201-255 Flashcards

1
Q

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the
tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to
allow it to interpret the new device and control it using SNMP?
A. TRAP
B. GET
C. MIB
D. WALK

A

C. MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central
location to subscribed devices?
A. Anycast
B. Unicast
C. CoS
D. QoS
E. Multicast
A

E. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is a UC application?
A. Softphone
B. Intranet
C. Proxy
D. Facsimile
A

A. Softphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to
a central point. Which of the following would work BEST to achieve these results?
A. A TACACS+ device and a RADIUS server
B. A TACACS and a proxy server
C. A RADIUS server and an access point
D. A RADIUS server and a network controller

A

C. A RADIUS server and an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application
remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?
A. Content filter
B. Firewall
C. DNS
D. DHCP

A

B. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the
equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue?
A. Grounding bar
B. Rack monitoring
C. UPS
D. Air flow management
E. Surge protector

A

C. UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following
should the technician do to protect the network from ping sweeps?
A. Block echo replies inbound to the DMZ
B. Disable UDP on the servers
C. Block ICMP at the firewall
D. Disable TCP/IP on the server

A

C. Block ICMP at the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path?
A. Omni-direction
B. Unidirectional
C. Patch
D. Yagi
A

B. Unidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages.
Which of the following is the MOST likely cause?
A. Evil twin
B. Session hijacking
C. Distributed DoS
D. ARP cache poisoning

A

C. Distributed DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause?
A. DoS
B. Reflective DNS
C. Man-in-the-middle
D. ARP poisoning
A

C. Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the
memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause?

A. VTP
B. Driver update
C. ESD
D. Halon particles

A

B. Driver update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate.
The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following
is the BEST course of action for the network administrator to take?
A. Wait until the maintenance window, and make the requested change
B. First document the potential impacts and procedures related to the change
C. Send out a notification to the company about the change
D. Make the change, noting the requester, and document all network changes

A

D. Make the change, noting the requester, and document all network changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an
ST 80/125. Which of the following will MOST likely be an issue with the new cable?
A. Wavelength mismatch
B. Distance limitations
C. Connector mismatch
D. Attenuation/Db loss:

A

C. Connector mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?
A. Warrant
B. Legal document
C. Chain of custody
D. Forensic report
E. Documentation of the scene
A

C. Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QoS operates at which of the following OSI model layers? (Select TWO)
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
A

B. Layer 2

C. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is considered a classless routing protocol?
A. IGRP
B. IS-IS
C. RIPv1
D. STP
A

B. IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which
of the following security techniques should be used?
A. Place them behind honeypots
B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone

A

D. Place them in the demilitarized zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of
its interfaces. How many broadcast domains are present in this company’s network
A. 1
B. 2
C. 5
D. 16
E. 28

A

B. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A company plan established to resume normal system operations following a disruption in business would be described as which of the following?
A. First responders
B. User awareness training
C. Disaster recovery
D. Business continuity
A

D. Business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to
redirect any attackers on the network?
A. DMZ
B. Content Filter
C. Botnet
D. Honeypot
A

D. Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a
wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance?
A. Port scanner tool
B. Interface monitoring tool
C. Packet capture tool
D. Spectrum Analyzer tool

A

D. Spectrum Analyzer tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely
fix the issue?
A. Firmware update
B. OS update
C. Vulnerability patch
D. Driver update
A

C. Vulnerability patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable
reason the vendor made this suggestion?
A. It is a rapid version of spanning tree that uses BPDU to detect problems
B. It is a regular version of port mirroring that uses hellow packets to detect loops
C. It is a simple version of spanning tree that uses BPDU to detect problems
D. It is a rapid version of port mirroring that uses BPDU to detect problems

A

A. It is a rapid version of spanning tree that uses BPDU to detect problems

24
Q
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?
A. On the DMZ network
B. On the sandbox network
C. On the honeypot
D. On the quarantine network
A

D. On the quarantine network

25
Q

A company utilizes a patching server to regularly update their PC’s. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become
disconnected from the network and now require a technician to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the
future?
A. Enable automatic rebooting of the pCs after patching is completed
B. Require the patching server to update the oldest PCs off hours
C. Disable automatic driver updates to PCs on the patching server
D. Throttle the connection speed of the patching server to match older PCs

A

D. Throttle the connection speed of the patching server to match older PCs

26
Q
A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel. The technician has cabled this port to be used with which of the
following?
A. 10baseT
B. POTS
C. 568B
D. 568A
A

B. POTS

27
Q
Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?
A. MPLS
B. ESP
C. GRE
D. PPP
A

C. GRE

28
Q

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the
internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the
BEST way to mitigate this risk?
A. Add an outbound ACL to the firewall
B. Change the FTP server to a more secure SFTP
C. Use the implicit deny of the firewall
D. Move the server to the DMZ of the firewall

A

D. Move the server to the DMZ of the firewall

29
Q

A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php
Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the
freesmartphone.it domain?

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

A

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

30
Q
Which of the following types of equipment should be used for telecommunications equipment and have an open design?
A. 2/4 post racks
B. Rail Racks
C. Vertical frame
D. Ladder racks
A

A. 2/4 post racks

31
Q

A facility would like to verify each individual’s identity prior to allowing access to the datacenter. Additionally,the facility would like to ensure that users do not tailgate
behind other users. Which of the following would BEST meet these goals?
A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap
B. Implement a security guard at the facility entrance and a keypad on the datacenter entrance
C. Implement a CCTV camera and a proximity reader on the datacenter entrance
D. Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance

A

A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap

32
Q
A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media
would be optimal for this application?
A. CAT5e cable
B. Coax cable
C. Fiber Optic cable
D. CAT6 cable
A

C. Fiber Optic cable

33
Q

Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the
switches he receives “Destination Unreachable”. Which of the following issues could this be?
A. Denial of service attack
B. Misconfigured DNS settings
C. Misconfigured Split Horizon
D. RADIUS authentication errors

A

C. Misconfigured Split Horizon

34
Q

A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire. Which of the
following is the best choice for the fire suppression system?
A. Portable extinguishers
B. Wet Pipe
C. Clean Gas
D. Dry Pipe

A

C. Clean Gas

35
Q
Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence
A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsiblity
A

B. Chain of custody

36
Q
A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an example of which of the following?
A. Dynamic DNS
B. Virtual Private networking (VPN)
C. Dynamic NAT
D. Port Forwarding
A

D. Port Forwarding

37
Q
A network topology in which all nodes have point to point connections to all other nodes is known as which of the following?
A. Mesh
B. Ring
C. Bus
D. Star
A

A. Mesh

38
Q

A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home. Which of the
following servers should the technician implement?
A. DNSSEC
B. PPP
C. RAS
D. VLAN
E. NAT

A

C. RAS

39
Q
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. Which of the following should the technician use to
verify if this is a concern?
A. Log management
B. Network diagram
C. Network baseline
D. Real time monitor
A

C. Network baseline

40
Q

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should
have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the
BEST way to configure the new wireless network in the new building?
A. Use the same SSIDs on different channels and AP isolation
B. Use different SSIDs on different channels and VLANs
C. Use different SSIDs on the same channels with VLANs
D. Use the same SSIDs on same channels with AP isolation

A

A. Use the same SSIDs on different channels and AP isolation

41
Q

A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened. Which of the following should be
one FIRST to resolve the problem?
A. Ensure that port 20 is open
B. Ensure that port 161 is open
C. Flush the DNS cache on the local workstation
D. Validate the security certificate from the host

A

A. Ensure that port 20 is open

42
Q
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
A. Frequency
B. Modulation
C. RF interference
D. Spectrum
A

B. Modulation

43
Q

A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be
performed to verify the security controls in place?
A. Penetration testing
B. AAA authentication testing
C. Disaster recovery testing
D. Single point of failure testing

A

A. Penetration testing

44
Q
Which of the following is a connectionless protocol? (Select TWO)
A. ICMP
B. SSL
C. TCP
D. SSH
E. HTTP
F. UDP
A

A. ICMP

F. UDP

45
Q

Ann, a network technician is preparing to configure a company’s network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on
the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address. Which of the following is an addressing scheme that will work in this situation?
A. Teredo tunneling
B. Private
C. APIPA
D. Classless

A

B. Private

46
Q

A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route
packages. This is an example of which of the following network segmentation techniques?
A. Compliance implementation
B. Separate public/private newtorking
C. Honeypot implementation
D. Performance optimization

A

D. Performance optimization

47
Q

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious
student implementing?

A. Removing the AP from the classroom
B. ACL
C. Jamming
D. Firewall
E. IPS
A

C. Jamming

48
Q
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall
A

D. Application aware firewall

49
Q
Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?
A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking
A

D. Bluejacking

50
Q
A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?
A. SLIP
B. SNMPv3
C. TKIP
D. SNMPv2
A

B. SNMPv3

51
Q

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACL should the
technician configure?
A. PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
C. PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
D. PERMIT SRCIP: ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
E. PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80

A

B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

52
Q

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the
following is the MOST common connector that will be used on the switch to connect the media converter?
A. FDDI
B. Fiber coupler
C. MT-RJ
D. ST

A

D. ST

53
Q
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the
technician check FIRST?
A. WAP placement
B. Encryption type
C. Bandwidth saturation
D. WAP SSID
A

A. WAP placement

54
Q
Which of the following ports is used to provide secure sessions over the web by default?
A. 22
B. 25
C. 80
D. 5004
A

A. 22

55
Q
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
A. Social engineering
B. Bluesnarfing
C. Man-in-the-middle
D. Evil Twin
A

A. Social engineering