N Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation? A. 10.8.0.0/16B. 10.8.0.0/19C. 10.8.0.0/20D. 10.0.0.0/24

A. 10.8.0.0/16

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO). A. 20B. 21C. 22D. 23E. 67F. 68

A. 20 B. 21

A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) A. 802.11aB. 802.11acC. 802.11bD. 802.11gE. 802.11n

A. 802.11aB. 802.11ac

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem? A. 802.1q is not configured on the switch portB. APIPA has been misconfigured on the VLANC. Bad SFP in the PC's 10/100 NICD. OS updates have not been installed

A. 802.1q is not configured on the switch port

A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this? A. 802.1xB. 802.1pC. Single sign-onD. Kerberos

A. 802.1x

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types? A. APIPAB. MACC. Static D. Public

A. APIPA

Which of the following should current network performance be compared against to determine network anomalies? A. BaselineB. Traffic analysisC. Packet captureD. Logs

A. Baseline

Which of the following refers to a network that spans several buildings that are within walking distance of each other? A. CANB. WANC. PAND. MAN

A. CAN

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments? A. CSMA/CDB. OSPFC. DOCSISD. BGP

A. CSMA/CD

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented? A. DLPB. AUPC. NDAD. SLA

A. DLP

Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT? A. Determine if any network equipment was replaced recentlyB. Verify malware has not disabled the users' PC firewallsC. Replace users' network cables with known-good network cablesD. Power cycle the web server

A. Determine if any network equipment was replaced recently

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item? A. Ensure patches are deployedB. Install an IDS on the networkC. Configure the firewall to block traffic on port 443D. Implement a VPN for employees

A. Ensure patches are deployed

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing? A. Fire suppressionB. Mantraps at the entryC. HVACD. UPS and battery backups

A. Fire suppression

Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? A. HybridB. PublicC. CommunityD. Private

A. Hybrid

A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed? A. Implement an environment to test the enhancements.B. Implement ACLs that only allow management access to the enhancements.C. Deploy an IPS on the production network.D. Move the software team's workstations to the DMZ

A. Implement an environment to test the enhancements

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO). A. Layer 2B. Layer 3C. Layer 5D. Transport layerE. Data linkF. Physical layer

A. Layer 2 E. Data link

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO) A. Memorandum of understandingB. Data classification documentC. Service level agreementD. Interconnection security agreementE. Consent to monitorF. Acceptable use policy

A. Memorandum of understanding F. Acceptable use policy

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output: SRC MAC SRC IP DST MAC DST IP00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:120005:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300 Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring? A. NetworkB. ApplicationC. Data linkD. Transport

A. Network

As part of a transition from a static to a dynamic routing protocol on an organization's internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.) A. OSPFB. IS-ISC. RIPv1D. BGPE. VRRP

A. OSPF B. IS-IS

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? A. PoEB. Port bondingC. VLAND. Trunking

A. PoE

The Chief Information Officer (CIO) wants to improve the security of the company's data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information? A. PoliciesB. VPNC. HTTPSD. Standards

A. Policies

After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network? A. Reverse the fiber strands of the cable and reconnect them to the serverB. Use a TDR to test both strands of a new replacement cable prior to connecting it to the serverC. Replace the server's single-mode fiber cable with multimode fiberD. Move the fiber cable to different port on the switch where both strands function

A. Reverse the fiber strands of the cable and reconnect them to the server

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.) A. SIP B. NTP C. H.323 D. SMB E. ICMP F. RTP G. IPSec H. RDP

A. SIP C. H.323 F. RTP

Which of the following is a UC application? A. SoftphoneB. IntranetC. ProxyD. Facsimile

A. Softphone

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of the following components should the technician check on the Windows workstations? (Choose two.) A. Start the Wired AutoConfig service in the Services console B. Enable IEEE 802.1q Authentication in Network Interface Card Properties C. Enable IEEE 802.1x Authentication in Network Interface Card Properties D. Start the Wireless AutoConfig service in the Services console E. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties

A. Start the Wired AutoConfig service in the Services console C. Enable IEEE 802.1x Authentication in Network Interface Card Properties

A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause? A. The wrong wavelength was demuxed from the multiplexer.B. The SFP in the multiplexer is malfunctioning.C. There is a dirty connector on the fiber optic cable.D. The fiber optic cable is bent in the management tray.

A. The wrong wavelength was demuxed from the multiplexer.

A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue? A. Update the DNS server with the proxy server information.B. Implement a split horizon DNS server.C. Reboot the web proxy and then reboot the DNS server.D. Put the proxy server on the other side of the demarc.

A. Update the DNS server with the proxy server information.

A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer's demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following should the network administrator do to rule out any problems at Layer 1? (Choose two.) A. Use a loopback at the demark and router, and check for a link lightB. Use an OTDR to validate the cable integrityC. Use a pinout tester to validate the cable integrityD. Use a multimeter to validate the cable integrityE. Check for any devices that may be causing EMI on the cableF. Clean the cables to be sure they are free of dust and debris

A. Use a loopback at the demark and router, and check for a link light B. Use an OTDR to validate the cable integrity

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building? A. Use the same SSIDs on different channels and AP isolationB. Use different SSIDs on different channels and VLANsC. Use different SSIDs on the same channels with VLANsD. Use the same SSIDs on same channels with AP isolatio

A. Use the same SSIDs on different channels and AP isolation

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST? A. WAP placementB. Encryption typeC. Bandwidth saturationD. WAP SSID

A. WAP placement

The process of attempting to exploit a weakness in a network after being given permission by the company is known as: A. penetration testingB. vulnerability scanningC. reconnaissanceD. social engineering

A. penetration testing

Which of the following can be issued from the command line to find the layer 3 hops to a remote destination? A. tracerouteB. nslookupC. pingD. netstat

A. traceroute

Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch? A. 0B. 1C. 2D. 6E. 12

B. 1

A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of its interfaces. How many broadcast domains are present in this company's network A. 1B. 2C. 5D. 16E. 28

B. 2

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.) A. 802.11aB. 802.11acC. 802.11bD. 802.11gE. 802.11n

B. 802.11ac E. 802.11n

Which of the following requires the network administrator to schedule a maintenance window? A. When a company-wide email notification must be sent.B. A minor release upgrade of a production router.C. When the network administrator's laptop must be rebooted.D. A major release upgrade of a core switch in a test lab.

B. A minor release upgrade of a production router.

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues? A. UTP patch cablesB. AntennaC. Power adapterD. Security standard

B. Antenna

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions? A. Network mapB. Asset managementC. Change managementD. Baselines

B. Asset management

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility? A. 66 blockB. BNCC. F-connectorD. RJ-11

B. BNC

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers? A. Block all LAN to LAN trafficB. Block all LAN to WAN trafficC. Block all WAN to LAN trafficD. Block all WLAN to WAN traffic

B. Block all LAN to WAN traffic

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect? A. Confirm the new host is using 10GBaseSR due to the manufacturing environmentB. Confirm the new host is compatible with 10BaseT EthernetC. Confirm the existing 10Base2 equipment is using the proper frame typeD. Confirm that CSMA/CD is disabled on the Ethernet network

B. Confirm the new host is compatible with 10BaseT Ethernet

An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig command:Which of the following would MOST likely allow the network drives to be accessed? A. Update the WLAN adapter driverB. Disable the WLAN adapterC. Check the wireless DHCP configurationD. Disable the LAN adapter

B. Disable the WLAN adapter

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology? A. Document the findings and action taken.B. Establish a plan to locate the rogue DHCP server.C. Remove the rogue DHCP server from the network.D. Identify the root cause of the problem.

B. Establish a plan to locate the rogue DHCP server.

A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured? A. Content filterB. FirewallC. DNSD. DHCP

B. Firewall

Which of the following is considered a classless routing protocol? A. IGRPB. IS-ISC. RIPv1D. STP

B. IS-IS

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? A. Utilize a FTP serviceB. Install recommended updatesC. Send all log files through SMTPD. Configure the firewall to block port 22

B. Install recommended updates

Which of the following is a security benefit gained from setting up a guest wireless network? A. Optimized device bandwidthB. Isolated corporate resourcesC. Smaller ACL changesD. Reduced password resets

B. Isolated corporate resources

The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use? A. BPDUB. LACPC. Spanning treeD. Load balancing

B. LACP

QoS operates at which of the following OSI model layers? (Select TWO) A. Layer 1B. Layer 2C. Layer 3D. Layer 5E. Layer 7

B. Layer 2C. Layer 3

An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence? A. Chain of custodyB. Legal holdC. Divide and conquerD. Persistent agents

B. Legal hold

Which of the following describes an IPv6 address of ::1? A. BroadcastB. LoopbackC. ClasslessD. Multicast

B. Loopback

OFDM, QAM and QPSK are all examples of which of the following wireless technologies? A. FrequencyB. ModulationC. RF interferenceD. Spectrum

B. Modulation

Which of the following should be used to ensure a specific device always receives the same IP address? A. IP helperB. ReservationC. Address leaseD. DHCP scopeE. DHCP relay

B. Reservation

Which of the following MUST be implemented to share metrics between routing protocols within the same router? A. Routing loopB. Routing tableC. Route redistributionD. Dynamic routes

B. Routing table

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation? A. Port mirroringB. Spanning treeC. ARP inspectionD. VLAN

B. Spanning tree

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting? A. The VoIP phone would request a new phone number from the unified communications server.B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.D. The VoIP phone would request a different configuration from the unified communications server.

B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user? A. The user is connected using the wrong channel.B. The user is connected to the wrong SSID.C. The user is experiencing an EMI issue.D. The user is connected to the wrong RADIUS server

B. The user is connected to the wrong SSID.

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks? A. Smurf attackB. VLAN hoppingC. BluesnarfingD. Spear phishing

B. VLAN hopping

Which of the following would be the MOST efficient subnet mask for a point-to-point link? A. /28B. /29C. /31D. /32

C. /31

A technician is trying to determine the IP address of a customer's router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer's router? A. 192.168.0.55B. 192.168.1.0C. 192.168.1.1D. 192.168.5.5E. 255.255.255.0

C. 192.168.1.1

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results? A. A TACACS+ device and a RADIUS serverB. A TACACS and a proxy serverC. A RADIUS server and an access pointD. A RADIUS server and a network controller

C. A RADIUS server and an access point

A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based? A. A cloud-based antivirus system with a heuristic and signature based engineB. A network based firewall which blocks all inbound communicationC. A host-based firewall which allows all outbound communicationD. A HIDS to inspect both inbound and outbound network communication

C. A host-based firewall which allows all outbound communication

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue? A. Add a honeypot to reduce traffic to the serverB. Update the Ethernet drivers to use 802.3C. Add additional network cards to the serverD. Disable CSMA/CD on the network

C. Add additional network cards to the server

A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison? A. Regression testB. Speed testC. BaselineD. Statement of work

C. Baseline

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps? A. Block echo replies inbound to the DMZB. Disable UDP on the serversC. Block ICMP at the firewallD. Disable TCP/IP on the server

C. Block ICMP at the firewall

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved? A. Smurf attackB. Rogue APC. Compromised systemD. Unintentional DoS

C. Compromised system

A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert:1 * * * Request timed out.2 * * * Request timed out.3 * * * Request timed out.The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? A. Enable split horizon to allow internal tracert commands to pass through the firewallB. Enable IGMP messages out and block IGMP messages into the networkC. Configure the firewall to allow echo reply in and echo request out of the networkD. Install a backdoor to access the router to allow tracert messages to pass through

C. Configure the firewall to allow echo reply in and echo request out of the network

A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable? A. Wavelength mismatchB. Distance limitationsC. Connector mismatchD. Attenuation/Db loss:

C. Connector mismatch

The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network related. Which of the following should the technician do to improve performance? A. Utilize UDP to eliminate packet overheadB. Turn off MDIX settings on the NAS and server switchportsC. Enable jumbo frames on the NAS and serverD. Encapsulate the storage traffic in a GRE tunnel

C. Enable jumbo frames on the NAS and server

A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application? A. CAT5e cableB. Coax cableC. Fiber Optic cableD. CAT6 cable

C. Fiber Optic cable

After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked? A. Server host fileB. Subnet maskC. Local hosts fileD. Duplex settings

C. Local hosts file

Peter, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives "Destination Unreachable". Which of the following issues could this be? A. Denial of service attackB. Misconfigured DNS settingsC. Misconfigured Split HorizonD. RADIUS authentication errors

C. Misconfigured Split Horizon

A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues? A. Light sensors are interfering with the networkB. EMI from the lights is interfering with the network cablesC. Network wiring is run perpendicular to electrical conduitD. Temperature changes are causing attenuation in copper cabling

C. Network wiring is run perpendicular to electrical conduit

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement? A. High availabilityB. MAN networkC. QuarantineD. Honeynet

C. Quarantine

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement? A. StarB. BusC. RingD. Mesh

C. Ring

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure? A. Hardware firewallB. Proxy serverC. Software firewallD. GRE tunneling

C. Software firewall

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic? A. Intrusion detection systemB. Application aware firewallC. Stateful packet inspectionD. Stateless packet inspection

C. Stateful packet inspection

A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue? A. Grounding barB. Rack monitoringC. UPS D. Air flow managementE. Surge protector

C. UPS

An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist? A. 3B. 12C. 13D. 14E. 15

D. 14

A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements? A. 10.5.4.0/22B. 10.233.2.0/23C. 172.16.0.0/22D. 172.18.0.0/23E. 192.168.25.0/24

D. 172.18.0.0/23

A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down? A. Load balancerB. VRRPC. OSPFD. BGP

D. BGP

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue? A. EMIB. RFIC. Cross-talkD. Bad wiring

D. Bad wiring

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? A. Maximum cable length exceededB. Dirty connectorsC. RF interference caused by impedance mismatchD. Bend radius exceeded

D. Bend radius exceeded

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following? A. MultiplexingB. Zero-day attackC. SmurfingD. Bluejacking

D. Bluejacking

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed? A. Document the sceneB. Forensics reportC. Evidence collectionD. Chain of custody

D. Chain of custody

A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future? A. Configure an automated patching serverB. Virtualize the servers and take daily snapshotsC. Configure a honeypot for application testingD. Configure a test lab for updates

D. Configure a test lab for updates

Which of the following is used to classify network data for the purpose of providing QoS? A. STPB. VLANsC. SIPD. DSCP

D. DSCP

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? A. TaggingB. EncapsulationC. TunnelingD. De-encapsulation

D. De-encapsulation

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT? A. Establish a theory of probable cause.B. Document actions and findings.C. Determine next steps to solve the problem.D. Determine if anything has changed.

D. Determine if anything has changed.

An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office. Which of the following did the administrator set up? A. CANB. MANC. WAND. LAN

D. LAN

A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop? A. On the DMZ networkB. On the sandbox networkC. On the honeypotD. On the quarantine network

D. On the quarantine network

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network? A. Use SNMPv1 for all configurations involving the routerB. Ensure the password is 10 characters, containing letter and numbersC. Copy all configurations to routers using TFTP for secuirtyD. Only allow administrators to access routers using port 22

D. Only allow administrators to access routers using port 22

A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error? A. Only FTP can be used to copy configurations from switchesB. Anonymous users were not used to log into the TFTP serverC. An incorrect password was used and the account is now lockedD. Port 69 is blocked on a router between the network segments

D. Port 69 is blocked on a router between the network segments

A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an example of which of the following? A. Dynamic DNSB. Virtual Private networking (VPN)C. Dynamic NATD. Port Forwarding

D. Port Forwarding

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue? A. WPA2 security keyB. SSL certificatesC. CSMA/CAD. RADIUS

D. RADIUS

Which of the following allows a telecommunication company to test circuits to customers remotely? A. VLANB. Toner ProbeC. RDPD. Smart JackE. VPN

D. Smart Jack

A technician, Peter, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Peter use for this subnet? A. /24B. /32C. /28D. /29E. /30

E. /30

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following: - WLAN architecture supporting speeds in excess of 150 Mbps- Clientless remote network access- Port-based network access control. Which of the following solution sets properly addresses all of the identified requirements? A. 802.11a, IPSec VPN, 802.1xB. 802.11ac, MPLS, 802.3C. 802.11b, PPTP, 802.1xD. 802.11g, MS-CHAP, 802.16E. 802.11n, SSL-VPN, 802.1x

E. 802.11n, SSL-VPN, 802.1x

After a company rolls out software updates, Jane, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Jane can get back to work as quickly as possible? A. Reformat and install the compatible drivers.B. Reset Jane's equipment configuration from a backup.C. Downgrade the PC to a working patch level.D. Restore Jane's PC to the last known good configuration.E. Roll back the drivers to the previous version.

E. Roll back the drivers to the previous version.

A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:Interface A:IP address: 10.10.150.16Subnet mask: 255.255.255.240Default gateway: 10.10.150.32Speed: 1000 Mbps Duplex: AutoState: No Shutdown None of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO). A. There is a duplex mismatch between the router and ISP.B. The router interface is turned off.C. The interface is set to the incorrect speed.D. The router is configured with the incorrect subnet mask.E. The router interface is configured with the incorrect IP address.F. The default gateway is configured incorrectly.

E. The router interface is configured with the incorrect IP address.F. The default gateway is configured incorrectly.


Set pelajaran terkait

The Greatest Muhammad Ali by Walter Dean Myers

View Set

Module 1 lecture notes role of NP

View Set

A Very Old Man with Enormous Wings Vocabulary

View Set

"Briefly define each term below and give an example that illustrates the term. The example can be a study that was detailed in class or a real life example, as long as it adequately illustrates the concept."

View Set