finall

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following will listen on the line to ensure there is no traffic transmitting and checks to see that the channel is clear?

CSMA/CA

Which of the following tools would be used to verify that there are no breaks or opens in the wiring installation for the network?

Cable tester

Which of the following could be installed to improve network performance when accessing Internet websites?

Caching engine

Your company has implemented a new security policy requiring the use of multifactor authentication to log on to company-owned computer systems.Users already have assigned login names and passwords. You need to add an element that meets the principle of "something you have". Which of the following items would allow you to meet this goal?

Certificate

You are asked to install a new SOHO network at your company's branch office. The office will use a DOCSIS-compatible modem to connect to the Internet.You must connect the modem to the Internet Service Provider's network at the demark.What type of cable should you use?

Coaxial

You need the ability to direct all incoming HTTP requests containing the company cookie to a web server located in the network's DMZ. All other incoming HTTP requests should be directed to the company's internal web server. Which device should you add to your network to help you accomplish the desired goal?

Content switch

You just repaired a failed server and have added it back to the network.What action should you take next to obtain a picture of the server's performance now that it is repaired and back online?

Create a baseline

You make it a point of honor to install new service packs for all systems as soon as they become available from the vendor. After installing the most recent service pack for an important application, users report several problems with that application.You want to continue applying service packs in a timely manner, but you want to avoid future problems. Which of the best practices shown below would help you meet this goal?

Create a test lab. Apply and validate the service pack on systems in the test lab before you apply them to production systems.

Which of the following tools should be used to physically attach an RJ-45 connector to a CAT5 cable?

Crimping tool

When examining a suspected faulty copper network cable, the administrator notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

Cross-talk

The president of Green Valley Produce wants to permit all users to be use personal electronic devices such as smart phones and tablets for work. Glen, a Green Valley Produce employee, is irritated when Russell, the network administrator, insists that Glen must install a mobile security app on his smart phone before he can use it to view and respond to work related email.Russell needs to be sure that all users understand the actions they will be required to take before they can safely use their personal devices on the company network. What type of policy or document could Russell use to help document and share that information?

DLP policy

Which of the following devices are sometimes assigned a reserved IP address within a DHCP scope? Choose all that apply.

Domain Controller Web Server Printer

The network administrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?

Dynamic

Which of the following actions is most recommended for protecting your wireless network against rogue access points?

Enabling MAC address filtering on a switch

Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?

Hub

Which of the following devices has a primary purpose of proactively detecting and reacting to security threats?

IPS

You have been asked to design a cloud computing solution for a customer. The client wants a solution that will give them the most control over the system in the cloud.Which one of the service models listed below would best allow you to meet that objective?

IaaS

Rashid is the network administrator for a small credit union. He has been asked to implement a security solution that would prevent outside electromagnetic fields from being used to access the credit union's systems.Which of the methods, shown below, would best allow Rashid to meet this goal?

Implement a Faraday cage within the credit union premises.

Your company has experienced several virus infections over the past few months. These infections were caused by vulnerabilities in an application that is crucial to your company's successful operations.What action should you take to help prevent future outbreaks?

Implement a formal patch management process.

You are a network administrator for a company with one main office and four branch locations. One branch is located in an area that is still recovering from disastrous floods that occurred over three months ago. Since the flooding, this location has experienced repeated power surges and brownouts. You have had to replace at least one externally-facing router due to power fluctuations. What action could take to protect the hardware and keep needed systems online at the branch location when these power events occur.

Install a UPS.

Your company uses a variety of server-based applications include a web server, SQL database server, directory services server, and email server. Some of these applications run on Linux platforms and others run on different versions of Microsoft Windows. To improve network security, you need to install each application on a unique machine. However, you also need to minimize system costs. What technology could you use that would allow you to meet both your security and cost containment goals?

Install each application on a unique virtual server

You manage the network for International Sports Media (ISN TV). All employees need the ability to research information on breaking stories from the Internet.What action could you take that will best serve to keep the company's computers safe while allowing users to have unlimited access to the Internet?

Install host-based anti-malware software

Scott has just finished setting up a Personal Area Network (PAN) for Jennifer, the company's sales manager. Jennifer will use the PAN to control a number of devices in her office as well some devices that she wears. What is the concept of managing devices from other devices on the Internet known as?

IoT

In what way does Kerberos provide authentication service on a network?

Kerberos provides authentication service on a network by issuing time-sensitive tickets to requesting clients as appropriate.

In the OSI Model, which of the following layers would be the cause of a session time-out while browsing the web?

Layer 5

A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to best accomplish this?

Load balancer

You have been asked to resolve a connectivity issue with a new T1 circuit.You verify that the cable is properly connected. Next, you verify that the router is configured correctly. Which of the tools shown below did you use to verify the router configuration?

Loopback adapter

A technician is building a new network. Which of the following components would be the first installed for the network?

MDF

Which of the following WAN layer 2 protocols would be best suited for a full mesh topology?

MPLS

Which of the following network topologies would best prevent downtime in a WAN environment?

Mesh

Hilliard Hotels decide to expand their network by installing two touch-screen kiosks in each one of their hotels. These kiosks face the Internet and are to be used by guests and travelling employees to check airline reservations, email and the like.As these kiosks are deployed, you discover that they require an open service port wish could be used to compromise the system.Which of the following actions would best allow you to secure the kiosks?

Move each kiosk to a new network segment and limit the kiosk's traffic by creating stringent access control lists on each segment.

Which of the technologies shown below would most commonly use jumbo frames? Choose two.

NAS SAN

Which of the following is true of IGP?

OSPF, RIP, and IS-IS are IGPs

____________ provides encryption for data transmitted over a VPN using a "shared-secret" key.

PPTP

______ refers to networking technology hosted in the cloud.

PaaS

Jolene in the sales department has called with a problem. She cannot connect to the Internet. After talking with her, you find that she can connect to the local network. Which two documents would best help you troubleshoot this problem? Choose two.

Physical network diagram Wiring schematic

A technician is troubleshooting a printer problem in a SOHO environment. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?

Place the printer on a static IP address

You need to meet the following installation requirements:* 10GBaseT* Fire safety code for an installation between a standard ceiling and a drop ceilingWhich of the cable types shown below should you use?

Plenum Cat 6a

A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?

Port forwarding

Which of the following monitoring applications or devices is used to view network traffic at the frame level?

Protocol analyzer

Which of the following tasks should be performed on a regular basis to keep the network more secure? Choose two.

Provide users with training on company security policies and practices Update company security policies and procedures

Which of the following network performance methods would be used with SIP phones?

QoS

You need to reduce the amount of administration time spent managing 802.11 network centralized authentication services.Which of the devices shown below could you implement to meet this goal? Choose all that apply.

RADIUS server VPN concentrator

Which of the following connectors can be used for serial connections?

RS-232

Which of the following protocols are used in VoIP? Choose two.

RTP SIP

You are designing a topology for a manufacturing plant. It is important that each host wait to talk on the network so that data congestion/collision is avoided.Which of the topologies shown would best meet your requirements?

Ring

You receive an alert that a large volume of HTTPS traffic occurs on a network segment that does not contain an web server. You are able to identify the IP address to which these packets are addressed and you want to know if that device is running any process or application that requires the use of port 443.What action should you take to determine if someone is running a process that uses the HTTPS port on the destination computer?

Run a Port scan on the destination computer

Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the best method to monitor this device?

SNMP

Which of the following is a secure method for administering a network device?

SNMPv3

When implementing a WAP, which of the following can be disabled to help prevent unauthorized people from locating the network?

SSID

A(n) ___ connector is connected to the computer by pushing it into the port and twisting it on?

ST

Gino is a network technician for Productivity Solutions Consulting. He performs a number of tasks each week. In order to ensure that these tasks will continue to be carried out if he were to be gone from work, Gino has been creating a series of documents and working with the other IT staff to make sure that the documents can be understood and that all necessary tasks can be successfully carried out.What type of documentation should Gino create?

Standard operating procedure

Identify two features of a DHCP server. Choose two.

Static IP address reservations Dynamic IP addressing

A ________________ cable is used to connect a single network node to a switch or hub.

Straight

A __________ can be used to segment a network and help cut down on network congestion.

Switch

As you are leaving your company's secured data center, you watch a coworker holds the door to the data center open for an individual walking with crutches. The unknown individual does not have on a security badge to suggest that he should be allowed in the data center. When you ask your coworker who that individual is, he replies that he doesn't know. He just wanted to be helpful to someone who appeared to be struggling.What type of security attack did you just witness?

Tailgating

A workstation on the network can ping hosts on the network but it cannot ping any addresses on the Internet. Other hosts on the same network can connect to the Internet. Which of the following properties is most likely to be configured incorrectly?

The default gateway on the workstation

While analyzing the contents of the IP routing table in a router, the administrator notices the routes shown in the table below.Which of the following best describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?

The packet will be forwarded to 172.16.31.2

When determining responsibility for repair and maintenance of a T1, up to which of the following points is the local exchange carrier responsible for?

The point of demarcation

A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?

The router has a time-based ACL applied for the network segment.

You observe that a single server on your company's network is transmitting data packets from a single NIC that use multiple MAC address. What is the most like reason for this to happen?

The server hosts multiple virtual machines. Each MAC address represents one of the virtual machines.

Which of the following statements are true with regard to Primary Rate Interface (PRI) ISDN circuits?

They use 23 B channels and 1 D channel.

Routing convergence time is which of the following?

Time required by routers to update their forwarding tables after changes have occurred

According to the OSI Model, which of the following layers is responsible for providing reliable communication?

Transport

You need to replace an older switch using a GBIC with SC connectors. The new switch uses an SFP with LC connectors.Once you finish installing the new switch, you begin to move the existing connections to the new device. You connect the SC connectors to the SC-to-LC adapter and then connect the adapter to the new switch.After you finish moving all connections, you are discouraged to find that the link does work. What action should you take next to resolve this problem?

Transpose the fiber pairs.

A network user is given a smart card and PIN to be used when logging on to the company network using company issued devices.What type of authentication does this exemplify?

Two-factor authentication

Which of the following is a disadvantage of static routing?

Unresponsive to changes

A user calls to report that he cannot access any local resources on the network but he can access the Internet.You verify that the user account is configured correctly and that there are no access lists that would prevent the user from accessing the needed resources. What is the most likely cause of the user's problem?

VLAN mismatch

Carlos, a network technician, replaces a failed switch with a new switch. Carlos informs the users on the subnet served by the switch that they can reconnect to the network.One user calls to report that she is still unable to access any resources on the network. Carlos checks the indicator light for the switch port to which that user is connected. The LED light is not lit.What action should Carlos take next to resolve this problem?

Verify that the user's device is connected to the switch.

You need to test a number of LAN configuration options, but you have a limited amount of space and even less money with which to buy additional computers.What networking device would allow you to run multiple operating systems simultaneously on a single server for the purpose of testing your proposed network configuration?

Virtual machine

According to your Company's security policies, users must be prompted to enter a username and password each time their wireless client device connects to the company network. Which two protocols - working together - would best help you to create such a configuration?

WPA2-PSK

Which of the following statements are true regarding WiMAX technology? Choose two.

WiMAX is used for long distance or WAN communications. WiMAX does not use an Ethernet cable as a communications medium.

Which of the following provides the ability to deploy consistent access point configurations from a central location?

Wireless controller

A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting team's printer and cannot print to the human resources team's printer. Which of the following is the cause of the problem?

Wrong VLAN

During an ARP Poisoning attack:

a malicious user floods a switch with frames hoping to redirect traffic to the user's server.

An administrator needs to find the MAC address for a specific NIC. The IP address of the NIC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer?

arp

You are asked to add a new application server to your company's network. Users must be able to connect to the server using a specific IP address. At the same time, the network administrator points out that you are only permitted to use dynamic IP address assignment. Since you have been specifically forbidden from assigning a static IP address to the server, how can you ensure that the server uses the required IP address each time it connects to the network?

create a DHCP reservation

A router will fall back to its ________ route when no specific route to a destination exists.

default

A routing table is used to:

deliver packets to the destination node

You need to set up a new storage area network. Your company recently upgrades all switches to 10G Ethernet.Which of the storage standards shown below would be best supported on your network?

iSCSI

Your Company has recently hired a contractor to improve the company's call center operations. Your supervisor has asked for a Statement of Work. What information should this document contain? Select all that apply.

identify intended outcomes define the scope of activities that the contractor will perform define the timeline within which the work must be completed

Which of the following services do TCP connections provide to application layer protocols?

large data is subdivided into packets

Dani is working to resolve a connectivity problem with a remote server. Of the commands shown below, which two would best help her identify the nodes between her client and the remote server? Choose two.

pathping tracert

Which element is used to distinguish between the network ID and the host ID?

subnet mask

Which of the following values are used by a router to determine the best destination for an outgoing packet? Choose two.

subnet mask destination LAN IP

Which of the following is an example of a valid MAC address for a workstation?

00:08:38:05:b5:f4

Which of the following is an example of CIDR notation?

10.10.10.0/30

Which of the following is immune to crosstalk?

100Base-FX

Which of the ports shown below are most commonly associated with protocols used to ensure secure email services? Choose all that apply.

143 993 587

Joe is a new network technician, recently hired by World Wide Technologies. He is trying to troubleshoot a problem for a user and needs to determine the IP address of that user's default gateway.The IP address assigned to the user's workstation is 172.16.1.49/24. Which of the addresses shown below is most likely the address used for the default gateway?

172.16.1.1

You install five temperature monitoring devices with IP addresses in the 172.16.24.0/25 network. If any one of the monitoring devices fails to receive an ICMP keep-alive packet from the server every five minutes, a warning message will be sent to the administrator and the server will be shut down to prevent heat-related damage. You want to configure a single IP address on the server as a destination address for all five temperature monitors. Which of the IP addresses shown below should you use?

172.16.24.127/25

ATM cells operate at which layer of the OS Model?

2

Which of the following is the maximum transmission distance of 10GBase-LR?

6 miles or 9.7 kilometers

You are assigned responsibility for setting up a wireless network at your Company's branch office. In order to avoid conflict with other factors in the building, you need to configure the network to use the 5GHz frequency.Select the two wireless technologies that would best allow you to complete your assignment. Choose two.

802.11ac 802.11n

Which of the following wireless standards allows for increased bandwidth by allowing channel bonding?

802.11n

Which of the following routing algorithms would provide the fastest convergence time?

A link-state algorithm

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?

Add the system to the DMZ

Which of the following describes a smurf attack?

Attack on a target using spoofed ICMP packets to flood it

Which of the following methods are used to successfully block Man-in-the-middle attacks?

Authentication

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?

BGP


Set pelajaran terkait

Dual Credit English IV Final Review (I finessed)

View Set

Week 14 - Chapter 16: Nursing Management During the Postpartum Period

View Set

Auditing & assurance services ch 5

View Set

Intro to Marketing Quiz Questions

View Set

Exam, TEAS Eng and language usage, TEAS Test Science Questions, teas test review 1, English study question teas, MATH SECTION, test, Reading2, Teas Reading, TEAS TEST (WHITE HOUSE SOLAR PANEL), TEAS Science Questions, TEAS READING: Assessment B, TEAS...

View Set

AP Government Unit 1: Foundations of American Democracy

View Set