201-255 Flashcards
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the
tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to
allow it to interpret the new device and control it using SNMP?
A. TRAP
B. GET
C. MIB
D. WALK
C. MIB
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices? A. Anycast B. Unicast C. CoS D. QoS E. Multicast
E. Multicast
Which of the following is a UC application? A. Softphone B. Intranet C. Proxy D. Facsimile
A. Softphone
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to
a central point. Which of the following would work BEST to achieve these results?
A. A TACACS+ device and a RADIUS server
B. A TACACS and a proxy server
C. A RADIUS server and an access point
D. A RADIUS server and a network controller
C. A RADIUS server and an access point
A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application
remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?
A. Content filter
B. Firewall
C. DNS
D. DHCP
B. Firewall
A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the
equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue?
A. Grounding bar
B. Rack monitoring
C. UPS
D. Air flow management
E. Surge protector
C. UPS
A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following
should the technician do to protect the network from ping sweeps?
A. Block echo replies inbound to the DMZ
B. Disable UDP on the servers
C. Block ICMP at the firewall
D. Disable TCP/IP on the server
C. Block ICMP at the firewall
Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path? A. Omni-direction B. Unidirectional C. Patch D. Yagi
B. Unidirectional
A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages.
Which of the following is the MOST likely cause?
A. Evil twin
B. Session hijacking
C. Distributed DoS
D. ARP cache poisoning
C. Distributed DoS
A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause? A. DoS B. Reflective DNS C. Man-in-the-middle D. ARP poisoning
C. Man-in-the-middle
A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the
memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause?
A. VTP
B. Driver update
C. ESD
D. Halon particles
B. Driver update
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate.
The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following
is the BEST course of action for the network administrator to take?
A. Wait until the maintenance window, and make the requested change
B. First document the potential impacts and procedures related to the change
C. Send out a notification to the company about the change
D. Make the change, noting the requester, and document all network changes
D. Make the change, noting the requester, and document all network changes
A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an
ST 80/125. Which of the following will MOST likely be an issue with the new cable?
A. Wavelength mismatch
B. Distance limitations
C. Connector mismatch
D. Attenuation/Db loss:
C. Connector mismatch
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been? A. Warrant B. Legal document C. Chain of custody D. Forensic report E. Documentation of the scene
C. Chain of custody
QoS operates at which of the following OSI model layers? (Select TWO) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5
B. Layer 2
C. Layer 3
Which of the following is considered a classless routing protocol? A. IGRP B. IS-IS C. RIPv1 D. STP
B. IS-IS
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which
of the following security techniques should be used?
A. Place them behind honeypots
B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone
D. Place them in the demilitarized zone
A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of
its interfaces. How many broadcast domains are present in this company’s network
A. 1
B. 2
C. 5
D. 16
E. 28
B. 2
A company plan established to resume normal system operations following a disruption in business would be described as which of the following? A. First responders B. User awareness training C. Disaster recovery D. Business continuity
D. Business continuity
A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network? A. DMZ B. Content Filter C. Botnet D. Honeypot
D. Honeypot
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a
wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance?
A. Port scanner tool
B. Interface monitoring tool
C. Packet capture tool
D. Spectrum Analyzer tool
D. Spectrum Analyzer tool
A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue? A. Firmware update B. OS update C. Vulnerability patch D. Driver update
C. Vulnerability patch