Network plus certification mode

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

a company wants to connect devices so that there are many redundant interconnections which topology should the company use?

mesh

a consultant is setting up a small fish home office for a customer the customer's local cable TV provider will be the network ISP it which device should be used to connect to the cable signal?

modem

a company needs to deploy network devices that support configuration of multiple vlans and the ability to Route traffic between vlans which type of devices should the company use?

multi-layer switch

the project team has received the list of requirements for a new solution that would allow the company to store files in a local area network the proposal has to meet the following requirements be cost-effective and easy to deploy / provide redundancy to file storage offer at least 3 TB of space What should the project team Implement to meet these requirements?

n a s

which protocol provides time synchronization service over the global internet?

ntp

a company's wireless network is configured with a single WAP the number of wireless devices supported has increased rapidly since the company's implemented a bring your own device policy you just complain about lagging performance difficulty connecting and randomly being kicked off the network but most likely is the problem?

overcapacity

the network support team needs to determine whether data is being encrypted when it is sent over the network what process should the team use?

packet analysis

do Technical Services team prepares a drawing to document all network devices with their IP addresses device names and connection information which type of documentation does this represent?

physical Network diagram

a small company subscribes to a popular productivity application Suite all employees access the applications through a web browser interface Employee Store their data locally on their own computers which Cloud delivery model does this describe?

public cloud

a company routes Cat5e UTP cabling through a part of its manufacturing floor that generates a great deal of Emi the cables are routed Loosely through the ceiling about 3 minutes above the equipment computers connected to the cable and experienced communication errors anytime the equipment is running the company needs a reliable cost-effective solution management will not authorize converting to fiber optic cabling what should the company do?

replace the Cat5e UTP cable with the Cat5e STP cable

the nslookup fails and shows error in the exhibit what should the support team created to fix the problem?

reverse lookup Zone

which device should a company use to configure a new area within ospf?

router

a branch office has been allocated the subnet of 192. 168. 1. 64 / 26 which three IP addresses can be used for user devices at this location?

192. 168. 1. 98 / 192. 168. 1. 65 / 192. 168. 1. 111

the project team purchases in 8 Port layer 2 switch a router and a 8-port network Hub the router has two Wan interfaces F 0 / 0 and F 0 / 1 the network engineer connect the switch to port f0/0 in the hub to port f0/1 on the router how many collision and broadcast domains are available in this network

2 broadcast domains in 9 Collision domains

a company is preparing to deploy a WLAN in a newly constructed office space the network design specifies the minimum Channel bandwidth requirement as 80 megahertz what standard should the access point support?

802. 11ac

a company is wiring a new office space to support 1000BaseT ethernet. The network design calls for UTP cable the majority of the cable will be routed through a suspended ceiling which cable should the company use?

Cat5e plenum

provides standard rules and definitions for host addressing routing and data package structure

IP

pc-1 fails to receive an IP address in the network shown in the exhibit what should be configured to fix the problem?

IP helper address on router one

a company needs to tighten its network security this includes restricting access based on operating system and version current patch versions and anti-malware update devices failing to meet access requirements should be quarantined user access restricted and automated remediation initiated what should the company implement?

NAC

which layer of the OSI model do routers operate at

Network layer

a Network technical team needs to configure two network connections working in parallel between a server and a switch to improve available bandwidth this which is already configured to support the communication what should the team configure on the server?

Nic teaming

a device shows no network interface card activity with the network interface card is connected using a new patch cord and on-site Engineers suspect an incorrect type of cable and uses a cable analyzer to test the network cable the report is shown in the exhibit which devices could the engineer Connect using that cable?

router to a terminal server

a company is installing a large Rag Mountain infrastructure to support a web server Farm High availability is a critical concern for the company you need to recommend a solution that will ensure continued availability without interruption if AC line power is lost which type of Technology does a company need to ensure this?

UPS

a company is upgrading its network security it wants to consolidate content filtering and intrusion detection in a single device and add additional security functionality including data loss prevention what type of device do the company use?

UTM Appliance

a recent security audit revealed that users from all locations have full remote access to network devices which solution should be implemented to address that problem?

ACL

a company has ordered the table shown in the exhibit which of the following Wan Technologies would most likely be deployed?

ADSL

network administrator has been tasked with deploying a new wireless local area network controller which protocol is recommended for integrity checking and encryption?

AES based ccmp

a company wants to create a site-to-site VPN maximum-security is required which set of protocols should the company use?

AES for encryption and sha512 for hatching

which command line interface command should a systems administrator use to verify the hardware address of a device connected to a local area network?

ARP

a policy includes the following statement employees are not allowed to use company equipment to copy or distribute copyrighted material without the written permission of the holder of the copyright which policy would this statement be a part of?

AUP

a company and counters problems with an appropriate disclosure of company information including forwarding of sensitive emails and transfer files to off-site location and Company determines that the actions were inadvertent rather than malicious acts the company implements and employee training program to raise awareness about data security Technical Services is asked to put controls in place to help prevent these disclosures from occurring in the future what should technical Services use?

DLP

network engineer who wants to create a up link between two switches using a fiber optic cable which two standards could the engineer used to connect the cable to the switch?

GBIC and SFP+

accompanies wants to serve multiple client computers running an application installed on a computer that runs Windows Server 2016 the clients should be able to take advantage of the memory and processor resources on the server he's client will have a unique data set which technology should the company use?

RDP

users report that messages about duplicate IP addresses keep displaying on their computers what should technicians suspect as a Cause?

Rogue DHCP server

a company has deployed a new access point a network administrator wants to monitor proactively the number of connected clients in available resources using a secure protocol what layer 7 Network protocols should be used?

SNMP

a company must Implement additional monitoring and Analysis to meet compliance requirements for relating to work done for new customers the company needs a solution that can collect log events and other security information from a variety of sources and correlate and analyze the data to identify threats it should provide for a long-term storage of data collected and be able to identify trending threats what type of device solution should the company use?

Siem

used when acknowledgement and reliable delivery of data is not required and is connectionless

UDP

a company is expanding it's office space the current space is configured as a wired Network the new space will be set up as a wireless network the company needs to identify potential sources of interference in the network office space What should the company use?

Spectrum analyzer

a company needs a leased line connection supporting the transmission speed of 30 Mbps the which service should the companies use?

T3

a company wants to implement an authentication and authorization solution for network devices that also directly supports device management what should the company use?

TACACS+

provides rules for establishing connections and sending data between applications and is connection oriented

TCP

a company has deployed a new Microsoft Windows Server behind a firewall a systems administrator has been experiencing problems querying and modifying items in active directory from a remote location using an ldap base application what protocol should be allowed through the firewall?

TCP Port 636

pc-1 is unable to access the internet in the network shown in the exhibit what is the most likely cause?

a rogue DHCP server

a company needs to support a secure link for remote users to a web aware application that is deployed on a server in the perimeter and network the technical services department recommends using an SSL VPN to minimize the configuration changes needed in network firewalls the solution will use certificate-based authentication what is the minimum certificate requirement for this configuration?

a server-side certificate only

a company wants to deploy a new WLAN topology without running new electrical wiring the solution has to support the 5 gigahertz band mu - mimo and offer speeds of at least 2100 Mbps the company wants to use the PO e solution providing at least 25 watts of power for a connected device which two components should be used?

an access point supporting the 802. 11ac wave to standard/ a switch supporting the 802. 3 at standard

users report that they cannot access any resources on the internet using an FTP client it is determined that the connections have been denied by the firewall all hose from the local subnet of 192. 168. 1. 0/25 should have access which Access Control list rule should the company implement?

an outbound rule permit house from 192. 168. 1. Org 255. 255 the 255. 128 to access any host on TCP ports 20 and 21

a company has to access point as shown in the exhibit users report intermittent access issues what could the company do to fix this problem?

assign AP1 to channel 11 / change to 5ghz

a technician has established a plan of action to resolve a problem on a network switch then solution has been tested in a lab environment and the technician has a list of commands to execute after logging into the device he realizes that the TACACS server blocks the commands he passed to implement what should the technician do?

assign the task to another person or Department

an on-site inspection find said one fiber optic cable exceeds the bend radius that is recommended by the manufacturer what should be the main concern for the company?

attenuation

network devices in one area of the office building experience communication problems cable tester shows that the signal on the RX pair is lower than expected what is this an indication of?

attenuation

an alert indicates the loss of connectivity with a router the log shows the following line EGP sending 19x Keepalive to 11. 17. 2. 1(external AS 1471) failed, neighborhood down. TCP / 179 which routing protocol should be investigated?

bgp

which layer 2 security solution allows a network administrator to protect the topology against malicious STP messages?

bpdu guard

what is the logical topology of a network wired with multi-layer switches?

bus

a consultant is setting up a Soho for a customer the customer has requested a doccs is internet connection which type of service connection should the consultant configure?

cable

a restaurant offers public Wi-Fi access to the internet for its customers a customer is prompted with a web page that requires the customer to agree to abide by use policies while connected what is this an example of?

captive portal

a company is replacing a portion of its wired local area network with a Wireless local area network configured for Wi-Fi protected access two the company needs to use the most secure encryption protocol for WPA2 what protocol should the company implement?

ccmp - AES

a company's Network is shown in the exhibit pc-1 is unable to access any resources on network be what should the company do to fix the issue?

change the IP address on PC one

a recent Network audit has highlighted the security issues on the access point shown in the exhibit what should the company do?

change the authentication method to WPA2 - AES

the marketing team uses a software-as-a-service to store raw video files the team's record slow access to some resources on the software-as-a-service platform what should the network team do?

check the bandwidth

a computer host 3 virtual machines that are used as virtual servers and an internal virtual switch the technical services department needs to configure the virtual servers to give them access to a physical server deployed on the company local area network but not directly exposed to service to the physical Network what should they do?

configure a virtual firewall on the host

a file server is deployed on the company perimeter Network and is used to store reference materials and templates for forms all of the files are stored on the same disk partition files are downloaded from the server using FTP the company needs to be able to determine whether a file is changed while stored on the server what should the company do?

create a hash for each file

a service technician test and confirms a theory for the probable cause of a problem what should the technician do next?

create a plan of action

which media access method is used with 802. 11 RTS CTS Network configurations and is not able to detect collisions during Transmissions?

csma / CA

what is the purpose of onboarding in off boarding procedures?

defining activities when an employee joins or leaves in organization

a company wants to interconnect several offices the solution has to be secure scalable and should not require any changes to the existing agreements with ISP which solution would meet the company's objectives?

dmvpn

what is a secure multi-point IP hub-and-spoke Wan configuration that supports direct communication between spokes?

dmvpn

a technician configures an access point as shown in exhibit he creates a list of Mac addresses to allow on the network using Mac filtering this ignition realize that despite this configuration any device can still connect what should the technician do?

enable Mac filtering globally

which of the following is an example of a valid multi-factor authentication factors

facial recognition in pain

a company wants to deploy a web server in a new demilitarized zone which device should the company use to configure a new network is owned and layer 7 filtering policies?

firewall

a company collects Network traffic data from multiple subnets detailed analysis indicates that packets are being dropped by one of the routers technician suspect this is due to miss configured firewall Access Control list where should technicians look for more detailed information?

firewall logs

users report that they have lost access to a network shared Drive they open a new help ticket and expect a quick resolution to the problem what should a technician do next?

gather more information from the users

a company recently implemented a BYOD policy and is adding security controls over personal devices the company wants to ensure that some manage apps and most company data will be unavailable when a device leaves a corporate campus what should the company use to implement this?

geofencing

which metric is used to determine route when using r i p

hop count

a company has its own common rooms and an on-premises data center containing all of his servers and network devices a network engineer wants to add some Cloud on demand Solutions to the existing infrastructure mean which Cloud Model should the company use?

hybrid

a company network is wired with 10 / 100 / 1000 multi-layer switches and Cat6 UTP cable the company wants to implement a San using the existing infrastructure which connection types of the company use?

iSCSI

a company contracts with a cloud provider the cloud provider is responsible for virtualized Hardware storage and network support the company is responsible for installing licensing and maintaining the operating system and survive locations what type of service does this describe?

iaas

used for communication error reporting and troubleshooting with diagnostic utilities

icmp

users connect to the network using Wireless laptops and Report intermittent access issues with a Nas server the access point and the NAS server are connected to a switch using a 100mbps link the status of the access point as shown in the exhibit what should the support team do to fix the connectivity issue?

install more access points

what is the role of an MIB when implementing SNMP for Network management

it is a collection of manageable device definitions that it identifies the device property information

which protocol is open vendor-neutral standard protocol for accessing and maintaining directory services?

l d a p

a medium sized company is moving into a new office space to office is being pre-wired with Cat6 cabling employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible what should Technical Services use to ensure this?

labeling

a company wants to connect a remote office using a satellite internet service what should be the main concern for this deployment?

latency

systems administrator cannot ping a file server running Windows Server users can access files on the server without any problems which is the administrators check?

local firewall rules

one of the companies office areas as shown in the exhibit the Shaded area shows where devices can get a reliable connection with a access point devices with the unshaded area are either unable to connect to the access point or have a weak connection the company plans to deploy a wireless range extender where should the company deployed the wireless range extender click to indicate the best location

location B

what are smart cards used for in computer networking?

log on and Authentication

a company subscribes to connect all of its offices to a local man the man uses a single mode fiber backbone the company needs to connect its offices to the backbone each office has a wired router with a firewall a 10 - 100 - 1000 switch and is wired with UTP cable each office also has a wireless access point connected to the switch which device should the company use to connect to the man?

media converter

technicians want to test a series of patches before applying them on multiple servers the test server is moved on to a private local area network technicians need a ways to quickly return the test server to its state immediately before the patches are installed in case of any problems with the technicians do to prepare for the test?

run a full backup on test server

a network team has deployed a new S I P trunk what will most likely be used by in users in this network?

softphone

a company has several employees who work from home at least part of the time a data analysis application is used extensively in the company office but employees are not authorized to copy the application and use it from their homes what type of policy does this demonstrate?

software licensing

an internet service provider has installed a dwdm device at a new location what would be the most likely reason for that?

solve the fiber exhaust problem

a large organization has offices in several locations around the world geographic location has primary responsibilities for is Network Administration and management the company wants to ensure consistent instructions and management throughout the company what should the company use to help ensure this?

standard operating procedures

which two attack types are examples of social engineering attacks?

tailgating and phishing

thank you accompany deploys 6 new computers that are configured with automatic address assignment to the 192. 168. 4. 0 / 26 subnet the DHCP server that hosts of the scope of the subnet is deployed on the same subnet for of the new computers are able to lease valid IP addresses the remaining two computers have the following addresses 169. 254. 12. 7 + 169. 254. 14. To what is most likely wrong?

the DHCP scope is exhausted

a technician has configured a new SSID on a access point using the 5 gigahertz frequency he has connected to it with a mobile phone a test laptop is unable to show the new SSID in the list of available networks what would be most likely the reason for that

the laptop has a single band wireless card

a company runs call center services with 25 agents agents report that their soft phones have random quality issues which performance parameter should be verified in the network?

the maximum of 150 Ms of delay

which mechanism is used by TCP to setup and synchronize a new TCP/IP connection?

three-way handshake

a company wants to open a new office a wireless site survey reveals that there are 12 access points in the area immediately around the office and that they use channels 1 6 and 11 what should the company do to address the interference problem?

use 5 gigahertz band

a security audit highlights some security concerns in a newly deployed sdn process one of the scripts uses the verify md5 command to check the image Integrity in it uploads it to a server using FTP what should the company do to address the security concerns?

use sha512 for file integrity and FTPS for uploads

users complain about intermittent connection issues with a file server a junior technician has gathered all information and determined that no changes have been made in the network what should the technician do next?

use the OSI model to establish the theory of probable cause

for redundancy purposes a network engineer installs a new router and enables a load balancing protocol what type of address should he assigned as a default gateway to end devices?

virtual IP


Ensembles d'études connexes

Enzymes and hormones of the digestive System

View Set

Assessment and Care of Patients with Ear and Hearing Problems

View Set

Chapter 5: Price Controls and Quotas: Meddling with Markets

View Set

What Are Natural Resources? Practice - 100%

View Set

Common Ethical Issues Unit 2 Lesson One Personal versus Organizational Ethics

View Set

Physics 180B - Ch. 16-21 - Concepts (HW + Modules)

View Set