N+ Practice

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue? A. Update the DNS server with the proxy server information. B. Implement a split horizon DNS server. C. Reboot the web proxy and then reboot the DNS server. D. Put the proxy server on the other side of the demarc.

A

A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue? A. The gateway is misconfigured on the new router. B. The subnet mask is incorrect on the new router. C. The gateway is misconfigured on the edge router. D. The SSID is incorrect on the new router.

A

A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. Which of the following solutions should the technician design into the new network? A. Place each department in a separate VLAN B. Add a router and create a segment for all the monitoring host stations C. Increase the number of switches on the network to reduce broadcasts D. Increase the collision domain to compensate for the added broadcasts

A

A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause? A. The wrong wavelength was demuxed from the multiplexer. B. The SFP in the multiplexer is malfunctioning. C. There is a dirty connector on the fiber optic cable. D. The fiber optic cable is bent in the management tray.

A

A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector. Which of the following is the issue? A. Cross-talk B. 568A/568B mismatch C. Tx/Rx reverse D. Split pairs

A

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: 1)Client PC 1 has an IP address if 192.168.10.25/25 2)PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A 3)Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25 4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause? A. Link from router A to PC 1 are on different subnets B. Link from router A to server A is down C. Link from PC 1 to router A has duplex issues D. Link from server A op PC 2 is down

A

An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office. Which of the following did the administrator set up? A. CAN B. MAN C. WAN D. LAN

A

The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals? A. Stateful firewall B. Premise-based IDS C. Host-based IDS D. Cloud-based anti-malware

A

The Chief Information Officer (CIO) wants to improve the security of the company's data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information? A. Policies B. VPN C. HTTPS D. Standards

A

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager's inquiry, which of the following did the administrator forget to do FIRST? A. Submit a change request B. Schedule a maintenance window C. Provide notification of change to users D. Document the changes

A

The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be provided, which of the following media will need to utilized? A. CAT6e B. CAT5e C. 802.11n D. 802.11ac

A

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used? A. 802.11a B. 802.11b C. 802.11g D. 802.1x

A

Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following should the technician implement to avoid potential occurrences from happening in the future? A. Block all ICMP request B. Update all antivirus software C. Remove all suspected users from the network D. Upgrade firmware on all network cards

A

Which of the following can be issued from the command line to find the layer 3 hops to a remote destination? A. traceroute B. nslookup C. ping D. netstat

A

Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? A. Hybrid B. Public C. Community D. Private

A

Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.

A

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments? A. CSMA/CD B. OSPF C. DOCSIS D. BGP

A

A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n

AB

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO). http://www.gratisexam.com/ A. Layer 2 B. Layer 3 C. Layer 5 D. Transport layer E. Data link F. Physical layer

AE

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO) A. Memorandum of understanding B. Data classification document C. Service level agreement D. Interconnection security agreement E. Consent to monitor F. Acceptable use policy

AF

A client reports that half of the office is unable to access a shared resource. Which of the following should be used to troubleshoot the issue? A. Data backups B. Network diagrams C. Baseline information D. Vendor documentation

B

A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email? A. CNAME B. MX C. PTR D. A

B

A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to? A. Core switch B. MDF C. Ethernet router D. IDF

B

A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened? http://www.gratisexam.com/ A. 445 B. 3389 C. 5004 D. 5060

B

A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks? A. Social engineering B. Spoofing C. Zero-day attack D. VLAN hopping

B

A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause? A. Distance limitation B. Wavelength mismatch C. cross-talk D. EMI E. Macro bend

B

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology? A. Document the findings and action taken. B. Establish a plan to locate the rogue DHCP server. C. Remove the rogue DHCP server from the network. D. Identify the root cause of the problem.

B

A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the: A. MLA. B. SLA. C. SOW. D. MOU.

B

A single mode fiber is no longer providing network connectivity to a remote site. Which of the following would be used to identify the location of the break? A. MT-RJ B. OTDR C. Media converter D. Cable certifier

B

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address? A. Configure NAT on the firewall B. Implement a split horizon DNS C. Place the server in the DMZ D. Adjust the proper internal ACL

B

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem? A. Distance limitation B. Electromagnetic interference C. Cross talk D. Speed and duplex mismatch

B

A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a device failure? A. Vendor documentation B. Archives/backups C. Proper asset tagging and labeling D. Network Baseline

B

An area to which access is controlled by retina scan is protected by which of the following security measure types? A. Two-factor authentication B. Biometric C. Cipher locks D. Optical reader E. Proximity reader

B

An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence? A. Chain of custody B. Legal hold C. Divide and conquer D. Persistent agents

B

Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following? A. Network handle B. Autonomous system number C. Route aggregation D. Top level domain

B

The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use? A. BPDU B. LACP C. Spanning tree D. Load balancing

B

Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches? A. Via SSH using the RADIUS shared secret B. Via HTTP using the default username and password C. Via console using the administrator's password D. Via SNMP using the default RO community

B

Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back? A. The browser on the server B. The server's NIC drivers C. The server's IP address D. The antivirus updates

B

When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting? A. Transport layer B. Physical layer C. Network layer D. Session layer

B

Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections? A. OC12 B. POTS C. WiMax D. OC3

B

Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider? A. 110 block B. MDF C. DSU D. CSU

B

Which of the following is an example of an IPv4 address? A. 192:168:1:55 B. 192.168.1.254 C. 00:AB:FA:B1:07:34 D. ::1

B

Which of the following is the main difference between TCP and UDP? A. TCP data flows in two directions, while UDP data flows from server to client. B. The TCP header implements flags, while the UDP header does not. C. The TCP header implements checksum, while the UDP header does not. D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.

B

Which of the following requires the network administrator to schedule a maintenance window? http://www.gratisexam.com/ A. When a company-wide email notification must be sent. B. A minor release upgrade of a production router. C. When the network administrator's laptop must be rebooted. D. A major release upgrade of a core switch in a test lab.

B

Which of the following should be used to ensure a specific device always receives the same IP address? A. IP helper B. Reservation C. Address lease D. DHCP scope E. DHCP relay

B

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues? A. UTP patch cables B. Antenna C. Power adapter D. Security standard

B

QoS operates at which of the following OSI model layers? (Select TWO) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 5 E. Layer 7

BC

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO). http://www.gratisexam.com/ A. 1000Base-LR B. 1000Base-SR C. 1000Base-T D. 10GBase-LR E. 10GBase-SR F. 10GBase-T

BE

A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem? A. Damaged cable B. Duplex mismatch C. Incorrect VLAN assignment D. Speed mismatch

C

A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback? A. Channel remote module B. Fiber optic modem C. Channel service unit D. Digital subscriber line modem

C

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to replace it. Which of the following would be the MOST helpful in regaining connectivity? A. VLAN configuration B. Network diagram C. Configuration backup D. Router image

C

A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach? A. Create VLANs to segment the network traffic B. Place a network sniffer on segments with new employees C. Provide end user awareness and training for employees D. Ensure best practices were implemented when creating new user accounts

C

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk? A. Firewall B. Web filtering C. MAC filtering D. Host-based antivirus

C

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue? A. Add a honeypot to reduce traffic to the server B. Update the Ethernet drivers to use 802.3 C. Add additional network cards to the server D. Disable CSMA/CD on the network

C

A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch? A. Use TFTP for tested and secure downloads B. Require biometric authentication for patch updates C. Provide an MD5 hash for each file D. Implement a RADIUS authentication

C

A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out. The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? A. Enable split horizon to allow internal tracert commands to pass through the firewall B. Enable IGMP messages out and block IGMP messages into the network C. Configure the firewall to allow echo reply in and echo request out of the network D. Install a backdoor to access the router to allow tracert messages to pass through

C

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic? A. Intrusion detection system B. Application aware firewall C. Stateful packet inspection D. Host-based antivirus

C

A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken? A. Document the findings, actions, and outcomes B. Duplicate the problem if possible C. Verify system functionality D. Make an archival backup

C

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem? A. Username is misspelled is the device configuration file B. IDS is blocking RADIUS C. Shared secret key is mismatched D. Group policy has not propagated to the device

C

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers? A. Block all LAN to LAN traffic B. Block all LAN to WAN traffic C. Block all WAN to LAN traffic D. Block all WLAN to WAN traffic

C

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement? A. High availability B. MAN network C. Quarantine D. Honeynet

C

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices? A. WPA2 B. IPv6 C. SNMPv3 D. RIPv2

C

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? A. Does the printer have toner? B. Are there any errors on the printer display? C. Is the user able to access any network resources? D. Is the printer powered up?

C

A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network? A. 802.11a B. 802.11ac C. 802.11b D. 802.11g

C

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols? A. Firewall B. Router C. 802.11 AP D. Switch

C

While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem? A. Default gateway address B. Misconfigured DNS C. DHCP server D. NIC failure

C

In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO). A. Rack monitoring B. Device placement C. Wall plate labeling D. Room numbering E. Patch panel labeling

CE

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue? A. WPA2 security key B. SSL certificates C. CSMA/CA D. RADIUS

D

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly? A. Load balancer B. FTP server C. Firewall DMZ http://www.gratisexam.com/ D. Mail server

D

Which of the following PDUs is used by a connectionless protocol? A. Frames B. Segments C. Streams D. Datagram

D

Which of the following allows a telecommunication company to test circuits to customers remotely? A. VLAN B. toner probe C. RDP D. Smartjack E. VPN

D

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? A. Tagging B. Encapsulation C. Tunneling D. De-encapsulation

D

Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window? A. Configuration procedures B. Stakeholder notification C. Impact analysis D. Rollback procedure

D

Which of the following ports should be allowed top provide access to certain VoIP applications? A. 110 B. 139 C. 1720 D. 5060

D

Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or earthquake? A. UPS and battery backups B. Fire suppression systems C. Building generator D. Hot sites or cold sites E. NAS and tape backups

D

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? A. Maximum cable length exceeded B. Dirty connectors C. RF interference caused by impedance mismatch D. Bend radius exceeded

D

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. Which of the following servers is MOST likely down? A. WINS server B. Domain controller C. DHCP server D. DNS server

D

Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO) A. OSPF B. RIPv2 C. 802.1q D. Spanning tree E. 802.1d F. QoS

DE

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO) A. Presentation B. Transport C. Session D. Data link E. Application F. Physical

DF

A administrator's network has OSPF for the internal routing protocol and has two interfaces that continue to flap. The administrator reviews the following output: Fast ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100Base Tx/Fx Received 1052993 broadcasts 1258 input errors 983881 packet output, 768588 bytes 1747 output errors, 0 collisions, 423 resets Which of the following problems would cause the interface flap? A. Wrong IP address B. Loopback not set C. Bad wire D. Incorrect encapsulation E. Duplex mismatch

E

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? A. Host-based intrusion detection systems B. Acceptable use policies C. Incident response team D. Patch management

D

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation? A. Allow the contractor to reset switches to factory defaults B. Check the cabling on all switches for improper crossover use C. Document the changes that were made D. Downgrade firmware and restore backup configuration

D

A network administrator noticed that when one computer goes down, all the other computers in the office will not work. Which of the following topologies is in use? A. Star B. Ring C. Hybrid D. Bus E. Mesh

D

A network technician discovers an issue with spanning tree on the switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue? A. Test a theory to determine the cause B. Escalate to a senior technician C. Identify the symptoms D. Establish a theory of probable cause E. Establish a plan of action

D

A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments? A. The internal network since it is private B. The admin private network allowing only admin access C. The DMZ only allowing access from the segment with the servers D. The internet connection to allow admin access from anywhere

D

A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram? A. Building layout B. Patch panel labeling C. Packet sniffing D. Naming conventions

D

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT? A. Establish a theory of probable cause. B. Document actions and findings. C. Determine next steps to solve the problem. D. Determine if anything has changed.

D

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network? A. Use SNMPv1 for all configurations involving the router B. Ensure the password is 10 characters, containing letter and numbers C. Copy all configurations to routers using TFTP for secuirty D. Only allow administrators to access routers using port 22

D

A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it? A. An SNMP GET B. A top listener tool C. An intrusion detection system D. A packet sniffer

D

A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP address automatically. Which of the following is the cause of the problem? A. DNS B. Wrong TCP port C. Split horizon D. DHCP scope

D

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue? A. Update the HOST file with the URLs for all websites B. Use NSLOOKUP to resolve URLs C. Ensure ICMP messages can pass through the firewall D. Enable port 53 on the firewall

D

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue? A. EMI B. RFI C. Cross-talk D. Bad wiring

D

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following? A. The OSPF not-so-stubby area is misconfigured B. Reduced wireless network coverage C. Spanning tree ports in flooding mode D. BGP routing issues

D

Channel bonding will improve which of the following wireless characteristics? A. Signal strength B. Encryption strength C. Coverage area D. Connection speed

D

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output: SRC MAC SRC IP DST MAC DST IP 00:1D:1F:AB:10:7D 192.168.1.10:2000 15:BE:9F:AB:10:1D 192.168.1.14:1200 05:DD:1F:AB:10:27 192.168.1.10:1000 22:C7:2F:AB:10:A2 192.168.1.15:1300 Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring? A. Network B. Application C. Data link D. Transport

A

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC's, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet these requirements? A. The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network B. The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only C. The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range D. The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC

C

Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem? A. Increase the maximum log size B. Log into the DNS server every hour to check if the logs are full C. Install an event management tool D. Delete the logs when full

C

Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following? A. SOP B. BEP C. AUP D. SLA

C

There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future? A. Helpdesk training B. Appropriate use policy C. User awareness training D. Personal Identifiable Information

C

Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root cause of the problem? A. Baseline B. Bottleneck C. Utilization D. Link status

C


Set pelajaran terkait

Learning System RN 3.0 Nursing Care of Children Final Quiz

View Set

CFE: Fraud Prevention and Deterrence

View Set

Management of Patients with Dysrhythmias and Conduction Problems (Chapter 26)

View Set

Chapter 7 Anatomy & Physiology Test Q's

View Set

egyptian art history final key terms

View Set

NUR 304 Chapter 46 Concepts of Care for Patients with Oral Cavity and Esophageal Conditions

View Set