serve?

deliver packets to the destination node

Which of the following statements is true about both distance vector and link state routing protocols?

When selecting a route, they choose the one with the lowest administrative distance.

Alan has just been hired by Green Acres Produce to improve the security of their networks. The first two actions that Alan performs are to update company security policies and procedures; and provide users with training on company security policies and practices.Of all the things that Alan could have done to improve network security, would these tasks have allowed him to meet his goal? Why or why not?

Yes; these actions are effective in securing the network.

Router typically use _____________ and _________ to determine the best destination for an outgoing packet.

destination LAN IP; subnet mask

A security attack on a target that uses spoofed ICMP packet to flood the device is known as ________________ .

a Smurf attack

Which of the following devices would a network administrator add to the network to protect critical systems from damage due to power outages and surges?

a UPS

You are configuring the IPv4 address settings for the network adapter of a new computer. You have been given an IPv4 address and told to use that address to configure the default gateway option. What is a default gateway?

a preferred router IP address used when configuring a system to use TCP/IP

Which of the following is not an example of a legitimate IPv6 address?

ace2:0tf6:ed83:4401:1955

The purpose of a DHCP scope is to:

allocate a preset range of IP addresses available for assignment.

You are configuring the IPv4 address settings for the network adapter of a new computer. You have been given an IPv4 address and told to use that address to configure the subnet mask option. What is a subnet mask?

an IPv4 address component used to distinguish between the network portion of an IP address and the host portion of that same address

A user calls saying they are having issues connecting to the Internet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?

arp -a

DHCP is used to ________________________________________ .

assign IP addresses to clients upon request

The function of a tone generator is to generate a tone to test:

continuity

Which route would a router use when no specific route to a destination exists?

default

Which of the following items are not included in a Statement of Work? Choose two.

define the buyer as the in-house manager for the project identify in detail all tools, processes, and methodologies used by the contractor to complete the work


Kaugnay na mga set ng pag-aaral

Additive Inverse and Identity, Multiplicative Inverse, Identity, and property of zero

View Set

Digital Technology Week 2 - Digital Business

View Set

MKT Information and Analysis - QUIZ 1

View Set

Spinal Reflexes & Descending Motor Pathways

View Set

chapter 10: marketing with youtube (2021)

View Set

A History of Western Society Chapter 21

View Set