NETWORK+ W explanations

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Michael has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, what subnet mask should he use for this subnet? /30 /29 /28 /24

/30 An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses. In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the number of bits used for host addressing. If we apply the formula (22 - 2), a /30 subnet mask will provide 2 IP addresses.

An administrator is upgrading the switches in the server room to support 10 Gbps of throughput. The switch will need to take advantage of the existing CAT6a lines that run to each server. What Ethernet standard should be used? 10GBaseSW 10GBaseFX 10GBaseT 10GBaseSR

10GBaseT CAT6a can reach speeds of 10 Gbps over 10GBaseT cables. The other cables listed are all fiber cables, and not CAT6a.

A company has a network with three switches, each one with eight ports. The switches are connected to a router that has a hub with four computers plugged into its interface ports. How many broadcast domains are in this network? 16 5 2 1 28

2 A broadcast domain is a logical division of a computer network in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments. Routers break up broadcast domains, therefore there are two broadcast domains in this network - one for each side of the router (three switches in one and the hub in the second).

A network administrator needs to allow employees to upload files to a remote server. What port should be allowed through the firewall? 20 161 21 23

21 Port 21 or FTP (File Transfer Protocol) is used to transfer files between computers and servers. If you needed to use secure file transfer, you would use port 22 (SFTP).

What default port is associated with network protocols that is connectionless? 80 2427 3389 442

2427 Port 80 (HTTP), Port 443 (HTTPS), and Port 3389 (RDP) are all connection-oriented protocols which rely on TCP. They require a connection being established between two hosts in order to verify delivery of the data and error checking during data transfer. Port 2427 is used for Media Gateway Control Protocol, which relies on UDP (a connectionless protocol).

Host1's application generates a payload of 2500 bytes of data and sends it to Host2. When the application on Host2 receives the payload it will be: more than 2500 bytes due to encapsulation less than 2500 bytes due to decapsulation 2500 bytes in size

2500 bytes in size The payload is the data to be transmitted. The extra pieces added or removed during encapsulation are in addition to this payload size.

An organization is required to implement a wireless network. The organization must implement wireless routers compatible with 802.11ac protocol that have maximum possible range. What wireless router frequency is a viable option? 2.4GHz 5.0GHz 6.0GHz 3.7GHz

5.0GHz Wireless AC uses 5.0 GHz for wireless transmission, whereas Wireless B/G uses 2.4 GHz.

A company has decided to upgrade its legacy phone system to VoIP. The new phones will download the configurations from a TFTP server each time they boot up. What firewall port must be opened to ensure the phones can communicate with the server? 53 161 20 69

69 TFTP uses port 69 to communicate.

What should a technician upgrade to if the existing wireless standard only allows for three non-overlapping channels and more non-overlapping channels are needed? 802.1q 802.11g 802.11n 802.11b

802.11n Wireless b and g only support 3 non-overlapping channels (1, 6, 11), but Wireless n supports 5 GHz spectrum which provides dozens of non-overlapping channels.

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. What is the MOST likely source of the problem? Bad SFP in the PC's 10/100 NIC 802.1q is not configured on the switch port APIPA has been misconfigured on the VLAN OS updates have not been installed

802.1q is not configured on the switch port APIPA addresses are self-configured and are used when the client is unable to get proper IP configuration from a DHCP server. One possible source of this problem is a misconfigured switch port that the computer is connected to. The 802.1q protocol is used to configure VLAN trunking on switch ports.

A company needs to implement stronger authentication by adding an authentication factor to their wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement? WPA2 with complex shared key 802.1x using EAP with MSCHAPv2 PKI with user authentication MAC address filtering with IP filtering

802.1x using EAP with MSCHAPv2 Since the back end uses a RADIUS server for back-end authentication, the network administrator can install 802.1x using EAP with MSCHAPv2 for authentication.

What is the number of bits in 1024 bytes? 512 4096 8000 8192

8192 multiply 1024 x 8 1 byte = 8 bits

A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem? A backdoor has been installed to access the network TACAS/RADIUS misconfiguration is causing logs to be erased The last ACL on the router is set to Deny All ICMP ping of death is resetting DHCP and DNS on the server

A backdoor has been installed to access the network A hacker or the previous administrator (consultant) left a piece of software or an SSH protocol to be able to allow themselves access to the network in order to change the server settings. The consultant may be disgruntled that their contract was cancelled and that the new network administrator was hired to replace them.

What requires the network administrator to schedule a maintenance window? A minor release upgrade of a production router a major release upgrade of a core switch in a test lab when a company-wide email notification must be sent

A minor release upgrade of a production router During an update of a production router, the router would not be able to route packages and the network traffic would be affected. It would be necessary to announce a maintenance window. A maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could cause disruption of service may be performed.

A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause? an evil twin was implemented The user is connected to a botnet A successful WPS attack has occurred The user is experiencing ARP poisoning

A successful WPS attack has occurred Successful WPS attacks happen when the default username/password etc. has not been changed or reconfigured on the router. If your default username/password hasn't been changed, anybody can get into the settings and open the network. This is why additional unknown devices are on the network.

What happens when convergence on a routed network occurs? all routers use route summarization All routers have the same routing table All routers learn the route to all connected networks all routers are using hop count as the metric

All routers learn the route to all connected networks Routers exchange routing topology information with each other by using a routing protocol. When all routers have exchanged routing information with all other routers within a network, the routers are said to have converged. In other words: In a converged network, all routers "agree" on what the network topology looks like.

What is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? Analog modem Access point Multilayer switch docsis MODEM

Analog modem An analog modem is a device that converts the computer's digital pulses to tones that can be carried over analog telephone lines, and vice versa. The other type of Internet connection that occurs over an RJ-11 (phone line) is DSL.

A system administrator wants to verify that external IP addresses are unable to collect software versioning from servers on the network. What should the system administrator do to confirm the network is protected? Analyze packet captures Utilize netstat to locate active connections Use nmap to query known ports Review the ID3 logs on the network

Analyze packet captures Captured packets show you the information that was travelling through certain files, etc. Packet sniffers detail the information they've received, so working through those would show if the external network shows or details software versions.

A firewall technician configures a firewall in order to allow HTTP traffic as follows: Source IP Zone Dest IP Zone Port Action Any Untrust Any DMZ 80 Allow The organization should upgrade to what technology to prevent unauthorized traffic from traversing the firewall? HTTPS Application aware firewall Stateless packet inspection IDS

Application aware firewall Application aware firewall can analyze and verify protocols all the way up to layer 7 of the OSI reference model. It has the advantage to be aware of the details at the application layer. Since we desired to allow HTTP traffic, we must deal with the traffic at the application layer.

A company wants to create highly-available datacenters. What will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at their own site goes down? VRRP Load Balancer OSPF BGP

BGP If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available.

What is used to proxy client requests for IP configurations across different network segments? DHCP relay teredo tunneling SOCKS reverse proxy

DHCP relay A DHCP client is an Internet host using DHCP to obtain configuration parameters such as an IP address. A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to forward requests and replies between clients and servers when they are not on the same physical subnet.

A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP address automatically. What is the cause of the problem? DNS Wrong TCP port DHCP scope Split horizon

DHCP scope The DHCP scope is used as a pool of IP addresses that can be assigned automatically. The issue might be that there are no more IP addresses left in the scope.

An administrator's network has OSPF for the internal routing protocol and has two interfaces that continue to go up and down. The administrator reviews the following output: Fast ethernet 0 is up, line protocol is up Int ip address is 192.24.120.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100Base Tx/Fx Received 1052993 broadcasts 1258 input errors 983881 packet output, 768588 bytes 1747 output errors, 0 collisions, 423 resets What problem would cause this issue? Duplex mismatch Bad wire Incorrect encapsulation Wrong IP address

Duplex mismatch The duplex mismatch can cause issues where the interface will continually go up and down, or "flap".

A company suffers an outage due to a bad module in a core switch. What is the FIRST step to conduct in troubleshooting? Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat gather information, start at the top of the OSI model, and work down Establish a plan of action to solve the problem Gather information, start at the bottom of the OSI model, and work up.

Establish a plan of action to solve the problem The first step is to establish a plan of action to resolve the problem and identify potential effects.

A network technician is replacing a client's security devices which protect their DMZ. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application. What is likely misconfigured and causing a problem? DNS Firewall DHCP Content filter

Firewall A firewall is an integral part of a DMZ. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server. This is different from a content filter because a content filter simply denies traffic to a user based on content, but not access to a server. If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to "deny by default".

What protocol is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections? ESP MPLS PPP GRE

GRE Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route other protocols over IP networks.

A technician is in a large room that contains a large amount of industrial equipment. The technician would like to record the usable bandwidth between devices in a wireless network and the access point. What should the technician be documenting? EMI Goodput Latency Jitter

Goodput Goodput is the rate at which useful data goes through a data link.

During a business trip, a user connects to the hotel's wireless network to send emails to customers. The user notices the next day that emails have been sent from the user's account without consent. What protocol was used to compromise the user's email password utilizing a network sniffer? HTTP SSL TFTP DNS

HTTP HTTP is an unsecured protocol and information is passed without encryption. If the user signed into their webmail over HTTP instead of HTTPS, a network sniffer could compromise the username and password.

Which of the following would be the BEST addition to a business continuity plan to protect the business from a catastrophic disaster such as a fire, tornado, or earthquake? Hot sites or cold sites UPS and battery backups building generator Fire suppression system

Hot sites or cold sites Although all answers are adequate suggestions to aid in business continuity, the addition of a hot or cold site is the BEST option. A hot or cold site is a commercial service that provides all equipment and facilities to allow a computer or networking company to continue operations in the event of a catastrophic event. In the case that the building has been destroyed, the hot/cold site is the only option that will allow the business to continue their operations effectively.

What is a connectionless protocol? SSL ICMP TCP SSH

ICMP A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready, or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples.

What is considered a classless routing protocol? IGRP IS-IS RIPv1 STP

IS-IS IS-IS is known as a classless protocol. Classless routing protocols are those protocols that include the subnet mask information when the routing tables or updates are exchanged.

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. What is the QUICKEST option to configure a replacement switch? Syslog Image Archive Baseline

Image The baseline is only to give you an idea on how it works before any changes are made. The archive won't explain much and syslog is a windows feature. Process of elimination shows that an image would work best. To image a switch, you can make a backup of the configuration and deploy it to a new/different switch.

A facility would like to verify each individual's identity prior to allowing access to its server room and datacenter. Additionally, the building should ensure that users do not tailgate behind other users. What solution would BEST meet these requirements? implement a security guard at the facility entrance and a keypad at the data center entrance implement a CCTV camera and a proximity reader at the data center entrance Implement a biometric reader at the datacenter entrance and require passage through a mantrap

Implement a biometric reader at the datacenter entrance and require passage through a mantrap A biometric reader would read the employee's fingerprints. A mantrap is most often used in physical security to separate non-secure areas from secure areas and prevent unauthorized access.

What describes the ID of a specified native VLAN when traffic passes over a trunk? it becomes the gateway of last resort for the switch or router it becomes the priority ID for all VLAN traffic across the device It becomes the default VLAN for the untagged frames

It becomes the default VLAN for the untagged frames Trunk ports carry all traffic, regardless of VLAN number, between all switches in a LAN. The VLAN designation for a trunk port is its native VLAN. If the trunk port has a native VLAN that differs from the tag placed on the frame as it entered the access port, the switch leaves the tag on the frame and sends the tagged frame along to the next switch or switches. If the trunk port's native VLAN is the same as the access ports VLAN, then the switch drops the tag and sends the untagged frame out the trunk port.

A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. What feature should he employ? Subnetting LWAPP VLAN pooling WPA2

LWAPP LWAPP is the best choice because it serves as a standard single point that allows quick and efficient management of multiple wireless devices at a time.

What transmission method is used for network utilizing the 802.3 standard? Synchronus DSSS MAC Baseband Broadband

MAC Media Access control (MAC) is used for wired Ethernet data links. 802.3 is the standard for Ethernet networks.

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the Internet via the kiosk's wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk? Host-based antivirus Firewall MAC filtering Web filtering

MAC filtering MAC Filtering will control access to the network by restricting access to only certain devices.

A company is having a new T1 line installed. What device does this connection MOST likely terminate to? MDF IDF Ethernet router core switch

MDF The telecom company usually terminates the circuits at the Main Distribution Facility (MDF).

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. What needs to be added to allow the network management tool to interpret the new device and control it using SNMP? GET WALK TRAP MIB

MIB Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol. It would allow whatever tool to correctly interpret the information received.

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. What allows 802.11n to reach higher speeds? LWAPP MU-MIMO PoE MIMO

MIMO One way 802.11n achieves superior throughput is through the use of a technology called multiple input, multiple output (MIMO). MIMO uses multiple antennas for transmission and reception.

Susan is a network administrator who is in the process of preparing and cleaning network switches for resale. She splashes the cleaning agent in her eye and needs to know the procedure to do in order to cleanse her eye. Where should she look to find the right procedure? EULA MOU SLA MSDS

MSDS The Manufacturers Safety Data Sheet (MSDS) lists the chemical composition of the solution and states the relevant protocol for first aid treatment.

During what period should all scheduled work on production network equipment be scheduled? Maintenance window Development life cycle down time business hours

Maintenance window By using a Maintenance Window, all downtime is limited and the organization can prepare in advance for the scheduled work to be carried out.

A user reports slow performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg. % Processor Time = 15% Avg. Pages/Second = 5 Avg. Disk Queue Length = 1 Based on these results, what is the issue? Memory NIC Processor Hard drive

Memory The processor reads data based on how much RAM is in a system. If it takes longer to access certain things, adding more RAM could help the processor work at a higher rate of speed. The Average Pages/Second at 5 is considered high in most cases, so additional RAM should be added to the machine.

Tim is a network administrator who is setting up three additional switches in his test lab. While configuring the switches, he is verifying the connectivity but finds that when he pings one of the switches using its IP address, he receives "Destination Unreachable". What kind of issue is this? DoS attack Misconfigured DNS settings Misconfigured Split Horizon RADIUS authentication errors

Misconfigured Split Horizon Split horizon is a method of preventing a routing loop in a network. If it is misconfigured, the switches would be unable to communicate with each other. None of the other answers provided would prevent communication between the switches.

What network infrastructure implementations would be used to connect two remote sales machines back to the main campus for all data and voice traffic? Multimode fiber (MMF) MPLS Satellite Crossover cable

Multimode fiber (MMF) Multimode fiber can carry different types of data signals over short distances without losing any integrity. A crossover cable maxes at 300ft (cat5e) satellite works over line of sight technology and sometimes the signal isn't great, and MPLS is based on a short path rather than a long path.

While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. What should the network technician utilize to verify if this is a concern? Network diagram Real-time monitor Network baseline Log management

Network baseline High network traffic can be a sign of a possible attack conducted either by an insider or someone out of the network to steal relevant information. By reviewing the network baseline, the network technician can determine if the traffic is actually high and if any configurations of the network are out of baseline causing the issue.

It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than the others on the network. What is this an example of? Network device CPU issues Network device power issues SAN issues Delayed responses from RADIUS

Network device CPU issues Routing decisions must be processed by the router, which relies on the networking device's CPU.

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform? Network-based anti-malware Host-based anti-malware Cloud-based anti-malware Signatrue based anti-malware

Network-based anti-malware The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.

What concept is the MOST important for a company's long-term health in the event of a disaster? Implementing an AUP Offsite backups UPS Vulnerability scanning

Offsite backups In case of a disaster, you must protect your data. Some of the most common strategies for data protection include backups made to tape and sent offsite at regular intervals.

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, what should the technician do to prevent the password from being sniffed on the network again? ensure the password is 10 characters, containing letters and numbers Only allow administrators to access routers using port 22 Copy all configurations to routers using TFTP for security Use SNMPv1 for all configurations involving the router

Only allow administrators to access routers using port 22 Port 22 uses SSH to authenticate a remote computer or user, or in this case, an administrator. Even if the router has been compromised, the new full rights user would not be able to access their new account without the SSH key, which could only be provided by a true administrator. Telnet uses port 23 and passes all information as unencrypted traffic on the network. Telnet should always be disabled for security reasons and SSH (which uses encryption) should be used instead.

A network technician needs to monitor the network to find a user that is browsing websites that are against the company policy. What should the technician use to view the website and find the user browsing it? Packet sniffer SNMP GET Top listener tool IDS

Packet sniffer Packet Sniffers can capture and analyze network user traffic. This information can be queried to view website addresses, contents, and sometimes even the password information. This differs from an intrusion detection system in that IDS' wait to receive implicitly-malicious data in a network prior to logging the event.

An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. What cloud services is the administrator using? Private Iaas Public Iaas Hybrid Saas Community PaaS

Public Iaas Infrastructure as a Service (IaaS) is the foundation of cloud computing. Rather than purchasing or leasing space in expensive datacenter, labor, real estate, and all of the utilities to maintain and deploy computer servers, cloud networks, and storage, cloud buyers rent space in a virtual data center from an IaaS provider. They have access to the virtual data center via the Internet. This type of cloud computing provides the "raw materials" for IT, and users usually only pay for the resources they consume, including (but not limited to) CPU cores, RAM, hard disk or storage space, and data transfer. Since this cloud provider is available to all companies to use, much like Microsoft Azure or Amazon Web Services, this is an example of a Public IaaS or Public Cloud.

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration? RADIUS FTP DNS Kerberos

RADIUS RADIUS is used to centrally manage credentials for network devices. TACACS is an older username and logon system that uses authentication to determine access, while RADIUS combines authorization AND authentication. For this question, either RADIUS or TACACS would be an acceptable answer.

What is an example of a signaling protocol used in VoIP telephony? VRRP SIP H 323 RSTP

SIP Process of elimination: VRRP is the (virtual router redundancy protocol) that automatically assigns IP routers to hosts H 323 is something that works with A/V (audio visual) RTSP is a real time streaming protocol designed to control media servers SIP is a session initiation protocol. SIP is a signaling protocol used on the application layer.

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. What type of monitoring should be put in place? NIDS SMS SMTP SNMP

SNMP The keyword is MONITORING. SNMP stands for Simple Network Management Protocol. SMTP is simple mail TRANSPORT protocol. NIDS is network intrusion detection system SMS is short message service. So, knowing what all of them stand for helps you to understand if the goal is simply to manage the server and send alerts from client to server. Based on these information, SNMP is the best choice.

What allows a telecommunication company to remotely test circuits of customers? VLAN configuration Smart jack RDP Toner probe

Smart jack Smart jacks have built-in remote diagnostics.

An end user receives a new computer and now is unable to connect to a database using ODBC. Other users are able to connect successfully, and the network technician is able to successfully ping the database server but still is unable to connect. What might have caused this issue? Missing IP routes on router Wrong default gateway address Failing NIC Software firewall is blocking ports

Software firewall is blocking ports A change in the firewall settings to allow access to the specified ports will fix the problem. It appears the default firewall on this new computer is blocking the port used to communicate with the database server. Open Database Connectivity (ODBC)

A project manager is tasked with the planning of a new network installation. The customer requires that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. What should the project manager provide the customer? Security policy Statement of work SLA AUP

Statement of work A Statement of work (SOW) is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

An administrator has a physical server with a single NIC. The administrator intends to deploy two virtual machines onto the single physical server. Each virtual machine needs two NICs, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, what should the administrator do to meet the requirements? The administrator should create a virtual switch that is bridged to the corporate network, and a second virtual switch that carries intra-VM communication only The administrator should create a virtual switch to bridge all of the connections to the network; the the virtual heartbeat NICS should be set to addresses in an unused range The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC

The administrator should create a virtual switch to bridge all of the connections to the network; the the virtual heartbeat NICS should be set to addresses in an unused range By bridging all of the connections to the network, it allows for faster communication between the virtual machines (hosts). The heartbeat is set on unused address range in order to ensure there is no chance of data collision or loss of signal.

A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments in the rack. What is the likely cause of the problem? The bend radius of the cable has been exceeded The OC3 was improperly provisioned The cable was improperly crimped The new OC3 cable is experiencing EMI

The bend radius of the cable has been exceeded A fiber cable (like an OC3) should not be bent more than 45 degrees or it will break the connection.

A network administrator is configuring one distribution and five access switches which will be installed in a new building. What is the BEST physical location for the equipment? All switches should be placed in the MDF to leave room in the IDF for servers All switches should be placed in the IDFto leave room in the MDF for servers The distribution switch in the MDF and access switches in the IDF The distribution switch in the IDF and access switches in the MDF

The distribution switch in the MDF and access switches in the IDF Distribution switches should be placed in the Main Distribution Facility (MDF) and the access switches would be placed in the IDF closer to the end users.

A technician installs three new switches to a company's infrastructure. The network technician notices that all the switch port lights at the front of each switch flash rapidly when powered on and connected. Additionally, there are rapidly flashing amber lights on the switches when they started up the next day. What is happening to the switches? The switches are connected and detected a spanning tree loop The switches are running through their spanning tree process The switches are not functioning properly and need to be disconnected the switches are having problems communicating with each other

The switches are running through their spanning tree process Explanation The switches use the spanning tree process to ensure no routing loops will occur.

An employee of a highly-secure company needs to use facial recognition in addition to username/password to successfully establish a VPN. What BEST describes this methodology? federated identity PKI Biometric authentication Two-factor authentication

Two-factor authentication This would classify best as two-factor authentication, since it requires "something you are" (face) and "something you know" (username/password) for successful authentication to occur.

What network element enables unified communication devices to connect to and traverse traffic onto the PSTN? Access switch UC server Edge router UC gateway

UC gateway Unified Communications (UC) enables people using different modes of communication, different media, and different devices to communicate with anyone, anywhere, at any time. To accomplish this, a UC gateway is needed.

A network technician has been dispatched to investigate sporadic network outages. After looking at the event logs for the network equipment, the network technician finds that the network equipment has been restarting at the same time every day. What should the technician deploy to correct this issue? UPS Grounding bar rack monitoring Air flow management Surge protector

UPS An Uninterruptible power supply (UPS) is a battery system that can supply short term power to electrical units. Since all the devices are restarting at the same time, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts.

A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building? Use different SSIDs on different channels and VLANs Use the same SSIDs on different channels and AP isolation Use different SSIDs on the same channels with VLANs Use the same SSIDs on same channels with AP isolation

Use the same SSIDs on different channels and AP isolation For users to be able to seamlessly migrate between the two buildings, both Access Points (AP) must use the same SSIDs. They must be on different channels though. Otherwise, interference could occur. Access Point (AP) isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.

A network technician has just received an email regarding a security issue detected on the company's standard web browser. What will MOST likely fix the issue? Vulnerability patch driver update OS update firmware update

Vulnerability patch

Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature, as well as its risk severity. What solution would work best to find this data? Virus scan Security policy penetration scan Vulnerability scan

Vulnerability scan A vulnerability scanner is a computer program designed to assess computers, computer systems, networks, or applications for weaknesses. Most vulnerability scanners also create an itemized report of their findings after the scan.

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. What should the technician check FIRST during troubleshooting? Encryption type WAP SSID WAP placement Bandwidth saturation

WAP placement For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building's construction doesn't cause interference with the wireless signals.

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented? WPA personal MAC filtering WPA2 enterprise WEP

WPA personal Since he wishes to use a pre-shared key and not require an authentication server, the most secure choice is WPA personal. WPA2 Enterprise is actually a more secure choice, but it requires a RADIUS authentication server to be used.

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PCs that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT 5e cables are available, what network device should the technician use to connect all the devices to the wireless network? Default WAP Wireless bridge Wireless router VPN concentrator

Wireless router Wireless bridge and WAP are both examples of wireless network extenders. They will not work without a wireless router. Also, a wireless router has physical Ethernet ports in order to connect the older desktop PCs using a NIC.

A network administrator needs to install a centrally-located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. What firewall type should the administrator install? a stateful network-based firewall a stateless network-based firewall a host-based stateful firewall a host-based firewall

a stateful network-based firewall A stateful firewall enhances security through the use of packet filtering and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network.

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device, and when the device was reassigned. What BEST describes these actions? asset management change management baselines network map

asset management Documenting the location, the user of the device, and the date of the reassignment would be part of the asset management.

The network technician has received a large number of complaints from users that there is poor network performance. The network technician suspects a user may have created a malicious flood on the network with a large number of ping requests. What should the technician do? block all ICMP requests update all the antivirus software remove all suspected users from the network upgrade firmware on all network cards

block all ICMP requests Ping requests use the Internet Control Message Protocol to send operational information about a host or router. Blocking all ICMP requests would eliminate the ping request flood, although it may become harder to diagnose network issues in the future as ICMP is used heavily in network troubleshooting.

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is in the works. What should the administrator do to mitigate this risk? downgrade the server and defer the new feature testing utilize WAF to restrict malicious activity to the internet server enable HIPS to protect the server until patch is released enable the host-based firewall on the internet server

downgrade the server and defer the new feature testing Since the vendor stated that the new version introduces vulnerabilities in the environment, it is better to downgrade the server to the older and more secure version until a patch is available.

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation? data transport first responder encryption eDiscovery

eDiscovery Process of elimination: Data transport is the transport of data while the First responder is the "first responder" and encryption is a method of putting data into a tunnel so it's completely secured. That leaves us with eDiscovery.

An administrator's router with multiple interfaces uses OSPF. When looking at the router's status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets replace the line card enable the connection port put the IP address in the right broadcast domain set the loopback address set the OSPF to area 0

enable the connection port Since the line protocol is down, you will need to enable the connecting port to restore the connection.

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. What is MOST likely being implemented at the site with less issues? end-user awareness training vulnerability scanning consent to monitoring business continuity measures

end-user awareness training Users should have security awareness training and should have accepted and signed acceptable use policy (AUP) agreements. User awareness training is one of the most significant countermeasures the company can implement.

A company has a secondary datacenter in a remote location. The cable management and power management are handled by the datacenter staff, while the building's security is also handled by the datacenter staff with little oversight from the company. What should the technician do to follow the best practices? secure the patch panels secure the UPS units Ensure power monitoring is enabled ensure rack security

ensure rack security By ensuring rack security such as locks, RFID card locks, and swing handles, the technician adds an extra layer of security to the servers which is a best practice.

A technician is helping a SOHO determine where to install the server. What should they consider first? cable length equipment limitations environmental limitations compatibility requirements

environmental limitations SOHO stands for Small Office / Home Office. A SOHO network is typically a small network. Being a small network, it is unlikely that it will have a datacenter or even a dedicated server room. Therefore, they should consider the environmental limitations (power, space, and cooling) first.

A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. What type of media would be the BEST to meet this requirement? fiber optic cable CAT5e cable CAT3 cable Coax cable

fiber optic cable To achieve 10 Gbps, you should use CAT 6a or a fiber cable. Since CAT6a isn't an option, fiber is the best answer here. CAT 5e can only operate up to 100 meters at 1 Gbps of speed.

What technology is designed to keep system's uptime running in the event of a disaster? Load balancing caching engines high availability QoS

high availability If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration.

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. What could be implemented to redirect any attackers on the network? Honeypot Content filter DMZ Botnet

honeypot A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and seems to contain information or a resource of value to attackers, who are then blocked.

What Ethernet feature will allow increased FCoE network throughput as long as all network devices recognize its specific size? frame relay jumbo frame equal cost multipath QoS TCP offloading

jumbo frame By allowing jumbo frames, network throughput can be increased.

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request come directly from management, and there is no time to go through the emergency change management process. What should the technician do? wait until the maintenance window and make the requested change make the change, document the requester, and document all network changes send out a notification to the company about the change

make the change, document the requester, and document all network changes While this is a difficult situation, the best answer is to make the change, document the requester, and document all the network changes. Since the request came directly from management, if they have sufficient authority to authorize the change, it can be performed outside of the emergency change control process. This should be a RARE occurrence.

What is the network topology in which all nodes have point to point connections to all other nodes known as? Bus Mesh Star Ring

mesh A mesh network is a network topology in which each node relays data for the network.

A user has a network device that streams media to the local network, and the device is visible on the network. All PCs on the LAN can ping the device and all the firewalls are turned off. The streaming device appears to be functioning properly, but the media won't stream when requested. What TCP/IP technology is not being implemented? broadcasts multicast anycast unicast

multicast Multicast is not implemented properly because that is the TCP/IP technology that sends out packets to the requested devices. As opposed to broadcast (one-to-all), which sends out packets to all devices, multicast (one-to-many-of-many/many-to-many-of-many) only sends packets to many that are specifically requested but not all. Multicast would need to be implemented to route the network device to the LAN so that streaming can function properly.

Two office buildings are connected via copper network cabling buried in the ground. During local construction, the second building suffers a permanent network outage. What is the MOST likely cause of the outage? signal attenuation electromagnetic interference cross-talk open circuit

open circuit Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut/broken.

A company has added a lot of new users to the network that is causing an increase in network traffic by 200%. Original projection by the engineers was that the new users would only add 20-30% more network traffic, not 200%. The network administrator suspects that a compromise of the network may have occurred. What should the network administrator have done previously to prevent this network breach? provide end user awareness and training for employees ensure best practices were implemented when creating new user accounts Create VLANs to segment network traffic

provide end user awareness and training for employees With new employees entering a company, often they are not fully aware of the company's Internet usage policy and safe Internet practices. Providing end user awareness and training for new employees help reduce the company's vulnerability to malicious entities on the Internet.

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. What could the technician implement to meet this requirement? Honeynet quarantine high availability MAN network

quarantine Quarantine is where devices that do not meet the standards for the regular network can be placed. In this area, they can be checked before connecting to the main network.

An administrator has configured a new 100Mbps WAN circuit, but speed testing shows poor performance when downloading larger files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following: NETRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000F.33CC.F13A Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding What is the issue? Shutdown and then re-enable this interface Reset the statistics counter for this interface apply egress port rate-shaping remove the default 802.1q tag and set to server VLAN

remove the default 802.1q tag and set to server VLAN Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and setup a server VLAN to increase performance.

A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which describes what the network administrator should do next? return the system to step four since this was the last working step return the system back to the original state before the change request additional time since the change is near completion

return the system back to the original state before the change By performing a rollback, the administrator will change everything back to the last known good configuration, to the time prior to the change.

A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize? hold down timers split horizon spanning tree route poisoning

route poisoning The Route poisoning setting in Cisco's Split Horizon is what prevents routing loops and shows the failed routes.

The administrator modifies a rule on the firewall and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager's inquiry, what did the administrator forget to do first? document the changes provide notification of change to users schedule maintenance window submit a change request

submit a change request A change request should be submitted through the change management process prior to any changes being made.

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. What action could the administrator take to improve the performance of data transfers over iSCSI switches? the administrator should set the MTU to 9000 on each of the participants in the vSAN the administrator should configure the switch ports to auto-negotiate the proper Ethernet settings The administrator should configure each vSAN participant to have its own VLAN The administrator should connect the iSCSI switches to each other over inter-switch links (ISL)

the administrator should set the MTU to 9000 on each of the participants in the vSAN When using an iSCSI SAN (with iSCSI switching), we can improve network performance by enabling 'jumbo frames'. A jumbo frame is a frame with an MTU of more than 1500. By setting the MTU to 9000, there will be fewer but larger frames going over the network. Enabling jumbo frames can improve network performance by making data transmissions more efficient.

A network administrator is comparing several different wireless technologies. To calculate the effective maximum file transfer rate instead of the theoretical, what should be measured? goodput latency throughput bandwidth

throughput Throughput is the measurement of the maximum amount of data that is able to be sent over a transmission path.

A firewall technician has received calls stating the network is running slowly. The technician has found the firewall is functioning properly. What should the technician review to determine the cause of the slow performance? top talkers SNMP traps Port scanner Heat maps

top talkers There are devices/applications usually unknown to the network administrators that use too much bandwidth, therefore slowing down the system. For example, if you have few users who are downloading large files all day long (like videos), they could be considered a "top talker".

What is used to define how much bandwidth can be used by various protocols on the network? traffic shaping high availability load balancing fault tolerance

traffic shaping Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users.

What is the BEST way to prevent various types of security threats throughout the network on a routine basis? user training and awareness penetration testing disaster recovery planning business continuity training

user training and awareness Users are the number one vulnerability to a network. Increasing user training can decrease the number of security threats that are realized on your networks.

A network technician has just run a new point-to-point fiber link between two local routers. After the fiber has been plugged in on both ends, the interface will not come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard-looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the cause of the problem? Duplex mismatch Wrong IP address Wavelength mismatch Distance limitations

wavelength mismatch Wavelength mismatch is when two different transmitters at each end of the cable have either longer or shorter wavelengths. Both transmitters have to be identical on each end of the cable.


Ensembles d'études connexes

Chapter 23: Disruptive Behavior Disorders; PrepU

View Set

Physical Assessment: Pediatrics - Normal and Abnormal Findings

View Set

Content Review Practice Questions

View Set

Bacterial infections treatment: NAPLEX, NAPLEX - Bacterial Infections, ID Problem Set, NAPLEX - Bacterial Infections, NAPLEX: ID Bacterial Infections, NAPLEX ID Bacterial Infections, bugs, ID drug List (test 1), Infectious Disease I, NAPLEX Bacteria...

View Set

Nursing Assessment and Care of Patients with Hematologic and Lymphatic Disorders > Level- 4: Confident NUPN1510

View Set

Elsevier Quizzes Chapter 31: Cardio

View Set

Chapter 27: The Renaissance Begins: What Changes in Europe Led to the Renaissance?

View Set