TotalTester-Network+ (Part 2)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Incorrect cabling

A company's wiring closet and associated network equipment have been relocated to support users in the eastern wing of the facility. The new wiring closet is 47 feet (14 meters) away from the old one. When the move was completed, users immediately began to reporting intermittent connectivity issues with both internal and Internet resources. Which of the following is the MOST likely cause?

Frequency interference

A consultant has been brought in to inspect an office that has encountered frequent wireless issues. A wireless survey of the area shows that there are seven nearby SSIDs. The company's Wi-Fi network is on channel six, as are three of the other found networks. Which of the following is MOST likely causing the issues?

A managed switch with port mirroring

A customer has a requirement to monitor all internally- and externally-bound traffic. Which technology enables a packet sniffer to accomplish this?

When all the routers have completed the process of updating their routing tables.

A group of routers running RIPv2 reaches convergence...?

There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.

A home user is experiencing performance issues with her wireless network. She has checked the following issues: -Checked to make sure the laptop is within the appropriate wireless network range -Checked the connected SSID and wireless channel -Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues?

Wiring schemes

A network technician is trying to determine which TIA/EIA standard is being used for his MDF's patch panels. Where should he look to find this information?

255.255.255.0

A network technician needs all nodes with IP addresses in the range of 192.168.0.3 through 192.168.0.240 to be in the same subnet. Which subnet mask will achieve this?

IP address on the native VLAN interface

A network technician needs to remotely manage certain Layer 2 switches, but she is currently unable connect to them. The technician tried to ping the switches, but was unsuccessful. What will MOST likely need to be configured on each switch?

Routing loop

A router sends a packet down a particular path that it thinks is correct, but the packet ends up back at a router that it already passed through. What is this called?

Load balancing

A specialized device that you install on your network to distribute network requests and ensure availability to all your users is an example of which type of network management techniques?

Document findings, actions, and outcomes.

A technician is troubleshooting a problem and has verified full system functionality. According to the troubleshooting model, what should the tech's NEXT step be?

Larger

An IPv6 header is _________ than an equivalent IPv4 header.

Ping

As the administrator of a cluster of servers located in a distant data center, what command would you use to see if the servers are responding?

Traffic shaping

At lunch time on Friday, the development department holds an online gaming session. They share bandwidth with the rest of the company, and the performance hit impacts the administration division to the point that the accountants cannot work on the network. Which of the following is the BEST method to mitigate the issue?

The switch

Bob administers a 20-node Windows and Mac OS X network with one Linux server. This morning Bob is inundated with calls from users complaining they can't access the network. The server, which sits in an equipment rack four feet from his desk, also cannot access the network. No one's link light is working. He has made no administrative changes during the night. Where should look first?

The laptop has incorrect DNS settings

Bob just went on vacation and brought a laptop from the office with him to get some work done. While at the hotel, Bob made some changes to the network configuration in order to be able to access the hotel Internet. Upon returning to work, Bob's laptop can access the Internet still, but is now unable to access local resources on the company file server. What is going on with his laptop?

Ifconfig often refers to a NIC as "eth0."

Both ifconfig and ipconfig show detailed information about the status of your NICs. Which of the following answers is true about ipconfig/ifconfig?

Man in the Middle

Clark is troubleshooting a user's PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening?

Smurf

Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?

Remote Desktop Gateway (RDG)

Current versions of Windows Server can provide a secure tunnel via HTTPS for a Remote Desktop Connection (RDC) session. What does the server run to accomplish this?

Defense in depth

Designing your security posture with the assumption that any defense can be beaten can strengthen your network. What is this practice called?

RADIUS

Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a separate authentication server to gain access to the network. Which method would work BEST?

Overlapping channels, Signal-to-noise ratio, & Device saturation

Everyone in a department is suddenly finding it difficult to connect to the WAP and the connection is slow for those who succeed. What are likely causes for these problems? (Select three.)

Wireless

Extensible Authentication Protocol, or EAP is a type of authentication/security protocol used in _______ networks.

PDU

Get, Response, Set and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what?

143

IMAP uses which common port?

all systems connect to a single cable.

In a bus topology...

all systems connect to a central hub.

In a star topology:

Internal network traffic behind a NAT router.

In which of the following scenarios would you see packets with a private IP address as the source address?

The server is missing default gateway information.

Indira, an administrator, just installed a new switch. She has connected two servers with IP addresses of 192.168.105.20 and 192.168.105.30. The servers are able to communicate with each other, but are unable to reach the Internet. Indira checks the switch configuration and sees the following information: -Interface: VLAN 105 -IP address: 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?

WAP placement

Jim is about to install a wireless network. A fellow network administrator warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers?

Go ahead, just keep the combined length of the patch panels under 8 meters.

John is talking to his cable installer about running new UTP CAT 5e cable to two new office spaces being set up in his building. These are the last available spaces in this building and no more office slots will ever be made here. The cable installer says that the cable runs for those locations will be 92 meters. At 92 meters, the wall outlets will just make it into the offices. What is the most cost efficient suggestion the installer can make?

Plenum

Most city wiring ordinances require _______ rated cabling to reduce fire risk.

Physical layer

Of the following OSI layers, which one converts the ones and zeros to electrical (or light) signals and places these signals on the cable?

FastEthernet 0/0

Of the following, which interface on a router must be modified when a technician needs to add a subnet to the corporate local area network?

Penetration testing & Vulnerability scanning

Preparation for incidents is a multifaceted process that includes which tasks? (Select two.)

Zero trust

Regarding network security, what is the term for a model where no assumptions are made about connectivity, and access is not always granted implicitly?

Switch power failure

Technician Stanley troubleshoots a PoE switch used for VoIP telephones. Employees report that their phones frequently turn off or reboot. Which of the following MOST likely causes the issue?

Mesh

The Highland Gadget Corporation has a central office and five satellite offices. The lead network engineer wants to redo the company's network so that each satellite office connects to the central office and to every other satellite office. What topology would best suit such a network?

Content filter

The IT department wants to filter access to Web sites that contain certain words, URLs, and signatures. Which network device can restrict access based on these types of criteria?

Senior management and IT management should identify critical assets and critical nodes.

The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?

VLAN hopping

This seldom-seen threat uses commands to a switch to change a Switchport to a trunk link.

A second DHCP server is on the network.

Users are seeing messages and warnings on their computers about duplicate IP addresses and are encountering connectivity problems. A quick check of the change management log shows that network technician Ursula installed a new DHCP server on the network last week. Which of the following would cause duplicate IP addresses on the network?

Email & SMS

What are typical ways of proactively communicating SNMP alerts? (Select two.)

The processes of separating multiple data streams that had been combined into a single stream.

What is de-multiplexing?

orange stripe, orange, green stripe, blue, blue stripe, green, brown stripe, brown

What is the correct wire order for the 568B standard?

Secure network access

What is the purpose of a VPN concentrator?

Provides a quantifiable reference to measure against current performance.

What is the value of a baseline performance analysis?

Effective isotropic radiated power (EIRP)

What is used to measure the relative signal strength coming out of a directional antenna, comparing the "strong" end signal with an omnidirectional antenna?

PKI

What kind of authentication method uses two keys to verify a sender's identity, a public key and a private key?

Spanning tree

What should the advanced switches in Erica's network implement to avoid switching loops?

Update the wiring schematics.

What should you do after adding a new cable segment to a network?

Crimper

What tool enables you to attach an RJ-45 connector to a CAT 6 cable using the TIA/EIA 568A wiring schematic?

CAT 5e UTP

What type of cable is the minimum required for connecting a server to a 1000BaseT switch?

Fiber coupler

What would be the appropriate hardware for joining two segments of fiber-optic cable?

Flooding

When a switch does not know a path to a destination MAC address, it broadcasts an ARP request out of all of its ports. What is this process called?

Switch loop

When a user reports that nobody can access the company network, Ace technician Arnold Grimmer walks into a communications closet to find the issue. He sees a short patch cable with both ends plugged into two ports on the same switch. Which of the following terms describes what he sees?

Single point of failure

When the loss of a piece of equipment or link can bring down an entire process, workflow or even the whole organization, that lost element is called what?

WPA

Which IEEE 802.11 encryption standard uses dynamic encryption key generation and offers much stronger security than its predecessor?

Load balancing

Which can be used to improve performance when executing high-bandwidth processes over multi-path WAN connections?

hostname

Which command will show you the name of the current system you are working on?

Hub

Which device is used to connect multiple computers in order to create a single logical network segment?

Firewall

Which networking device can you configure to block or allow ports and IP addresses from accessing the internet?

plenum

Which of following types of cabling would be best to use near ventilation ducts to reduce toxic gases during a fire?

Octal, Binary, & Hexadecimal

Which of the following choices are numbering systems found in computer and network environments? (Select three.)

TCP

Which of the following is the most reliable Transport layer protocol?

Router

Which of the following network devices does NOT send data based only on the MAC Address?

L2TP

Which of the following protocols enables tunneling and encryption?

Static

Which of the following routing methods is the most difficult to manage?

Kerberos

Which of the following services is most likely to need an NTP server?

Protocol analyzer

Which of the following tools enables you to inspect network traffic?

Ping

Which of the following utilities would work best to determine if a node on your network is dropping packets?

Virtual switch

Which of the following virtual devices keeps track of a MAC-to-port forwarding table?

802.11n

Which of the following wireless technologies uses point-to-multipoint for sending and receiving data?

QoS

Which technology enables administrators to prioritize network traffic to optimize support for VoIP phone service?

IaaS

Which technology provides a Cloud-based computer that can be scaled-up as necessary, providing additional network capability, memory, CPUs, and storage?

Goodput

Which term describes the rate at which usable information bits are delivered from one node to a destination?

Satellite

Which type of internet connection would NOT be recommended if you wanted to talk to your friend using VoIP?Which type of internet connection would NOT be recommended if you wanted to talk to your friend using VoIP?

Lower your AP's signal strength

You are noticing that many of your users are sitting in the parking lot during their lunch hour playing on the company WiFi. You are not only worried about wasted bandwidth, but also about security threats. What can you do to take care of this?

Layer 6

You are using HTTPS to make some online purchases. At which OSI layer does the encryption and decryption take place?

SFTP

You are working with your Web development team in order to find a way for them to securely update their content from remote locations such as their home. Which of the following would you set up for them?

Content filter

You have just configured your network so that, when a user goes to a restricted Web site, they see the message, "Unable to view page due to the company's acceptable use policy." What did you just configure to give them that message?

Crossover

You have just installed a switch on your network. Upon installation, you notice that the switch does not have an MDI-X port. What kind of cable must be installed to connect the switch to your existing network?

Environmental monitor

You notice that your servers in the MDF are restarting at random times during the work day. What would help you diagnose the issue?

The users DNS cache still holds the old IP address to name association.

Your company has to move the heavily-used intranet Web server from one computer to a new, faster system. You make the changeover and send out an e-mail to let everyone know. You then start getting a number of e-mails back saying users cannot access the new Web site by DNS name, even though you updated the "A" record in the DNS server. What's the most likely problem?

Multifactor authentication

Your company requires the use of a smart card, biometric device, and a user name/password to login to your system. What kind of authentication are they using?

Bandwidth shaper

Your network administrator notices excessive traffic being used by P2P software such as torrents. What must the network administrator implement to optimize network efficiency?


Ensembles d'études connexes

CHAPTER 7: SEDIMENTARY ROCKS, Module 7 Study Guide

View Set

Certified Rehabilitation Counselor Exam Prep

View Set

🩺 Chapter 17: Preoperative Nursing Management

View Set