network +

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Question 26 Which of the following should a technician investigate when using a network baseline to troubleshoot?

Determining if the server performance is degraded

Question 8 A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)

Disable Telnet.******** Implement AAA.

Question 93 The Chief Executive Officer's (CEO's) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?

Distance

Question 49 A technician restored network connectivity on a user's laptop. After validating full system functionality, which of the following steps should the technician take NEXT?

Document the findings, actions, and outcomes

Question 6 A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

Download each switch's current configuration before the upgrade.

Question 37 A network technician receives a report that the company's intranet web server is not responding. The technician verifies successful connectivity to the server via the ping and tracert commands. The technician also verifies the routers and switches are online and operational, and then runs Telnet to port 80 and receives a response. Which of the following troubleshooting steps should the technician perform NEXT?

Duplicate the issue and continue testing.

Question 3 A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?

EUI-64

Question 69 A technician needs to upgrade a SOHO wireless router's firmware. The technician resets the router to factory settings and installs the new firmware. The technician enters the DHCP information and sets the SSID. Which of the following configurations would provide the MOST protection from advance hackers?

Enable WPA2 authentication for all hosts.

Question 68 HOTSPOT Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Range Given: 172.30.232.0/24 Sales 57 devices HR 23 devices IT 12 devices Finance 32 devices Marketing 9 devices INSTRUCTIONS Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. If at any time you would like to bring

Explanation: Sales network - /26 - This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP) HR network - /27 - This will provide for up to 30usable IP's (32-2) IT - /28 - This will provide for up to 14 usable IP's (16-2) Finance - /26 - Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP's and can't be used for hosts. Marketing - /28 If we add up how many IP blocks are used that is 64+32+16+64+16=192. A /24 contains 256 IP addresses, so 256-192=64. So the last unused box should be a /26, which equates to 64 addresses

Question 11 Which of the following would allow a network technician to access files on a remote system?

FTP ********* TFTP

Question 28 A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?

File hash

Question 1 A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be specifically configured to allow VPN traffic into the network?

Firewall

Question 9 Which of the following devices should a network administrator configure on the outermost part of the network?

Firewall

Question 12 A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

HTTP

Question 7 Which of the following is a system of notation that uses base 16 rather than base 10?

Hex

Question 95 Which of the following would indicate that a circuit speed should be increased?

High packet drops

Question 59 A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?

Hostname

Question 67 A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?

IPSec

Question 2 A network administrator is reviewing security logs and notes a strange IP address logging into the management console of a switch. The administrator verifies the switch is not using default credentials. Which of the following steps should the administrator take NEXT?

Implement restrictions via ACL.

Question 50 A technician set up a new SOHO network recently. The installed router has four Ethernet ports, however, the customer has seven devices that need wired connections. Which of the following should the technician do to BEST meet the customer's requirements?

Install a six-port switch.

Question 25 A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

LC

Question 29 According to the OSI model, at which of the following layers is data encapsulated into a packet?

Layer 3

Question 19 Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?

Layer 3 switch

Question 5 A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?

Layer 4 - Transport

Question 31 A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?

Layer 7

Question 35 A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network. Which of the following should the administrator create?

Logical diagram

Question 46 A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

Loopback adapter

Question 55 A network administrator is reviewing the following output from a switch: Which of the following attacks has occurred on the switch?

MAC address spoofing

Question 24 A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?

MU-MIMO

Question 73 A security administrator wants to implement the ability to prevent an authorized user from tailgatinginto the office building. Which of the following should be implemented?

Mantrap

Question 70 A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?

NAC

Question 75 A company is contracting a new third-party organization that will handle storage of the company's critical data. Which of the following policies would ensure the data remains confidential?

NDA

Question 91 A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

Offboarding

Question 32 A network technician performs a wireless site survey at a company building and identifies that the cafeteria is not covered by a wireless signal. The cafeteria is located in a medium-size, square-shaped room. Which of the following types of WAP antenna should the technician install in the center of the cafeteria to provide the BEST coverage?

Omnidirectional

Question 71 A few weeks after starting a new position, Joe, a junior network administrator, receives a call from aninternal number asking for his username and password to update some records. Joe realizes this maybe a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?

Social engineering

Question 76 A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC-to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?

Transpose the fiber pairs.

Question 61 Which of the following BEST describes the differences between VLAN hopping and session hijacking?

VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands

Question 47 Ann, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, she can access the Internet. The network engineer has confirmed that Ann's account has been set up the same as the others. There are no access lists restricting Ann's access. Which of the following could be the issue for this lack of access?

VLAN mismatch

Question 45 A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue?

Verify the host has physical connectivity and is on the correct VLAN.

Question 62 A technician is assigned to secure a basic wireless network. Which of the following authentication protocols should the technician use to perform this task? (Choose two.)

WPA2 EAP

Question 98 A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users' devices to the company network. To complete this step, which of the following should be used to secure the remote network location?

WPA2/WPA

Question 4 When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST question to ask to determine the scope of the issue?

What has been changed on the web server since the previous day?

Question 90 Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)

Wireless controller RADIUS server

Question 72 A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?

192.1.0.124/30

Question 15A technician is trying to determine the IP address of a customer's router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer's router?

192.168.1.1

Question 97 Given the table below:Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?

192.168.11.255

Question 77 Which of the following is the SHORTEST way to write 2001:0000:0d58:0000:0000:0095:7565:0001 in proper IPv6 shorthand?

2001:0:d58::95:7565:1

Question 87 A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?

255.255.240.0

Question 38 Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

3

Question 79 A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)

802.11ac 802.11n

Question 16 An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following: WLAN architecture supporting speeds in excess of 150 Mbps Clientless remote network access Port-based network access control Which of the following solution sets properly addresses all of the identified requirements?

802.11n, SSL-VPN, 802.1x

Question 23 A technician is utilizing SNMPv3 to monitor network statistics. Which of the following actions would occur immediately of a server's utilization spikes above the prescribed value?

A trap message is sent via UDP to the monitoring workstation

Question 17 A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?

ARP poisoning attack

Question 74 Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?

AUP

Question 64 802.11n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect?

Access point

Question 44 A network technician configures a firewall's ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewall's deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?

Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Question 84 Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network. An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Question 18 A user wants to secure a network closet and be able to tell if anyone makes changes in the closet. Which of the following would be the BEST detective physical security devices in this situation? (Choose two.)

Anti-tampering ********** Video surveillance

Question 80 While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

Avoiding common passwords

Question 20 Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?

BYOD policy

Question 14Which of the following BEST describes the characteristics of a differential backup solution?

Backs up files with the creation or modified date as the current date

Question 30 Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?

Bend radius exceeded

Question 78 Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?

Determine if any network equipment was replaced recently

Question 51 Which of the following DNS record types is an alias?

CNAME

Question 56 A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)

Cat 6 with a repeater placed in the middle of the run Fiber-optic cabling

Question 41 A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?

Change management

Question 94 A network technician is repurposing a switch that has been in storage for some time. The device has been wiped to factory defaults. Which of the following should be done FIRST to ensure the device has been hardened before configuration?

Check for updated firmware.

Question 43 Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?

Check the latency by running a continuous ping to the site.

Question 13Management has requested that services be available within 72 hours of a disaster. Budget is a majorconcern. A contract is signed with a company that has plenty of space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?

Cold site

Question 89 A network manager is concerned about visitors taking advantage of open cubicies at a company's facilities. Which of the following would mitigate this issue?

Create a VLAN for all unused switchports.

Question 66 A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks?

Create a new network segment with ACLs, limiting kiosks' traffic with the internal network.

Question 21 A company has procured a new office building and started the process of assigning employees to work at that location. The company has also purchased equipment for the new location. There are 5033 laptops, 6000 monitors, and 857 printers. Which of the following steps is the technician most likely to complete FIRST?

Create an inventory database

Question 86 A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?

Crossover

Question 99 A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Crossover

Question 83 A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company's firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?

Media converter

Question 60 An administrator is redesigning a company's network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration?

Multilayer switch

Question 52 A technician wants to physically connect two office buildings' networks. The office buildings are located 600ft (183m) apart. Which of the following cable types is the BEST choice?

Multimode

Question 40 SIMULATION After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs. INSTRUCTIONS Verify the settings by using the command prompt, after making any system changes. Next, restore connectivity by making the appropriate changes to the infrastructure. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128, then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.

Question 85 During a weekend event, several people reported they were unable to get onto the wireless network. On Monday, the technician could not find a problem. Which of the following is the MOST likely cause?

Overcapacity

Question 39 A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office. Of which of the following types of IoT technologies is this an example?

PAN

Question 34 A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician's machine. Which of the following should the technician use to help diagnose the problem?

Packet sniffer

Question 22 Which of the following can be done to implement network device hardening? (Choose two.)

Patch and update ******* Change default admin password

Question 36 A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?

Penetration test

Question 81 Which of the following is used to purposely attack a system to exploit vulnerabilities?

Penetration testing

Question 88 A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

RG-6

Question 63 A network support specialist is setting up wireless networks for several small companies that are leasing adjacent spaces in an office building. The network support specialist has already configured an access point for each office with WPA2-AES encryption and minimized any overlap of the wireless channels. Several of the companies have expressed concerns about performance and security issues due to the high volume of wireless networks being installed in close proximity. Which of the following actions will BEST mitigate the companies' concerns?

Reduce the TX power on each access point.

Question 33 A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?

Reverse the wires leading to pins 2 and 4

Question 57 Which of the following MUST be implemented to share metrics between routing protocols within the same router?

Routing table

Question 96 A junior network technician is working in the field and needs to connect to the company's remote server, however, doing so will require the junior technician to use the public Internet. Because security is a concern, which of the following is the BEST method to use?

SSH

Question 58 A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

SSH in tunnel mode

Question 48 Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

SSL VPN

Question 54 A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of the following components should the technician check on the Windows workstations? (Choose two.)

Start the Wired AutoConfig service in the Services console Enable IEEE 802.1x Authentication in Network Interface Card Properties

Question 82 A network technician is capturing packets on the network and notices a UDP packet stream from a phone to the PBX system. The payload of the packet shows the phone downloaded the file cm7910sccp-load-2995.xml. Which of the following protocols was MOST likely used to download this file?

TFTP

Question 92 A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?

authpriv

Question 10 Which of the following BEST describes the BGP routing protocol?

hybrid

Question 42 Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?

nmap

Question 53 A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?

nmap

Question 65 A technician notices clients are receiving a 169.254.x.x IP address following the upgrade of a server. Which of the following ports should the technician check on the local server firewall?

ports 67 and 68

Question 27 A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure the Linux server can reach the backup location?

traceroute


Set pelajaran terkait

Biology chapter 24 - multiple choice

View Set

Perspectives Upper-Intermediate Unit 1

View Set

Micro Chapter 14 - Classifying infectious diseases

View Set

Music Industry Exam 2 (Ch. 8-18 Baskerville)

View Set

Environmental Science Semester 2 Final

View Set

Unit 2/ Chapter 3 - Hardware, Software, & the Internet

View Set