Network+ CE - Domain 3.0
A Chief Information Officer needs to prepare a process for the purchase, maintenance, and decommissioning of assets in the company. The CIO wants to ensure properly supported equipment. What kind of roadmap would help the CIO accomplish this task? A. System life cycle B. Wire diagram C. Rack diagram D. Standard operating procedures
A
A desktop engineer is responding to a support request stating that a brand-new machine with 16GB's memory and an m.2 SSD is still running processes and programs slower than needed workload requirements. What component did an administrator poorly choose when ordering the device? A. Processor B. Memory C. Hard drive D. Bandwidth
A
A network consultant is conducting a test to determine the amount of data transferred through a connection over a given period. What is the consultant testing? A. Bandwidth B. Audit Logs C. Baselines D. Netflow data
A
A network engineer monitors the network and follows information packets as they move through the network from one endpoint to another. What is the engineer observing? A. Send/Receive Traffic B. Speed/duplex C. Traffic logs D. Traps
A
A network engineer recently received brand new network equipment for the corporate office and wants to run a check of the systems to ensure they know what to expect from the equipment. What kind of report should the sysadmin run? A. Baseline B. NetFlow C. Audit D. Traffic
A
A network specialist received a port failure notification on UDP port 162. What agent is detecting the notable event? A. Traps B. Syslog C. CPU D. OIDs
A
A network technician is installing sensors on the fire suppression system in the equipment closet to monitor and measure environmental conditions. What type of environmental conditions will the installed sensors monitor? A. Flooding B. Electrical C. Temperature D. Humidity
A
A server running an SQL database is running out of capacity. The sysadmin noticed the disk space is not maxed out, and the processor is running at 25% capacity as well. What is another component of the server that the sysadmin should look at to restore the database's functionality? A. Memory B. HDD C. CPU D. Bandwidth
A
A sysadmin is following a set of procedures to ensure changes to the corporate information technology environment do not adversely affect the availability of those resources. What kind of policy is the sysadmin following? A. Change management B. BYOD C. DLP D. Onboarding
A
A sysadmin is implementing a policy that establishes a duty for each employee to ensure confidentiality, integrity, and availability of data assets in the company ownership. What kind of policy is the sysadmin creating? A. Security B. Onboarding C. Acceptable use D. Password
A
A sysadmin is investigating an issue on a switch after receiving reports that connecting to any network resource, local or on the web, is much slower than normal. What kind of log should the sysadmin investigate to determine what may be causing the issue? A. Traffic B. Baseline C. Audit D. Security
A
A sysadmin is trying to understand what is causing the company's virtual private network connections to fail. What kind of log would help the sysadmin track down the issue? A. Syslog B. Trap C. Audit D. Security
A
A sysadmin noticed that there were changes to the hardware firewall not properly documented. The sysadmin does not know who made the change. What type of log should the sysadmin investigate that may shed light on who made the change in the firewall? A. Audit B. Baseline C. Trap D. Traffic
A
A sysadmin was monitoring the logs of the network equipment in the corporate office and noticed there were a lot of packet collisions. After digging around the individual network boxes, the sysadmin found that there was a misconfigured switch. What setting most likely contributed to packet collisions? A. Speed/Duplex B. Memory C. Bandwidth D. Packet count
A
An administrator is looking at a plan that shows channel utilization and the wireless signal strength in each area of the building. What kind of document is this? A. Site survey report B. Floor plan C. Wiring diagram D. Port location diagram
A
An organization's Chief Information Officer and the Chief Security Officer are assisting the legal department with writing standards that dictate the authorized use of the organization's technology by employees, customers, and third-party vendors. What document is the organization writing? A. Acceptable use policy B. Bring your own device policy C. Business continuity plan D. Service level agreement
A
What do emergency, critical, and informational lines in a syslog refer to? (Select all that apply.) A. Severity levels B. Logging levels C. Link states D. Encapsulation errors
A,B
An administrator is looking at a network diagram that shows the data path between a client and server, the physical arrangement and location of the components, detailed information about the termination of twisted pairs, and demonstrates the flow of data through a network. What components of diagrams is the administrator looking at? (Select all that apply.) A. Physical network diagram B. Logical network diagram C. Wiring diagram D. IDF
A,B,C
A user in the Human Resources (HR) department has opened an e-mail, and now the user's computer is mostly unresponsive. The user has requested assistance from the IT department. A network technician has checked the network to verify that there is nothing abnormal about the network's bandwidth. Since the network is not acting abnormally, what resources are likely being attacked on the user's computer? (Select all that apply.) A. Memory B. Latency C. Jitter D. CPU usage
A,D
A company's main file server crashed, requiring the sysadmin to restore data. However, the information technology department received complaints that no one sent any communication informing employees of the issue. What kind of plan would have helped to prevent these complaints? A. Acceptable use B. Incident C. Data loss D. Change management
B
A disgruntled employee used a shared login to access an organization's customer relationship management system and delete customer information. How will the organization react? A. Disaster recovery plan B. Incident response plan C. Remote access policy D. Data loss prevention
B
A network engineer has installed a new switch but notices a blinking amber light. What should the engineer check to troubleshoot the trunk port connected to the corporate network? A. Byte count B. Duplex/speed C. Link state D. Latency
B
A network engineer is trying to get approval to replace aging networking equipment. The justification for the purchase was that the office lost connectivity due to the devices becoming overloaded and overheated. What was the engineer using as justification? A. Change management B. Downtime/Uptime C. Disaster recovery D. Site survey
B
A network engineer needs to procure a product that scans content using a dictionary database/algorithm that looks for confidential and sensitive company information. What type of product would the engineer purchase? A. Logical Network Diagram B. Data Loss Prevention C. Floor Plan D. Change Management
B
A network engineer reviews a report that makes recommendations where the network is not meeting goals for performance or security. What is the name of this report? A. IDF/MDF B. Audit and Assessment Report C. Acceptable Use Policy D. Business Continuity Plan
B
A safety specialist reviews and updates the plan that addresses large-scale incidents that threaten the performance or security of the whole site. What is the name of this plan? A. SLA B. Disaster Recovery C. Site Survey D. SOP
B
A security administrator is investigating recent logins to a server that has been compromised. Which log should the administrator audit? A. Syslog B. Audit log C. Traffic logs D. OIDs
B
A sysadmin is looking to monitor the network devices by pulling data off of them remotely. What kind of network equipment functionality can the sysadmin use to accomplish this? A. Giant B. SNMP trap C. Runt D. Baseline
B
A sysadmin is running into the issue that traffic is getting dropped by the network equipment. After researching the issue, the sysadmin found that the individual packets were too small. What should the sysadmin configure to remove? A. Giants B. Runts C. Bandwidth D. Baseline
B
An organization recently renovated its office. The IT department has tasked an entry-level technician with moving equipment to the proper cubicles and setting the equipment up for each employee. However, there are no labels at each cubicle. What kind of document would help the technician place each computer at the correct cubicle? A. Rack diagram B. Floor plan C. Wiring diagram D. Site survey
B
Users at a company are complaining that while connected to the terminal server, Excel spreadsheet calculations are taking too long. They conduct a ping test and find severe latency. What would the sysadmin most likely add to the server to improve performance? A. Central processing unit B. Bandwidth C. Memory D. System life cycle
B
Which tool can a network administrator run to measure the network statistics of a building's network equipment? A. Baseline B. NetFlow C. Audit D. Traffic
B
A security auditor has gathered many logs from the core router and sees many dropped packets at random intervals. The auditor has collected enough data to report an ongoing security breach attempt. What type of malformed packets are likely being dropped but not alerting the network team? (Choose all that apply.) A. Duplex/speed B. Giants C. Runts D. Syslog
B,C
A company is developing a new office and has tasked the information technology department with creating a document to show where their electrical vendor needs to run electrical and internet cabling throughout the office. What kind of diagram would best accomplish this? A. Site survey B. Rack C. Floor D. Wiring
C
A disgruntled employee recently left the company but was able to copy corporate sensitive material from the work email to a personal email. What kind of policy did the company NOT implement to prevent this? A. Onboarding B. BYOD C. DLP D. Change management
C
A help desk technician is assisting the sysadmin in determining the best location for wireless access points. What kind of report should the technician generate? A. Wire diagram B. Remote access C. Site survey D. Rack diagram
C
A network engineer is expanding a remote office that is connected to the corporate office. What can assist the engineer in determining if there is enough reserve bandwidth to handle the extra user load, or if the basic package needs to be upgraded to support higher bandwidths? A. Netflow data B. MIBs C. Baselines D. Link state
C
A network engineer is tasked with resetting a switch back to its factory settings. During the process, the engineer fails to take a snapshot of a known "good" configuration prior to resetting the switch. What snapshot did the engineer fail to capture? A. Assessment B. Audit C. Baseline D. Change management
C
A network engineer is working to contract services with a third-party data center vendor. The sysadmin and the vendor signed a preliminary agreement to express an intent to work together. What kind of document did the network engineer sign? A. Onboarding policy B. Non-disclosure agreement C. Memorandum of understanding D. Service-level agreement
C
A network technician is purchasing a computer and wants to ensure that it has enough resources to fulfill the graphics intensive software requirement. What are they looking for? A. Jitter B. Latency C. Memory D. Bandwidth
C
A server administrator has created a new virtual client to host printers on the network. When adding new printers to the server, the administrator notices that the print queue is freezing the operating system when a new job comes to the server. What could the administrator upgrade on the virtual server to help with the print queue load? A. Link state B. CRC errors C. Memory D. CPU usage
C
A sysadmin is investigating an issue between two geographically distant offices. Users at these locations report that accessing the shared drive at the corporate office is taking too long, even though all three locations have gigabit-speed internet. What indicator could help direct the sysadmin to the issue? A. Processor B. Memory C. Latency D. Jitter
C
An administrator is concerned that too many employees are using "password123" with their username to log in to the corporate network. What can the administrator enforce that will not allow users to use that password anymore? A. Acceptable use policy B. Security policy C. Password policy D. Remote access policy
C
An administrator is installing patches on production systems and is following a detailed plan that outlines, among other things, exactly when the administrator can install the patches, how the administrator must deploy them, who approved the deployment into the production environment, and who the administrator must notify about the deployment. What is the administrator following? A. Baseline configuration B. Change management C. Standard operating procedure D. Business continuity
C
Employees are complaining that when browsing the company's web-based Customer Relationship Management system, it is very slow. The company has 500 employees that use this system and the contracted internet speed is 10Mbps download and 1Mbps upload. What should the sysadmin increase in order to improve access to the cloud system? A. Speed/Duplex settings B. Packet count C. Bandwidth D. Memory
C
Users are complaining that it is too difficult to access their computers due to a policy that enforces complexity and short password age. What kind of policy is the IT department enforcing? A. Acceptable use B. Onboarding C. Password D. Remote access
C
A help desk technician is working with the sysadmin to clean up old servers and network equipment in their tech closet. The help desk technician is having issues finding which server is the one that needs decommissioning. What kind of diagram would help the technician find the correct server? A. Site survey B. Wiring C. Floor D. Rack
D
A network consultant is looking into a matter where the interface is discarding incoming and outgoing frames. In this instance, the packets are too large. What is the name for these packets? A. Bandwidth B. Runts C. Uptime/Downtime D. Giants
D
A network consultant reverting a system to a known exemplary configuration realizes that a change in the network environment is required. Which plan/procedure will the consultant follow? A. BYOD Policy B. Disaster Recovery Plan C. Incident Response Plan D. Change Management
D
A network operations engineer is investigating alerts that the data center keeps switching to battery backup. What environmental factor should the engineer investigate? A. Temperature B. Flooding C. Humidity D. Electrical
D
A network technician is reporting historical data about connectivity to the corporate office. The technician has used records of connectivity issues to request an upgrade to the router in the area. What data is the technician using to request an upgrade? A. Syslog B. Link state C. Latency D. Uptime/Downtime
D
A sysadmin is setting up a new office for an employee. After hooking the computer up to the network with an ethernet cable, the sysadmin noticed the computer was not getting a connection. The sysadmin previously hooked up the corresponding patch panel port to the switch but is not seeing any lights on the port. What does the sysadmin need to configure on the switch to fix the connectivity issue? A. Jitter B. Packet count C. Bandwidth D. Link state
D
A tech team provides a network technician with a faulty device. The technician wishes to receive a new device that has the same foundational parameters that were loaded into the faulty device. What should the parameters on the new device be? A. Business Continuity Plan B. Change Management C. Audit and Assessment Report D. Baseline Configuration
D
An organization is putting an employee through security checkpoints that include a background investigation, account creation with proper privileges, assigning a laptop, and completing security training. What kind of policy is the employee under? A. BYOD policy B. Offboarding policy C. Remote access policy D. Onboarding policy
D
The Chief Information Officer canceled a contract with a third-party vendor since they refused to sign a contract to limit what uses of sensitive data are permitted, what storage and distribution restrictions to enforce, and what penalties to incur for breaches of the agreement. What kind of contract did the vendor fail to sign? A. AUP B. MOU C. SLA D. NDA
D
The sysadmin is receiving alerts that the servers are having issues. A Heat/Ventilation/Air Conditioning system failed in the server room. What alerts did the sysadmin receive regarding the servers? A. Bandwidth B. Memory C. Processing D. Temperature
D
Users are reporting that their phone calls are really garbled and of poor quality. What should the sysadmin investigate? A. Speed/Duplex Settings B. Logging levels C. Severity levels D. Jitter
D