Network + N10-009

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Question 39IncorrectDion Training is configuring a new subnet at their offices in Puerto Rico and wants to assign it a portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. The new subnet in Puerto Rico has 57 devices that will need IP addresses assigned. What is the correct CIDR notation for the new subnet in order to accommodate the 57 devices while allocating the minimum number of addresses? /25 /24 /27 /26

/26

Which of the following ports must be open to enable the synchronization of hierarchical, semi-layered system of time sources within a network? 389 143 3389 123

123

What ports do FTP and SFTP utilize? 21, 23 21, 22 22, 23 20, 21

21, 22

You have just finished installing a new web application and need to connect it to your MySQL database server. Which port must be allowed to enable communications through your firewall between the web application and your database server? 3389 1521 3306 1433

3306

Which cellular technology is comprised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols? 5G 3G 4G LTE

3G

Which of the following ports does SIP use? 80/443 5060/5061 389/636 139/445

5060/5061

Which of the following wireless technologies use MU-MIMO on non-overlapping channels to increase the wireless network's bandwidth? 802.11b 802.11g 802.11ac 802.11n

802.11ac

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps? 802.11b 802.11ac 802.11a 802.11n 802.11g

802.11g

You are setting up uplink ports for multiple switches to communicate with one another. All of the VLANs should communicate from the designated server switch. Which of the following should be set on the trunk ports if VLAN 1 is not the management VLAN? 802.1af 802.1d 802.1x 802.1q

802.1q

A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the backend authentication system supports EAP and TTLS. What should the network administrator implement? WPA2 with a complex shared key PKI with user authentication 802.1x using EAP with MSCHAPv2 MAC address filtering with IP filtering

802.1x using EAP with MSCHAPv2

Which of the following IEEE specifications describes the use of the link aggregation control protocol (LACP)? 802.3af 802.1d 802.1x 802.3ad

802.3ad

Your organization is deploying a new web application hosted on a scalable cloud infrastructure. To ensure users are directed to the correct IP address for accessing the application, which DNS record type should be used to map the domain name to the IPv4 address of the web server? TXT CNAME MX A

A

Dion Training believes there may be a rogue device connected to their network. They have asked you to identify every host, server, and router currently connected to the network. Which of the following tools would allow you to identify which devices are currently connected to the network? NetFlow analyzer Port scanner IP scanner Protocol analyzer

IP scanner

During a routine network assessment, Barbara, a technician, notices that in certain areas of the office, wireless devices frequently lose connection to the network. This occurs even though the wireless network has been confirmed to be operational. What is the MOST probable reason for this occurrence? Signal degradation or loss Roaming misconfiguration Client disassociation issues Insufficient wireless coverage

Insufficient wireless coverage

In the context of Virtual Extensible Local Area Network (VXLAN), what is the purpose of the VXLAN Network Identifier (VNI)? It is used to designate the source and destination IP addresses for VXLAN traffic. It is used to differentiate between different VXLAN overlay networks. It is used to uniquely identify each VXLAN tunnel endpoint. It is used to authenticate VXLAN packets to ensure security.

It is used to differentiate between different VXLAN overlay networks.

Hugh, a network engineer, is tasked with configuring a dynamic routing protocol for his company's network to improve route selection and convergence time. He decides to use Enhanced Interior Gateway Routing Protocol (EIGRP). Which of the following is a unique feature of EIGRP that Hugh can benefit from? It utilizes periodic flooding of routing information It uses TCP for reliable delivery of routing updates It supports unequal-cost load balancing It requires a hierarchical network design strictly

It supports unequal-cost load balancing

The network administrator is troubleshooting the switchports for a file server with dual NICs. The file server needs to be configured for redundancy, and the dual NICs need to be combined for maximum throughput. What feature on the switch should the network administrator ensure is enabled for best results? Load balancing BPDU Spanning tree LACP

LACP

Which network discovery protocols allow devices to advertise their identity, capabilities, and neighboring devices, facilitating network management and troubleshooting? (Choose all that apply) FTP OSPF SNMP LLDP CDP VLANs

LLDP CDP

According to the OSI model, at which of the following layers is data encapsulated into packets? Layer 4 Layer 2 Layer 5 Layer 3

Layer 3

Which authentication protocol provides improved security over its predecessor(s) by utilizing hashed passwords along with encrypted session keys for authentication in remote access VPN connections? PAP EAP-TLS CHAP MS-CHAP

MS-CHAP

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks? Acceptable use policies Host-based intrusion detection systems Patch management Incident response team

Patch management

In a newly expanded network segment, users report intermittent network connectivity issues. The network team discovers that some network devices occasionally lose connections to shared resources. What should be checked FIRST to identify the cause of these connectivity issues? Switch port configuration Power over Ethernet (PoE) settings Speed and duplex settings Potential Duplicate IP addresses

Potential Duplicate IP addresses

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan each package as it enters the warehouse using a sensor that can reach a distance of up to 30cm (1ft). Which of the following technologies should they utilize to meet these requirements? Bluetooth Wi-Fi RFID NFC

RFID

Which metric measures the maximum acceptable amount of data loss in a disaster recovery scenario? RTO MTBF RPO MTTR

RPO

What is the flag used to terminate a connection between two hosts when the sender believes something has gone wrong with the TCP connection between them? FIN RST SYN ACK

RST

You are working as part of the server team for an online retail store. Due to the upcoming holidays, your boss is worried that the current servers may not be able to handle the increased demand during a big sale. Which of the following cloud computing concepts can quickly allow services to scale upward during busy periods and scale down during slower periods based on the changing user demand? Resource pooling Rapid elasticity On-demand Metered services

Rapid elasticity

Which of the following policies or plans would dictate which type of virtual private network connections will be authorized for use by an organization's employees? Acceptable use policy Data loss prevention policy Password policy Remote access policy

Remote access policy

Which wired network topology is commonly used or should be considered for its centralized control, ease of management, and ability to isolate network issues to an individual device? Mesh Topology Ring Topology Star Topology Bus Topology

Star Topology

You are conducting an intensive vulnerability scan to detect which ports might be open to exploitation. During the scan, one of the network services becomes disabled and impacts the production server. Which of the following sources of information would provide you with the most relevant information for you to use in determining which network service was interrupted and why? Firewall logs Syslog Network mapping NIDS

Syslog

Dion Training wants to create a DNS record to enter DKIM or SPF information into the domain name system and help prevent spam coming from their domain. Which type of DNS record should be created? SOA SRV TXT PTR

TXT

You are connecting a new IPv6 device to your network, but your routers only support IPv4 protocols. Which of the following IP addressing solutions would solve this challenge? Private APIPA Teredo tunneling Classless

Teredo tunneling

You are scanning a target as part of a penetration test. You discovered that the network uses Snort configured as a network-based IDS. Which of the following occurs when an alert rule has been matched in Snort during your scan? The packet matching the rule will be dropped and the IDS will continue scanning new packets The source IP address will be blocked and its connection with the network terminated The entire packet will be evaluated until all of the IDS alert rules have been checked and the packet is allowed to continue its journey The IDS will send an alert, stop checking the rest of the rules, and allow the packet to continue its journey

The entire packet will be evaluated until all of the IDS alert rules have been checked and the packet is allowed to continue its journey

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements? Bluetooth NFC Wi-Fi RFID

Wi-Fi

Question 3IncorrectDamaris is troubleshooting a WINS connectivity issue on a Windows server. She wants to find out the name of the server she is working on. Which of the following commands should she utilize to display the NetBIOS name of the server? arp netstat show config hostname

hostname

Yvonne, a network administrator, needs to verify the routing information on a router to troubleshoot a routing issue in the network. Which command should Yvonne use to display the routing table entries on the router? show interface show power show config show route

show route

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially? authEncrypt authProtect authNoPriv authPriv

authPriv

A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem? The last ACL on the firewall is set to DENY ANY ANY A backdoor has been installed to grant someone access to the network A TACACS+ or RADIUS misconfiguration is causing logs to be erased The server was the victim of a brute force password attack

A backdoor has been installed to grant someone access to the network

Which definition best represents a network Heat-Map? A graphical representation indicating areas of high and low network activity or performance A visual representation of the electrical current flow in a network. A diagram showing the physical layout of networking devices A chart illustrating the temperature variations in a data center's network that might affect infrastructure and personal devices

A graphical representation indicating areas of high and low network activity or performance

Explain what the First Hop Redundancy Protocol (FHRP) is? A network protocol used for routing packets between subnets and devices on a LAN. A protocol for securing communication between devices on a network. A protocol used to provide redundancy for the default gateway in a LAN environment. A protocol that balances loads and traffic across multiple servers in a server farm.

A protocol used to provide redundancy for the default gateway in a LAN environment.

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up an on-path attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful only to affect the traffic associated with Mary's computer and not the entire network. Which type of attack is Rick conducting against Mary? MAC spoofing Evil twin ARP spoofing IP spoofing

ARP spoofing

Jordan is managing a critical infrastructure network and wants to ensure that any deviation from normal network operation is quickly identified and addressed. They are particularly concerned about detecting sophisticated cyber threats that might not trigger traditional security alarms. What should Jordan implement to enhance their monitoring capabilities? A network-wide intrusion prevention system (IPS) Advanced Persistent Threat (APT) detection system Comprehensive network access control (NAC) policies Anomaly alerting/notification system

Anomaly alerting/notification system

While implementing wireless access points into the network, one building has connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be changed on the access point for the building with connection issues? UTP patch cables Security standard Antenna Power adapter

Antenna

Routing prefixes are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR). What are these known as? Top-level domain Autonomous system number Route aggregation Network handle

Autonomous system number

Which of the following is designed to keep the system's uptime running in the event of a disaster? High availability Caching engines Load balancing Quality of service

High availability

You have been asked to install a media converter that connects a newly installed RG-6 cable to the existing Cat 6a infrastructure. Which type of media converter should you use? Coaxial to ethernet Fiber to ethernet Multimode to single-mode Fiber to coaxial

Coaxial to ethernet

Which authentication protocol is considered the most secure for remote access VPN connections in terms of authentication mechanism strength? CHAP PAP EAP-TLS MS-CHAP

EAP-TLS

During the setup of a new office floor, Dorothy, a network administrator, configures ports on a switch to connect VoIP phones and workstations. She wants to ensure that voice traffic is prioritized over data traffic. Which of the following configurations should Dorothy use to BEST achieve this? Configure the voice VLAN on the switch ports where VoIP phones are connected. Enable link aggregation on the ports connected to VoIP phones. Set the native VLAN to 200 for voice and VLAN 100 for data. Configure QoS to prioritize VLAN 100 over VLAN 200.

Configure the voice VLAN on the switch ports where VoIP phones are connected.

Which aspect of infrastructure as code (IaC) ensures that changes made by different team members do not conflict with each other? Continuous integration Conflict identification Infrastructure provisioning Automated testing

Conflict identification

Which of the following security features should be enabled to configure a quality of service filter to manage the traffic flow of a Cisco router or switch and protect it against a denial-of-service attack? Dynamic ARP inspection Control plane policing Router Advertisement Guard DHCP snooping

Control plane policing

A technician is troubleshooting a workstation at Dion Training. The workstation is suffering from intermittent connectivity issues. The technician notices that the STP cable pairs are not completely twisted near the connector. Which of the following issues may be experienced because of this? 568A/568B mismatch Crosstalk Split pair Tx/Rx reverse

Crosstalk

Your company wants to create highly available datacenters. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down? OSPF Load balancer BGP VRRP

BGP

What term refers to a malicious technique or software crafted to exploit vulnerabilities in computer systems, often leading to unauthorized access or system compromise? Virus Hacker Exploit Vulnerability

Exploit

Glenn has been assigned to troubleshoot network connectivity issues for his organization. After investigating, he identifies a network switch as the likely culprit and begins to review the switch interface statistics. He finds that the switch interface is active and receiving a marked increase in frames that are about 4600 bytes in size. What is the most likely cause of the connectivity issues? Runts Drops CRC Errors Giants

Giants

Which of the following components is used by an agent to send a single key-pair value about a significant event or condition that is occurring in real-time to a manager? Verbose trap MIB OID Granular trap

Granular trap

What is a primary use case for Virtual Extensible Local Area Network (VXLAN) in Data Center Interconnect (DCI)? Implementing Quality of Service (QoS) and related policies within a single data center. Load balancing traffic between servers within the same data center. Extending Layer 2 connectivity across geographically dispersed data centers. Encrypting data transmitted between different data centers.

Extending Layer 2 connectivity across geographically dispersed data centers.

Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. Which of the following commands should he enter on his workstation to resolve this connectivity issue? C:\windows\system32> route print C:\windows\system32> nbtstat -R C:\windows\system32> nslookup C:\windows\system32> ipconfig /flushdns

C:\windows\system32> nbtstat -R

Which type of client-to-site VPN setup allows users to remotely access corporate resources without requiring the installation of local dedicated VPN software? Clientless VPN IPsec VPN PPTP VPN SSL VPN

Clientless VPN

After an employee connected one of the switchports on a SOHO router to the wall jack in their office, other employees in the building started to receive "duplicate IP address" errors and experiencing intermittent network connectivity. You check the configuration on one of the affected clients and see it has been assigned an IP address of 192.168.1.54. Which of the following could be enabled on the company's network to prevent this from occurring? Router advertisement guard Split horizon DHCP snooping ARP inspection

DHCP snooping

An analyst reviews a triple-homed firewall configuration that connects to the internet, a private network, and one other network. Which of the following would best describe the third network connected to this firewall? Subnet GPO DMZ NIDS

DMZ

Ivy is analyzing the routing protocols used in her company's network. She notes that EIGRP is configured for automatic summarization. Which of the following impacts should Ivy expect due to EIGRP's automatic summarization feature? Enhanced encryption of routing updates Improved support for non-IP protocols Decreased routing table size Increased risk of routing loops

Decreased routing table size

Which of the following describes the process of layer protective measures in the network to protect valuable data and information? Acceptable use policy Zero trust Least privilege Defense in depth

Defense in depth

A company is having a new T1 line installed. Which of the following does this connection MOST likely terminate? Krone block Patch panel IDF Demarcation point

Demarcation point

Susan has been tasked with securing the devices in her company's network infrastructure to mitigate potential security risks. She wants to figure out the best way to increase hardening on her company's devices. Select all of the options that apply that would effectively help harden these devices. Disabling unused ports and services Changing default passwords Enabling guest networks Using MAC address filtering Regular software updates Implementing strong encryption

Disabling unused ports and services Changing default passwords

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do? Make the change, document the requester, and document all network changes First document the potential impacts and procedures related to the change Wait until the maintenance window and make the requested change Send out a notification to the company about the change

Make the change, document the requester, and document all network changes

A remote research facility situated in the rugged terrain of a mountainous region requires robust internet connectivity to support data-intensive research projects. Wired connections are impractical due to the challenging landscape. Considering their needs, which technology should they prioritize for the most reliable connectivity with the least latency? Cellular network High-frequency radio Microwave connection Satellite internet

Microwave connection

The Chief Information Officer (CIO) in your company has been trying to convince the Chief Security Officer (CSO) that the company should move its data to a SaaS solution to some money in the budget. The CSO is hesitant to move all of the company's data because she is concerned with the risk involved in moving the corporation's sensitive data to a SaaS solution. The CSO has been asked for a reason behind her fears. Which of the following might be her response? The SaaS solution is incompatible with our current network Migrating our data to a SaaS solution will result in decreased performance in our internal network Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources Migrating to a SaaS solution will put us at a higher risk of exposure to malware and hackers

Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources

Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? NAC Port security Geo-IP GPS location

NAC GPS location

In cloud environments, which option is specifically designed to permit internet access for resources within a VPC without exposing them directly to the internet? Internet Gateway. VPN Gateway. NAT Gateway. Direct Connect Gateway.

NAT Gateway.

After launching several new subdomains for your organization's main website, you need to ensure that external DNS queries can correctly find the authoritative DNS servers for these new subdomains. Which DNS record type should you use? MX TXT NS PTR

NS

What cloud feature provides granular control over the network traffic allowed to enter and leave specific cloud resources, enhancing security and traffic management? Auto-scaling configurations for resource management. Cloud-based load balancing services. Network Security Lists. Public and private cloud peering solutions.

Network Security Lists.

Which type of DNS server improves the efficiency of name resolution by caching the response for a query it has previously forwarded to another server, but does not contain the original data? Recursive DNS server Non-authoritative DNS server Authoritative DNS server Primary DNS server

Non-authoritative DNS server

Which of the following is considered a classless routing protocol? STP OSPF RIPv1 IGRP

OSPF

A user receives certificate errors in other languages within their web browser when accessing your company's website. Which of the following is the MOST likely cause of this issue? DoS ARP poisoning Reflective DNS On-path attack

On-path attack

In an industrial control system environment, maintaining extremely precise synchronization between the control systems and sensors is crucial to operational efficiency and safety. The system requires synchronization accuracy beyond what most common time protocols provide, due to the precise nature of the operations being performed. Which protocol should be implemented to meet these stringent requirements? NTS DST NTP PTP

PTP

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach? Require all new employees to sign an NDA Require data masking for any information stored in the database Require data at rest encryption on all endpoints Require a VPN to be utilized for all telework employees

Require data at rest encryption on all endpoints

Mark is setting up a DHCP server on a segment of the corporate LAN. Which of the following options is NOT required in the DHCP scope to allow hosts on that LAN segment to be assigned a dynamic IP address and still be able to access the Internet and internal company servers? Reservations Default gateway DNS servers Subnet mask

Reservations

Which of the following standards is commonly used for exchanging authentication and authorization data between parties, facilitating single sign-on (SSO) across different systems? SOAP IPsec TLS SAML

SAML

Which term in networking refers to an extension of a commonly used email transfer protocol that provides encryption and authentication? POP3 SMTPS HTTPS IMAP

SMTPS

How does Security Service Edge (SSE) differ from traditional perimeter-based security approaches? SSE prioritizes network segmentation over encryption for data protection. SSE relies on static firewall rules to protect the network perimeter. SSE integrates threat intelligence to detect and respond to security incidents. SSE focuses on securing internal resources rather than external threats.

SSE integrates threat intelligence to detect and respond to security incidents.

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser? PPTP IPsec SSL PPP

SSL

What is the first flag used in the establishment of a TCP connection or during the initiation of a three-way handshake between two hosts? FIN ACK SYN RST

SYN

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator perform to improve data transfers' performance over the iSCSI switches? Connect the iSCSI switches to each other over inter-switch links (ISL) Configure the switch ports to auto-negotiate the proper Ethernet settings Configure each vSAN participant to have its own VLAN Set the MTU to 9000 on each of the participants in the vSAN.

Set the MTU to 9000 on each of the participants in the vSAN.

You are optimizing the DNS setup for a multinational corporation to ensure fast and reliable access to various web resources. The goal is to minimize the latency experienced by users when accessing web pages by reducing the time taken to resolve domain names. This requires a DNS server type that can handle queries for any domain by interacting with multiple DNS servers across the internet. Which type of DNS server is best suited to achieve this goal? Configure a primary DNS server to directly manage and serve DNS records. Set up recursive DNS servers to resolve domain names by querying the necessary authoritative servers. Implement a caching-only DNS server to store and serve frequently accessed domain names. Deploy secondary DNS servers to provide redundancy and load balancing.

Set up recursive DNS servers to resolve domain names by querying the necessary authoritative servers.

Caitlin's network is located in an industrial area where heavy machinery causes significant electromagnetic interference (EMI). She needs to choose the best cabling solution to mitigate the impact of EMI on network performance. Which of the following cable types offers the BEST protection against this sort of electromagnetic interference? STP Cat6 Coaxial cable UTP Cat5e Single-mode fiber

Single-mode fiber

Lorraine is the sole network administrator for her company. After investigating reports from users in the accounting department, she discovers that a crucial switch port connected to the department's server is not transmitting data. Upon inspection, she notes that the switch port's LED indicator is not lit. Which of the following is the MOST likely reason for this issue? The port is administratively down. The port is suspended due to an STP (Spanning Tree Protocol) issue. The port has been error disabled due to a violation. The port is configured with an incorrect VLAN assignment.

The port has been error disabled due to a violation.

Which factor is considered by all routers when determining the best path for data packets using the route selection process? The bandwidth of the links along the path to the destination. The physical distance between the source and destination. The number of hops a packet must take to reach its destination. The prefix length of the destination network address.

The prefix length of the destination network address.

Steven is tasked with redesigning a small office network and must choose between different rack sizes to house a new server, a network switch, and a patch panel. What is it most critical for Steven to consider to ensure all equipment is adequately housed and future expansion is possible? The aesthetic design of the rack to ensure it fits with the office decor. The proximity of the rack to the office's main power supply. The availability of built-in cable management solutions in the rack. Correct answer The weight capacity of the rack to ensure it can support the equipment.

The weight capacity of the rack to ensure it can support the equipment.

A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, the interface will not come up. The technician has cleaned the fiber connectors and used a fiber light meter to confirm that light passes in both directions without excessive loss. Which of the following is MOST likely the cause of this issue? The connection is suffering from EMI The bend radius has been exceeded The cable is subject to cross-talk There is a wavelength mismatch

There is a wavelength mismatch

What is the primary purpose of implementing link aggregation on a network switch? To enhance the security of the network by encrypting data across multiple physical links. To distribute network traffic evenly across all available paths in a network topology. To create a single logical link with more bandwidth by combining multiple physical links. To decrease the number of broadcast domains in a network by combining VLANs.

To create a single logical link with more bandwidth by combining multiple physical links.

Which of the following best describes the significance of managing software licensing within an organization's network? To facilitate remote access for users working offsite and ensure they are given the same software as on-site employees To ensure legal use of software and avoid penalties for non-compliance To maintain security of the network infrastructure and its devices To provide a steady, uninterrupted power supply to all recorded network devices

To ensure legal use of software and avoid penalties for non-compliance

Leon, a network security analyst, is investigating suspicious network activity in a large corporate office. He needs a tool that can intercept network traffic seamlessly and monitor traffic discreetly without disrupting operations. The network spans multiple floors, with various departments interconnected using physical wiring. Which tool should Leon use to monitor network traffic without disrupting operations in the multi-floor corporate office? Cable Tester Wireless Access Point (WAP) Network Sniffer Traffic Access Point (TAP)

Traffic Access Point (TAP)

Quinn is configuring a wireless network for a client in an area known for dense wireless traffic and strict regulatory oversight on channel usage. To ensure compliance and optimal performance, they focus on incorporating a feature of the 802.11h standard. What aspect of 802.11h should Quinn prioritize to meet these requirements? Transmit Power Control Beamforming technology Fast Roaming capabilities Multiple Input Multiple Output (MIMO) technology

Transmit Power Control

Which cloud connectivity option enables virtual network services to extend across different cloud environments, including on-premises data centers? SD-WAN VPC Peering VPN CDN

VPN

You are tasked with troubleshooting a fiber optic cable installation where signal loss has been detected. You suspect there might be a break or bend in the cable. Which tool would be most appropriate to locate the fault? Optical Time Domain Reflectometer Spectrum analyzer Visual fault locator Multimeter

Visual fault locator

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting? WAP SSID Encryption type WAP placement Bandwidth saturation

WAP placement


संबंधित स्टडी सेट्स

Lesson 7: loan types, terms, issues

View Set

CSS 310 Final Exam Study Session

View Set

FUNDAMENTALS OF NURSING PRACTICE QUESTIONS

View Set

Codes Motor Branch Circuit Devices and Protection

View Set

HK Book 8 L3 Where were you last night?

View Set

Econ 202 Chapter 2 UL Cary Heath

View Set