meh

Ace your homework & exams now with Quizwiz!

A company wants to deploy a new WLAN topology without running new electrical wiring. The solution has to support the 5Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power for a connected device. Which two components should be used? (choose two) An access point supporting the 802.11ac Wave 2 standard A switch supporting the 801.x standard A switch supporting the 802.3af standard An access point supporting the 802.11ac Wave 1 standard An access point supporting the 802.11n standard A switch supporting the 802.3at standard

An access point supporting the 802.11ac Wave 2 standard A switch supporting the 802.3at standard

Headquarters requests a new IP subnet. The solution must meet the following requirements: IPv4 Class A address type Private IP addresses At least 15 useable IP addresses within the range Which subnet would meet the requirements? 1.10.10.0/27 10.10.10.0/30 172.16.1.0/27 10.10.10.128/27 10.1.1.32/28

10.10.10.128/27

A branch office has been allocated the subnet of 192.168.1.64/26. Which three IP addresses can be used for user devices at this location? (choose three) 192.168.1.128 192.168.1.65 192.168.1.254 192.168.1.98 192.168.1.221 192.168.1.111 192.168.1.127

192.168.1.65 192.168.1.98 192.168.1.111

The project team purchases an 8-port Layer 2 switch, a router, and an 8-port network hub. The router has two WAN interfaces: F0/0 and F0/1. A network engineer connects the switch to port F0/0 and the hub to port F0/1 on the router. How many collision and broadcast domains are available in this network? (choose two) 3 broadcast domains 2 broadcast domains 16 collision domains 3 collision domains 1 broadcast domain 9 collision domains

2 broadcast domains 9 collision domains

A company is preparing to deploy a wireless LAN in a newly constructed office space. The network design specifies the minimum channel bandwidth requirement as 80MHz. Which standard should the access points support? 802.11ac 802.11n 802.11a 802.11b 802.11g

802.11ac

A tech is setting up a SOHO with devices located in different rooms. The configuration needs to support multiple simultaneous data streams to maximum throughput. Which two standards support this configuration? (choose two) 802.11ac 802.11n 802.11a 802.11g

802.11ac 802.11n

A consultant is helping a company design a wireless LAN implementation. Network requirements include internal access points for network host connections and external wireless connections between buildings. The consultant needs to help the company choose appropriate antennas. What does the dBi rating of an antenna represent? A higher dBi antenna has the same gain and a narrower field pattern than a lower dBi atenna A higher dBi antenna has more gan and a narrower field pattern than a lower dBi antenna A higher dBi antenna has the same gain and a wider field pattern than a lower dBi antenna A higher dBi antenna has moer gain and a wider field pattern than a lower dBi antenna

A higher dBi antenna has more gan and a narrower field pattern than a lower dBi antenna

A company has ordered the cable shown in the image. Which of the following WAN technologies would MOST likely be deployed? ADSL Cable broadband Frame relay LTE

ADSL

Match protocols and services DHCP SMTP ICMP TCP DNS FTP Application/Network/Transport/Data link/Physical/Presentation/Session

APP APP NET TRANS APP APP

See image

Access Point Mode 802.11n MAC Filter AES

Match topology types with their descriptions Provides temporary connections for wireless devices. No dedicated wireless access point is required All network nodes are attached to a central device, for example a network switch or hub Enables communication between devices near a person in a space of small coverage Type: Ad-hoc Infrastructure PAN Star

Ad-hoc Star PAN

Which mechanism is used to elect a root bridge in the network? VTP Root guard BPDU 802.1x

BDPU

An alert indicates the loss of connectivity with a router. The log shows the following line: EGP: Sending 19 bytes keepalive to 11.17.2.1 (External AS 1471) Failed, Neighbor down. TCP/179 Which routing protocol should be investigated? BGP OSPF RIP EIGRP

BGP

What is the logical topology of a network wired with multilayer switches? Bus Mesh Ad hoc Star

Bus

What is a warm backup recovery site

The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data

Which media access method is used with 802.11 RTS/CTS network configurations and is NOT able to detect collisions during transmissions? CDMA CSMA/CA CSMA/CD GSM

CSMA/CA

A consultant is setting up a SOHO for a customer. The customer has requested a DOCSIS Internet connection What type of service connection should the consultant configure? PRI BRI DSL Cable

Cable

A company is wiring a new office space to support 1000BaseT Ethernet. The network design calls for UTP cable. The majority of the cable will be routed through a suspended ceiling. Which cable should the company use? Cat 7 plenum Cat 5e plenum Cat 7 PVC Cat 5e PVC

Cat 5e plenum

Identify packet-switched and circuit-switched networks. Match the Network with the Network type Network: PSTN Public Internet Internal IP network ISDN CSD/HSCSD Network type: Packet-switched Circuit-switched

Circuit-switched Packet-switched Packet-switched Circuit-switched Circuit-switched

A company is installing a large rack mounted infrastructure to support a web server farm. High availability is a critical concern for the company. You need to recommend a solution that will ensure continued support without interruption if AC line power is lost. What do you propose? Standby generator Power conditioner UPS Redundant power supply

UPS

A computer hosts three VMs that are used as virtual servers and an internal virtual switch. The Tech services department needs to configure the virtual servers to give them access to a physical server deployed on the company LAN but no directly expose the servers to the physical network. What should they do? Reconfigure the virtual switch as a private switch Configure a virtual firewall on the host Configure virtual network adapter teaming Reconfigure the virtual switch as an external switch

Configure a virtual firewall on the host

A company has a DHCP server with all of the subnet addresses specified as an IP address scope. The company deploys a new physical server as a database server in the 192.168.4.0/24 subnet. Applications that use the database server require the server to always have the same IP address. Company policy forbids the use of static addressing. What should the company do to set addressing for the database server? Specify and IP address exclusion Configure an IP address reservation Use a virtual IP address Use an APIPA address

Configure an IP address reservation

A company is upgrading its network security. It wants to consolidate content filtering and intrusion detection in a single device and add additional security functionality, including data loss prevention. What type of device should the company use? Multilayer switch UTM appliance Proxy Server VoIP gateway

UTM appliance

See image

Content filter AAA server VPN concentrator Load balancer

What should a company use to create a point-to-point bridge between two APs? MIMO GSM SFP Transceivers Unidirectional antennas TDMA

Unidirectional antennas

A company wants to open a new office. A wireless site survey reveals that there are 12 access points in the area immediately around the office and that they use channels 1, 6, and 11. What should the company do to address the interference problem? Configure channel bonding at 2.4 GHz Install an omnidirectional antenna Use the 5 GHz band Implement 802.1x

Use the 5 GHz band

Which network device uses ASICs to handle the packet switching for inter-VLAN communication? L4 router L2 switch L7 firewall L3 switch

L3 switch

See image

Wireless bridge A - 14 dBi right facing Wireless bridge B - 14 dBi left facing AP1 - 5 dBi omnidirectional AP2 - 5 dBi omnidirectional

A sales manager wants to provide a mobile device to all remote employees. The devices have to support low power and short-range peer to peer file transfers and payments using passive sources. Which technology should the manager consider? Bluetooth Ant+ Z-Wave NFC

NFC

Which Internet of Things (IoT) technology is designed to facilitate touchless payments using passive embedded chips and smart devices? Z-Ware RFID NFC Bluetooth

NFC

See image

NGFW L3 Switch WAP

The network technical team needs to configure two network connections working in parallel between a server and a switch to improve available bandwidth. The switch is already configured to support the communication. What should the team configure on the server? Load balancing Clustering Port aggregation NIC teaming

NIC teaming

Which protocol provides time synchronization service over the global internet? NTP ICMP SNMP IPAM

NTP

A company is developing several web applications. The company does not have the hardware resources to support the development and does not want to incur the expense of additional hardware. The company wants to use its own development application and data, but it wants hardware, operating system and storage management to be the responsibility of a third-party provider. What type of service does this describe? SaaS IaaS PaaS SECaas

PaaS

Which services does an ASP provide to subscribers? SIP SDN IPAM SAAS

SAAS

A company is setting up a routed network with three subnets. All routers are BOOTP enables. The company wants to use dynamic IPv4 address assignments for all client computers and manage the process from one central location. What should the company do?

DHCP 67 and 68 ports

A company wants to interconnect several offices. The solution has to be secure, scalable, and should not require any changes to the existing agreements with ISPs. Which solution would meet the company's objectives? L2TP MPLS PPTP DMVPN

DMVPN

What is a secure multipoint IP hub-and-spoke WAN configuration that supports direct communication between spokes? PPPoE MPLS ATM DMVPN

DMVPN

The support team has been tasked with creating an alias name for a newly deployed server. What should the team do? Connect to: DHCP DNS NTP Configure: CNAME record IP reservation MX record

DNS server CNAME record

Match characteristics of NAS and SAN storage technologies. Description: Emulates directly attached storage for servers accessing storage Maintains its own file system, and data access is through remote file system I/O Structured as a dedicated network consisting of multiple storage devices Preferred solution when extreme high-speed data transfer is required

SAN NAS SAN SAN

A company's network is shown in the image. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do? Open UDP port 53 on each of the routers Configure IP exclusions for the 192.168.4.0 and 192.168.4.128 subnets Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets Deploy a DHCP relay agent in the 192.168.2.0 subnet

Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets

A company wants to deploy a web server in a new DMZ. Which device should the company use to configure a new network zone and layer 7 filtering policies? Hub Web Proxy Switch Firewall

Firewall

A company opens a new call center with 35 agents. The network team is tasked with providing them with LAN and WAN access. The solution must meet the following requirements: Provide fast and reliable connections Limit access to some local network resources Filter access to the Internet Which three options should the network team implement? (choose three) Firewall ACL Proxy group SSID on AP IPS policy VLAN on a switch DLP group VPN on a router

Firewall ACL Proxy group VLAN on a switch

A company collects network traffic data from multiple subnets. Detailed analysis indicates that packets are being dropped by one of the routers. Techs suspect this is due to misconfigured firewall ACLs. Where should the techs look for more detailed information? Port Scans Firewall logs Vulnerability scans Event logs

Firewall logs

A network engineer wants to create an uplink between two switches using a fiber optic cable. Which two standards could the engineer use to connect the cable to a switch? (choose two) FCoE iSCSI OC-3 GBIC SFP+

GBIC SFP+

Which metric is used to determine routes when using RIP? Bandwidth Latency Reliability Hop Count

Hop Count

What are tow main differences between a hub and a switch (choose two) Hubs unicast all packets, while switches broadcast all messages. Hubs are limited to four ports, while switches offer an unlimited number of ports. Hubs can be managed using HTTP, while switches offer a command line interface only. Hubs work at Layer 1, while switches work at Layer 2. Hubs do not understand MAC addresses, while switches maintain a CAM address table.

Hubs work at Layer 1, while switches work at Layer 2 Hubs do not understand MAC addresses, while switches maintain a cam address table

A company has its own comms rooms and an on-premises data center containing all its servers and network devices. A network engineer want to add some cloud on-demand solutions to the existing infrastructure. Which cloud model should the company use? Hybrid CASB Public Private

Hybrid

Which mechanism monitors and manages virtual machine instances? VLAN vNIC VIP Hypervisor

Hypervisor

See image

IP Address: 192.168.4.57 Subnet Mask: 255.255.255.192 Default Gateway: 192.168.4.1

PC1 and PC2 are connected to a managed switch. PC1 uses port F0/5, which is in VLAN 7, and PC2 uses port F0/11, which is in VLAN 12. What is the minimum required configuration by a tech on PC1 and PC2 to exchange data? IP address and default gateway IP address, subnet mask, default gateway, and MAC address IP address and subnet mask IP address, subnet mask, and default gateway

IP address, subnet mask, and default gateway

PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem? IP helper address on Router 2 DHCP option 66 on Router 1 IP helper address on Router 1 Port forwarding on Router 1 DHCP option on Router 2 Conditional forwarder on Router 2 Conditional forwarder on Router 1 Port forwarding on Router 2

IP helper address on Router 1

Match the networking device with the BEST use case. An in-line solution to block a network attack immediately An edge device that can classify traffic and apply security policies A dedicated device that can authenticate and authorize VPN users Devices: IPS NGFW RADIUS Server IDS Multilayer switch

IPS NGFW RADIUS Server

A company has configured some services and applications using a PaaS platform. The network team wants to create a secure connection from an onsite router to the new platform. Which of the following would be the BEST protocol to implement? IPsec SSL/TLS L2TP PPTP

IPsec

A company contracts with a cloud provider. The cloud provider is responsible for virtualized hardware, storage, and network support. The company is responsible for installing, licensing, and maintaining the operating system and server applications. Which type of service does this describe? SECaaS PaaS IaaS SaaS

IaaS

A network consultant determines that company can improve its performance by implementing jumbo frames. The network is configured with 10/100/1000 switches, and all hosts are configured with Gigabit Ethernet network adapters. The network is wired with Cat 5e UTP cable. What must the company do to support jumbo frames? Replace the cable with Cat 6 UTP cable Increase the MTU to 9000 Configure each switchport in dynamic auto mode Enable STP on all switches

Increase the MTU to 9000

Which type of backup takes the least time and uses the least amount of disk space? Full Copy Differential Incremental

Incremental

What is the role of an MIB when implementing SNMP for network management? It provides the method for authentication and encryption of messages used for device management It is a server configured to collect device info and issue command requests It is a collection of manageable device definitions that identifies device property information It is the software package installed on each managed client

It is a collection of manageable device definitions that identifies device property information

A company wants to connect a remote office using a satellite internet service. What should be the main concern for this deployment? Compatibility Availability of the service Latency Attenuation

Latency

Which layer of the OSI model are web browsers and email clients implemented at? Layer 4 Layer 7 Layer 6 Layer 5

Layer 7

See image

Location B

A company has offices on several floors of a building. All connections to external public lines come in through a central area and are routed to distribution points on each floor. The distribution points on each floor connect to the internal network. Where is the cabling and equipment for the central area documented in detail? Physical network diagram MDF documentation Logical network diagram IDF documentation

MDF documentation

See image

MPLS VDSL SIP Trunk OC3 PRI

A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device. Continuity plans will depend on how frequent the device is likely to fail. Which value should be used to determine this? MTBF RTO MTTR RPO

MTBF

A company subscribes to connect all of its offices tot he local MAN. The MAN uses a single-mode fiber backbone. The company needs to connect its offices to the backbone. Each office has a wired router with a firewall, a 10/100/1000 switch, and is wired with UTP cable. Each office also has a wireless access point connected to the switch. Which device should the company use to connect to the MAN? Media converter VPN concentrator CSU/DSU Multilayer switch

Media Converter

A company wants to connect devices so that there are many redundant interconnections. Which topology should the company use? Star Mesh Bus Ad-hoc

Mesh

A consultant is setting up a SOHO for a customer. The customers local cable TV provider will be net work ISP. What device should be used to connect to the cable signal? Bridge Switch Modem Media converter

Modem

A company needs to deploy network devices that support configuration of multiple VLANs and the ability to route traffic between the VLANs. Which type of device should the company use? NGFW Proxy Server UTM appliance Multilayer switch

Multilayer switch

The project team has received a list of requirements for a new solution that would allow the company to store files in a local area network. The following requirements must be met: Be cost effective and easy to deploy Provide redundancy to file storage Offer at least 3 TB of space What should the project team implement to meet these requirements? Microsoft Windows file server NAS SAN Cloud-based backup

NAS

A company is configuring an internal network with routed subnets based on the following class B address range: 172.30.8.0/21 The company wants to set up the following subnets: Network A - 600 hosts Network B - 100 hosts Network C - 56 hosts Network D - 40 hosts The company wants to keep the unused addresses in each subnet to a minimum. Which network address ranges should the company use? Net A 172.30.8.0/22 Net B 172.30.12.0/25 Net C 172.30.12.128/26 Net D 172.30.12.192/27 Net A 172.30.8.0/22 Net B 172.30.12.0/25 Net C 172.30.12.128/26 Net D 172.30.12.192/26 Net A 172.30.8.0/22 Net B 172.30.10.0/25 Net C 172.30.10.128/26 Net D 172.30.10.192/26 Net A 172.30.8.0/23 Net B 172.30.10.0/25 Net C 172.30.10.128/26 Net D 172.30.10.192/26

Net A 172.30.8.0/22 Net B 172.30.12.0/25 Net C 172.30.12.128/26 Net D 172.30.12.192/26

Which layer of the OSI model do routers operate at? Network Data link Transport Session

Network

The network support team needs to determine whether data is being encrypted when it is sent over the network. What process should the team use? Port scanning Packet analysis Vulnerability scanning Log review

Packet analysis

In-house techs plan to emulate a penetration attempt. They want to see if they can learn what services are running on network servers. What should they use? Port scanning Packet analysis Vulnerability scanning Traffic analysis

Port scanning

See image

Preparation Identification Containment Investigation Eradication Recovery Lessons learned

A small company subscribes to a popular productivity application suite. All employees access the applications through a web browser interface. Employees store their data locally on their own computers. Which cloud deliver model does this describe? Hybrid Community Public Private

Public

A company expands its corporate campus. All new buildings are configured to support wireless LANs. The company wants to use WPA2-Enterprise to ensure wireless security and provide for centralized control of authentication and authorization. What type of network device is needed to provide centralized authentication and authorization? RADIUS server Wireless LAN controller Proxy Server NGFW

RADIUS server

A network engineer has to order network cables to connect two floors in a new building. The project team has specified the following requirements: Protect the cables from external interference Offer up to 1000 Mbps Be compatible with existing UTP pass-through patch panels Keep the cost to a minimum Which cables should the network engineer order? RJ45 Cat 6 STP cable RJ45 Cat 6 UTP cable LC Multi-mode cable RJ45 Cat 5 UTP cable Cat 3 cable DB-25 cable ST Single-mode cable

RJ 45 Cat 6 STP cable

A company replaces its video surveillance cameras with PoE IP video cameras. The network is wired with Cat 5e UTP cable. What type of connector is used to connect the cameras to the network? RJ-45 DB-9 RJ-11 LC

RJ-45

the nslookup command fails and shows the error in the image. What should the support team create to fix the problem? CNAME record TXT record APIPA address Static route entry Reverse lookup zone

Reverse lookup zone

Which device should a company use to configure a new area within OSPF? Router IPS L2 Switch IDS

Router

What protocols and port numbers match? Protocol providing shared access to files, printers, and serial ports Supports secure communication with websites to protect data privacy and integrity Provides for audio-visual communication sessions and widely used in videoconferencing Provides for secure login and remote execution of commands Used to monitor and manage network devices

SMB 445 HTTPS 443 H.323 1720 SSH 22 SNMP 161

A company has deployed a new access point. A network administrator wants to monitor proactively the number of connected clients and available resources using a secure protocol. What Layer 7 network protocol should be used? SMTP Telnet SSH SNMP

SNMP

Which DNS resource record type is used to identify and locate web servers in a network? MX NS CNAME SRV

SRV

A consultant is helping set up an office in a remote rural area. The office needs a high bandwidth WAN link with the main office, which is located several hundred miles away. Which type of transmission medium should the consultant recommend? Copper Fiber optic Wireless Satellite

Satellite

A company expands its corporate campus and builds new facilities for its warehouse and additional offices. The company needs to run a high-bandwidth link between the buildings. The buildings are approximately 4km (2.5 miles) apart. What kind of cable should the company use? Multimode fiber Single-mode fiber Cat 5e Cat 7

Single-mode fiber

A network team has deployed a new SIP trunk. What will MOST likely be used by end users in this network? Dial-up modems HIPS agent SIEM plug-in Softphone

Softphone

A company has several employees who work from home at least part of the time. A data analysis application is used extensively in the company office, but employees are not authorized to copy the application and use it from their homes. What type of policy does this demonstrate? Onboarding Data loss prevention Software Licensing Remote Access

Software Licensing

An ISP has installed a DWDM device at a new location. What would be the MOST likely reason for that? Create an isolated network Convert copper to fiber Secure the network Solve the fiber exhaust problem

Solve the fiber exhaust problem

A company needs a leased line connection supporting the transmission speed of 30 Mbps. Which service should they choose? T3 ADSL T1 T2 VDSL

T3

Provides rules for establishing connections and sending data between applications and is connection-oriented Used for communication error reporting and troubleshooting with diagnostic utilities Provides standard rules and definitions for host addressing, routing, and data packet structure. Used when acknowledgement and reliable delivery of data are not required and is connectionless

TCP ICMP IP UDP

A company has deployed a new Microsoft Windows server behind a firewall. A systems admin ahs been experiencing problems querying and modifying items in Active Directory from a remote location using an LDAP-based application. Which protocol should be allowed though the firewall? UDP 53 TCP 636 TCP 22 TCP 3389 UDP69

TCP 636

Which mechanism is used by TCP to set up and synchronize a new TCP/IP connection? Code filed Port number Sliding window Three-way handshake

Three-way handshake

For redundancy purposes, a network engineer installs a new router and enables a load balancing protocol. What type of address should he assign as a default gateway to end devices? IPv6 Virtual IP APIPA Loopback

Virtual IP

See image

WAN PAN CAN SAN

Which device uses the LWAPP and CAPWAP protocols for communication? Load balancer VoIP gateway WLC NGFW

WLC

A network admin has captured the following messages on the firewall: 10.10.10.10:64391 > 188.12.1.1:80 188.12.1.1:80 > 10.10.10.10:64391 10.10.10.10:64392 > 83.122.1.1:80 Which application has most likely generated that traffic? Web browser VoIP softphone FTP client DNS agent

Web browser

See image

Wireless controller Load Balancer Proxy server

A company network is wired with 10/100/1000 multilayer switches and Cat 6 UTP cable. The company wants to implement a SAN using the existing infracstructure. Which connection type should the company use? iSCSI Fibre Channel InfiniBand FCoE

iSCSI

The host shown in the exhibit is unable to communicate with other network hosts. This is a recent problem. Each subnet has a subnet mask of 255.255.255.0 The technical team needs to determine whether the TCP/IP protocol stack loaded and whether the computer's NIC is working Which command should they run? ping 192.168.5.2 ping 127.0.0.1 ping 192.168.5.255 ping 233.0.0.1

ping 127.0.0.1

A network technician wants to deploy a new virtual firewall. The firewall has to support three interfaces: G0/0, G0/1, and G0/2. What should the technician configure at the VM level for these interfaces? vNIC VLAN Trunk iSCSI

vNIC


Related study sets

Management Chapter 6 - Strategic Planning

View Set

Chapter 6, Values, Ethics, and Advocacy

View Set

Chapter 12 Planning Nutritious Meals and Snacks (working with young children)

View Set

The Right of Survivorship Among Co-Owners (ch49)

View Set