UDEMY QUESTIONS#4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in various locations. This document is known as

Heat map Explanation A heat map will show the signal strengths of wireless network signals in various locations. Technicians will document this information and use it as a tool during troubleshooting and optimization efforts.

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

ISAKMP Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. What can the technician do to fix this issue while causing internal users to route to the website using an internal IP address?

Implement a split horizon DNS Explanation Split Domain Name System (Split DNS) is an implementation in which separate DNS servers are provided for internal and external networks as a means of security and privacy management.

You have been assigned to assist with the deployment of a new web-based application to your company's intranet. After installing the application, it was identified that the database server is becoming overloaded by the number of requests that the users create. The team lead has proposed adding a device between the web server and the database server to alleviate the issue. Which of the following is being implemented by adding this new device?

Implement load balancing and provide high availability Explanation The device being added is most likely a load balancer. By adding this device, it will allow the delivery team to install a series of database servers to handle the requests by dividing the incoming requests among the various servers. NIC teaming would be an action that occurs on the database server itself, it is not a separate device. The other options are focused on troubleshooting efforts, not increasing the capability or availability of the database server(s).

You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the second floor of the building. Currently, the office only has one network closet which is located on the first floor. Your team spent the morning running 48 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd floor closet. You measured the distance from the switch in the 1st floor closet to the new second floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?

Install a switch in the second floor networking closet to increase the signal Explanation The best option is to install a switch in the networking closet on the second floor which can connect to the cables coming from the first floor closet and then to the cables on the second floor patch panel. This will act as a repeater to boost the signal strength over the Cat5e cable, effectively resetting the cable length to 0 meters before leaving the closet. While a repeater may be a good option, a switch is more effective in this case since there are so many cables and repeaters usually only work for an individual cable. A hub would similarly work, but would introduce a signal collision domain for 48 computers. This would drastically decrease the performance of the network. Finally, we don't want to include a switch in each office, as this is a bad security practice and an inefficient use of resources. It is easier to manage and administer a single, centralized switch in the network closet.

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. What would be required to resolve the exploit? ​

Install recommended updates Explanation If the encryption is insecure, then we must look for encryption software updates or patches. If they are available, we must install them.

A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24 : current value 8463257.54" What is being monitored to trigger the alarm?

Interface link status Explanation This is an error message that indicates that threshold of high utilization of network interface, in this case interface gi1/0/24, has been exceeded. The message has been triggered on the interface link status. (Note: gi1/0 would be a gigabyte interface.)

While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following should be added to the network's cable distribution plant to achieve this goal?

Ladder trays Explanation Ladder trays are a cost-effective alternative and allow for easy installation of cables by electricians as well as future access for adding or removing cable runs.

Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability?

Load balancing Explanation Load Balancing is a technique used to spread work across multiple computers, network links, or other devices.

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?

MIB ​ MIB Explanation Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol. It would allow whatever tool to correctly interpret the information received.

Your company is experiencing slow network speeds of about 54Mbps on their wireless network. You have been asked to perform an assessment on the existing wireless network and recommend a solution. You have recommended that the company upgrade to a 802.11n or 802.11ac wireless infrastructure to obtain higher network speeds. Which of the following technologies allows an 802.11n or 802.11ac network to achieve faster speeds?

MIMO Explanation One way 802.11n and 802.11ac networks achieve superior throughput and speeds is by using a technology called multiple input, multiple output (MIMO). MIMO uses multiple antennas for transmission and reception, which in turn results in higher speeds than 802.11a and 802.11g networks which can only support up to 54 mbps of throughput.

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, which of the following should the technician do to prevent the password from being sniffed on the network again?

Only allow administrators to access routers using port 22 Explanation Port 22 uses SSH to authenticate a remote computer or user, or in this case, an administrator. Even if the router has been compromised, the new full rights user would not be able to access their new account without the SSH key, which could only be provided by a true administrator. Telnet uses port 23 and passes all information as unencrypted traffic on the network. Telnet should always be disabled for security reasons and SSH (which uses encryption) should be used instead.

Which of the following network topologies requires that all nodes have a point-to-point connection with each and every other node in the network?

Mesh Explanation A mesh network is a network topology in which each node relays data for the network. Because of this, physical mesh networks are very expensive to implement and not often used.

Thomas has a server that streams media to the local network and the device is currently visible on the network. All of the workstations on the LAN can ping the device and all the firewalls are currently turned off. The goal is for the streaming media server to be able to allow different workstations to watch the stream if they choose to subscribe to it.The streaming device appears to be functioning properly, but the media won't stream when requested. Which of the following TCP/IP technologies is MOST likely not implemented properly?

Multicast Explanation Multicast is not implemented properly because that is the TCP/IP technology that sends out the packets to the requested devices when streaming to multiple workstations from a single streaming media server. As opposed to broadcast (one-to-all), which sends out packets to all devices, multicast (one-to-many-of-many/many-to-many-of-many) only sends packets to many that are specifically requested but not all. Multicast would need to be implemented to route the network device to the LAN so that streaming can function properly.

A company is experiencing accessibility issues reaching services on a cloud-based system. What monitoring tools should be used to locate possible outages?

Network analyzer Explanation A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network. A software tool like Wireshark is a network analyzer and protocol analyzer.

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?

Network-based anti-malware Explanation The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.

What is BEST used to perform a one-time temporary posture assessment in a NAC environment?

Non-persistent agent Explanation A non-persistent agent is used to access the device during one-time check-in at login. This is beneficial in BYOD (Bring Your Own Device) policies.

You have been hired by a company to upgrade their aging network. The network currently uses static routing for the internal network, but the organization wants to reconfigure it to use a dynamic routing protocol. The new dynamic routing protocol must support IPv4 and VLSM, at a minimum. Based on the requirements provided, which of the following routing protocols should you enable and configure?

OSPF Explanation Of the options provided, only OSPF supports IPv4 and VLSM (Variable Length Subnet Mask). The other protocols do not support VLSM. (Note: RIPv2 and above does in fact support VLSM.

What type of cable would you use to connect to a console port? ​ Rollover (Correct)

PERFORMANCE BASED QUESTION Rollover Explanation Typically, a router or switch's console port is connected using a rollover cable, which has an RS-232 (DB-9) port on one side and an RJ-45 on the other. If this was a real question on the exam, you would have the words provided in a list, and you would drag them below the appropriate drawin

What is the correct color scheme for Pin 1 to Pin 8 for a T-568A connector?

PERFORMANCE BASED QUESTION white/green, green, orange/white, blue, white/blue, orange, white/brown, brown Explanation You need to have the T-568-A and T-568-B standards memorized before test day, because you may be asked to perform a drag and drop exercise of placing the right colored wires into the right pin numbers based on a T-568A or T-568B connector. Remember, a straight through cable will have T-568B one both ends. If you are asked to make a cross-over cable, you need a T-568A on one side and a T-568B on the other side.

Your company has purchased a new building down the street for its executive suites. You have been asked to choose the BEST encryption for AP1, AP2, and AP3 in order to establish a wireless connection inside the main building for visitors to use. Your boss has stated that the internal wireless network in the main building is for visitors' use only and MUST NOT require the visitors to setup any special configuration on their devices in order to connect.

(PERFORMANCE BASED QUESTION) OPEN Explanation Since your manager has requested that the visitors not be required to configure anything on their devices, the only option you can choose is Open. This option presents NO security for the visitor's wireless network, but it also requires no setup on the user's devices. All of the other options would require some sort of pre-shared key and setup to allow the visitor to use the network.

Your co-worker has just installed an unmanaged 24-port switch. He is concerned with the amount of broadcast traffic that may exist when using this device. How many broadcast domains are created when using this single 24-port switch?

1 Explanation A single 24-port unmanaged switch will have only 1 broadcast domains. Broadcast domains are split up by routers and VLANs. Since this is an unmanaged switch, it will only have a single broadcast domain, but it will have 24 collision domains.

A small real estate office has about 15 workstation and would like to use DHCP to assign classful IP addresses to each workstation. The subnet only has one octet for the host portion of each device. Which of the following IP addresses could be assigned as the default gateway?

192.68.0.1 Explanation A non-routable IP address (in this case 192.168.0.1), also known as a private IP address, is not assigned to any one organization and does not need to be assigned by an Internet Service Provider. Since the question wants a classful IP addressing scheme to be assigned to devices, and only one octet being available for the host portion, it would need to be a Class C address. The only Class C address to choose is 192.168.0.1 based on the options provided. The IP 10.0.0.1 is a Class A address. The IP 172.16.0.1 is a Class B address. The IP 169.254.0.01 is an APIPA (reserved) address.

You are installing a Small Office/Home Office (SOHO) network consisting of a router with 2 ports, a switch with 8 ports, and a hub with 4 ports. The route has one port connected to a cable modem and one port connected to switch port #1. The hub's first port is connected to switch port #2. Based on the description provided, how many collision domains exist in this network?

9 Explanation Based on the description provided, there are 9 collision domains. Each port on the router is a collision domain (2), each port on the switch is a collision domain (8), and all of the ports on the hub make up a single collision domain (1). But, since one of the ports on the router is connected to one of the ports on the switch, they are in the same collision domain (-1). Similarly, the hub and the switch share a common collision domain with their connection to each other over the switch port (-1). This gives us 9 collision domains total: the 8 ports on the switch, and the 1 port on the route that is used by the cable modem.

Which of the following devices does a CSU/DSU connect?

A T1 line to a network router Explanation A CSU/DSU device is designed to connect a terminal device to a T1 line. The terminal device or Data Terminal Equipment (DTE) such as a router will connect to the T1 line via CSU/DSU (Channel Service Unit/Data Service Unit).

A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. What rule should the technician verify FIRST?

An implicit deny is enabled Explanation Implicit deny only allows certain traffic through that is specified by certain ports.

You are working for a brand new startup company who allows you to use your own laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?

BYOD Explanation BYOD (Bring Your Own Device) refers to the policy of permitting employees to bring personally owned devices to their workplace, and to use those devices to access privileged company information and applications.

A network technician needs to protect IP-based servers in the network DMZ from an intruder trying to discover them. What should the network technician do to protect the network from ping sweeps?

Block ICMP at the firewall Explanation All ping requests are based on Internet Control Message Protocol. Blocking ICMP communication at the firewall would stop the firewall from communicating with any ping sweeps that would occur.

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the Internet. What rule on the firewall should the technician configure to prevent student access to the Internet?

Block all LAN to WAN traffic Explanation By blocking all traffic from the LAN to WAN, it will prevent the students from accessing the Internet by blocking all requests to the Internet.

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as what?

Bluejacking Explanation Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, or laptop computers or sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another.

You are troubleshooting your company's T-1 connection to your ISP. The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which of the following devices should you connect the loopback plug on?

Channel service unit Explanation The CSU/DSU terminates a T1 line at the customer's site. Therefore, the CSU (Channel Service Unit) should have the loopback plug attached to test the connection.

A network administrator is configuring a VLAN across multiple switches. The administrator wants to configure the VLAN once and have that configuration propagate to all of the switches in the network. Which of the following should the administrator do?

Configure the switches to utilize VTP Explanation VLAN Trunking Protocol (VTP) shares VLAN information to all switches in a network.

Which of the following wireless characteristic does channel bonding improve?

Connection speed Explanation Channel Bonding is used to reduce redundancy or increase throughput, directly affecting the connection speed of a wireless connection. Signal strength only refers to the maximum transmitted power by an antenna.

A customer's email service is not sending emails anymore. What is the correct order that you should follow to perform the troubleshooting steps? (This is a simulated Performance-Based Question.)

Determine if any recent changes have been made to the server, Establish a theory of proable cause; Test the theory to determine cause, Establish a plan of action to resolve the problem; implement the solution ;Verify full system functionality;Implement preventative measures; Document findings, actions, and outcomes. Explanation You must know the CompTIA troubleshooting steps in the right order for the exam. You will see numerous questions both in the multiple-choice and simulation sections on this topic. If you received this question on the real exam, it will appear as a "drag and drop" question with each of the steps making up a single box, and you need to put them into the correct order

A company utilizes a patching server to regularly update its PCs. After the latest round of patching, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?

Disable automatic driver updates to PCs on the patching server Explanation The most likely cause of this issue was a forced driver update being pushed from the update server to the older PCs, breaking their ability to use their network cards. It is best to disable automatic driver updates for PCs and have them tested first.

You have been asked by the physical security manager to assist with his risk assessment of his proposed security measures. He is concerned that during a power outage, the server room might be the target of an attack. Luckily, he has many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable?

Door locks Explanation A traditional door lock doesn't require power to operate, therefore it will still provide protection to the keep the intruder out of the server room. The other options all require power to function and operate.

An administrator's router with multiple interfaces uses OSPF. When looking at the router's status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW 10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets

Enable the connecting port Explanation Since the line protocol is down, you will need to enable the connecting port to restore the connection.

Which WAN technology relies on virtual circuits and point-to-multipoint connections?

Frame relay Explanation Frame Relay is a WAN technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology. It supports the use of virtual circuits and point-to-multipoint connections. It is commonly used to connect multiple smaller corporate office locations back to a larger centralized headquarters.

A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each workstation on the network. The new software will broadcast statistics from each host to a monitoring server for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. How should the technician design the new network?

Place each department in a separate VLAN Explanation Placing each of the departments on separate VLANs will help minimize the added network traffic. VLANs work by taking multiple physical hosts and LANs and configuring them to act as if they were attached to the same Ethernet switch.

You have been asked to run a cable between a drop ceiling and a standard ceiling and ensure it meets the fire safety requirements for your local government. The cable will be used to support a 10GBaseT network connection for up to 100 meters. Which of the following cables should you use to meet these requirements? ​

Plenum Cat 6a Explanation Cat6a can also support 10Gbps for up to 100 meters using 10GBaseT. Cat 5e can only support 1000BaseT (1 Gbps) connections. Since we are concerned with the fire safety rating of the cable, we should use a Plenum cable, not a PVC cable.

As you arrive to work this morning, you look up at the building an notice a microwave antenna that is pointing another antenna on top of your company's support building across the street. Which of the following network topologies BEST represents this network connection over the microwave link?

Point-to-Point Explanation This connection is best represented by a point-to-point connection since it is being used as a Campus Area Network connection to directly connect the two buildings.

A network technician needs to identify active services that should be disabled on the network. What tool would BEST accomplish this?

Port scanner Explanation Port Scanner will scan for what ports are open or closed enabling certain services or not. Such as if port 22 is open, that means Secure Shell service is enabled. Or if port 25 is open then the SMTP service is enabled.

Your company hosts all of the company's virtual servers internally in your own datacenter. In the event of total failure or disaster, though, the server images can be restored on a cloud provider and accessed through a VPN. Which of the following types of cloud services is your company using in this scenario?

Public Iaas Explanation Infrastructure as a Service (IaaS) is the foundation of cloud computing. Rather than purchasing or leasing space in expensive datacenter, labor, real estate, and all of the utilities to maintain and deploy computer servers, cloud networks, and storage, cloud buyers rent space in a virtual data center from an IaaS provider. They have access to the virtual data center via the Internet. This type of cloud computing provides the "raw materials" for IT, and users usually only pay for the resources they consume, including (but not limited to) CPU cores, RAM, hard disk or storage space, and data transfer. Since this cloud provider is available to all companies to use, much like Microsoft Azure or Amazon Web Services, this is an example of a Public IaaS or Public Cloud.

You are working as a network technician and need to create several Cat 5e network cables to run between different computers and the network jacks on the wall. The connections between the switch and the patch panel, and the patch panel and the wall jacks have already been installed and tested. Which of the following tools would NOT be necessary to complete this task?

Punchdown tool Explanation A punchdown tool is used to connect a network cable (such as Cat 5e) to a patch panel, 110-block, or the inside portion of a wall jack, therefore it is not needed for this task. A wire stripper is used to remove the outer plastic shielding from the Cat 5e cable so that you can reach the inner wiring pairs. The RJ-45 connectors are used to make the connection between the cable and a network jack, and the cable crimper is used to ensure the RJ-45 connector stays attached to the end of the Cat 5e cable.

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

RADIUS Explanation Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?

RADIUS Explanation RADIUS is used to centrally manage credentials for network devices. TACACS is an older username and login system that uses authentication to determine access, while RADIUS combines authorization AND authentication. For this question, either RADIUS or TACACS would be an acceptable answer.

You are currently working as a firewall technician. You have received a request to open up a few ports on the firewall to allow a newly VoIP system to operate properly. The installer has requested that the ports associated with SIP, RDP, H.323, and RTP be opened to allow the new system to operate properly. Which of these ports are NOT used by a typical VoIP system?

RDP Explanation RDP is the protocol for the Remote Desktop Protocol and operates over port 3389. This is not used in a typical VoIP system. SIP (Session Initiation Protocol), H.323 (voice/video conferencing) protocol, and the RTP (Real-time Transport Protocol) are all used heavily in VoIP and video conferencing solutions.

Which type of cable uses an F-connector?

RG-6 Explanation OBJ-2.1: An F-type connector is a coaxial radiofrequency connector commonly used for cable television with an RG-6 cable. RG-6 is a type of coaxial cable used to transmit audio and video signals to devices such as television sets. It is also used with cable modems to transmit data.

On which type of cable is an F-connector is used?

RG6 Explanation An F connector is a coaxial RF connector commonly used for cable television with an RG6 cable. RG6 is a type of coaxial cable used to transmit audio and video signals to devices such as television sets.

Your supervisor has asked you to run a Cat 5e cable between two network switches in the server room. Which type of connector should be used with a Cat 5e cable?

RJ-45 Explanation A Cat 5e cable should uses a RJ-45 connector on each end of the cable. This is the standard type of connector for Cat 3, Cat 5, Cat 5e, and Cat 6a cables.

An administrator has configured a new 100Mbps WAN circuit, but speed testing shows poor performance when downloading larger files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following: NETRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is upHardware is GigabitEthernet, address is 000F.33CC.F13AConfigured speed auto, actual 1Gbit, configured duplex fdx, actual fdxMember of L2 VLAN 1, port is untagged, port state is forwarding

Remove default 802.1q tag and set to server VLAN Explanation Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and setup a server VLAN to increase performance.

You are about to perform a major configuration upgrade to a network device. What should you have prepared in case the upgrade fails?

Rollback plan Explanation The purpose of a rollback plan is to document at every point during the deployment of a change or upgrade where you can stop the deployment and return to a known-good st

A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?

Route poisoning Explanation The Route poisoning setting in Cisco's Split Horizon is what prevents routing loops and shows the failed routes.

You have configured your network into multiple segments by creating multiple broadcast domains. Which of the following devices should you use to allow the different network segments to communicate with each other?

Router Explanation A router is used to allow different network segments and broadcast domains to communicate with each other. If you have a Layer 3 switch, this will also function as a router and allow communication to occur. Since the question didn't specify if the switch was a layer 2 or layer 3 switch, we must assume it is a traditional layer 2 switch which cannot route traffic from one broadcast domain to the other broadcast domains.

A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. Which of the following should the company do to reduce this type of action from causing network problems in the future?

Segment the network and create a testlab for all updates before deployment Explanation Segmented networks would ensure every system isn't updated at the same time and would be updated in groups. The test lab would ensure proper functionality prior to deployment or would allow you to work through the technical difficulties prior to deployment.

Over the past week, the users of your network have reported that the network has been operating slowly. You have made some changes to the network to attempt to increase its speed and responsiveness, but your supervisor is requesting that you provide some proof that the network is actually faster and doesn't just "feel" faster. Which of the following should you use to prove that the current configuration has improved the speed of the network?

Show him the results of a new peformance baseline assessment Explanation The only way to prove to your supervisor that the network is actually faster and more responsive is to conduct a new performance baseline and compare it to the results of the baseline that was created prior to the changes. By comparing the "current" speed against the "previous" baseline's speed, you can definitely prove if the network is indeed faster as a result of your configuration changes.

A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference the

Site survey Explanation Since it is a wireless network, a review of a site survey is necessary to determine any physical advantages and disadvantages. Network topology and Network diagrams can be created once the site survey is complete and the location of the access points is determined

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation within the network?

Spanning tree Explanation The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. If you have redundant links setup, it is important to utilize STP to prevent loops within the network.

Which network device operates at Layer 2?

Switch Explanation A basic switch operates at Layer 2 of the OSI model. For the exam, unless they mention a "multilayer switch" or "layer 3 switch", always assume they are referencing a basic layer 2 switch.

A home user reports that a speed test website shows the following information: Download speed: 33.3MbpsUpload speed: 10.2Mbps Which of the following is the best interpretation of the results?

The home PC is receiving data at 33Mbps and sending data at 10.2 Mbps Explanation This connection is an asymmetric connection, like a cable modem or DSL, where upload and download speeds do not match.

You are conducting a port scan of an older server on your network to determine what services are being run on it. You find that port 80 and 443 are open, but port 20 and 21 are reported as closed. All other ports are reported as FILTERED. Based on this report, what can you determine about the server?

The server is running as a web server and is denying any other service requests Explanation When a port scanner returns a result of CLOSED, it means the service is denying the inbound traffic on that port. In this case, it is denying FTP traffic on ports 20 and 21. This server is running a web server (port 80 and 443), but those are showing as OPEN and receiving traffic. All the FILTERED ports are being blocked by the network firewall.

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implemented to correct this issue?

UPS Explanation An Uninterruptible power supply (UPS) is a battery system that can supply short term power to electrical units. Since all the devices are restarting at the same time, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts.

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?

WAP placement Explanation For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building's construction doesn't cause interference with the wireless signals.

Which of the following should be implemented to allow wireless network access for clients in the lobby using a password key?

WPA2 Explanation WPA2 allows the use of a preshared key for wireless network access.

A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. What is the MOST likely cause of this issue?

Wavelength mismatch Explanation Wavelength mismatch is when one or more wavelengths in a fiber optic cable are unequal and cannot be measured using an optical power meter. Cross-talk and EMI are both elements that are irrelevant to Fiber optics.

You are assisting a member of your organization's security team during an incident response. The team member asks you to determine if there are any strange TCP connections occurring on a given workstation. You open the command prompt on the workstation. Which of the following tools would provide you with information on any TCP connections that currently exist on the workstation?

netstat Explanation Netstat (network statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface and network protocol statistics. It is useful when trying to determine if a workstation is attempting outbound connections due to malware (beaconing activity), or has ports open and listening for inbound connections.

Which of the following is the BEST encryption to use from the options below to meet your manager's requirements for the new visitors' Wireless Network?

open Explanation OBJ-4.3: Since your manager has requested that the visitors not be required to configure anything on their devices, the only option you can choose is Open. This option presents NO security for the visitor's wireless network, but it also requires no setup on the user's devices. All of the other options would require a pre-shared key and set up to allow the visitor to use the network.

The company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. PERFORMANCE BASED QUESTION

/28 Explanation Since the IT department needs 13 devices plus a network ID and broadcast IP, it will require 15 IP addresses. The smallest subnet that can fit 15 IPs is a /28 (16 IPs).

What is used to authenticate remote workers who connect from offsite?

802.1x Explanation 802.1x can be used because it is designed to enhance the security of wireless local area networks (WLANs) . WLANs provide an authentication framework, allowing a user to be authenticated by a central authority. RADIUS (Remote Authentication Dial-In User Service) allows a company to maintain user profiles in a central database that all remote servers can share. It provides better security, allowing a company to set up a policy that can be applied at a single administered network point. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server. 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.

A company-wide audit revealed employees are using company laptops and desktops for personal use. To prevent this from occurring, in which document should the company incorporate the phrase "Company-owned IT assets are to be used to perform authorized company business only"?

AUP Explanation Acceptable Use Policy dictates what types of actions an employee can or cannot do with company-issued IT equipment.

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following should the technician install to satisfy this requirement?

Add a multilayer switch and create a VLAN Explanation By adding a multilayer (layer 3) switch, the technician can improve network routing performance and reduce broadcast traffic. Creating a VLAN provides LAN segmentation, as well, within the network and the multilayer switch can conduct the routing between VLANs as needed.

A network administrator has set up a firewall and entered only three rules allowing network traffic over ports 21, 110, and 25 in an effort to minimize the attack surface and to better secure the network. Unfortunately, now the administrator is receiving complaints from users who are reporting that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 and 53 Explanation Port 80 is used for HTTP traffic. It must be open to allow the web browser to make a request from the network to the web server. Port 53 is needed to reach the DNS servers in order to determine the IP address for a given URL or domain name (such resolving DionTraining.com to its IP address).

Which of the following must be added to a VLAN with a gateway in order to add security to it?

An ACL Explanation VLANs can be protected with an ACL. Without a properly configured ACL, there is no additional security provided by a VLAN.

A technician wants to update the organization's disaster recovery plans. Which of the following would allow network devices to be replaced quickly in the event of a device failure?

Archives/backups Explanation Having backups of the server data would allow for a quick recovery in the event of a device failure.

You are assisting the company with developing a new business continuity plan. What would be the BEST recommendation to add to the BCP?

Build redundant links between core devices Explanation The business continuity plan focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a disaster. By keeping redundant links between core devices, critical business services can be kept running if one link is unavailable during a disaster. Some of the other options are good ideas, too, but this is the BEST choice.

What should be considered when troubleshooting the coverage and signal strength of a 802.11n WLAN?

Building materials in the area Explanation Some building materials are more dense than others. The denser the object, the more you will have a degradation of signal. For optimal signal, a LoS (Line of sight) of 25 feet or less is advised as well.

Which of the following WAN connection types might an Amplitude Modulation (AM) radio station have a detrimental effect on and cause interference?

DOCSIS Explanation DOCSIS is how cable modems operate by sending radio frequency waves over coaxial cables. AM frequencies can interfere with DOCSIS. The other answers all rely on networks, such as fiber, which are immune to radio frequency interference.


Kaugnay na mga set ng pag-aaral