CertMaster(Module 1) Flashcards

1
Q

A network engineer just set up a secondary connection at all their remote locations. The secondary connection links each site to another site to prevent downtime in case the primary connection fails.

What networking concept did the engineer utilize for the configuration?

A

Multipathing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator needs to provide remote workers access to internal messaging servers but cannot configure internal service at the perimeter network.

What can the network administrator deploy to listen for client requests from the Internet and create the appropriate request to the internal messaging server?

A

Reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following systems provide an active response to network threats that match signature patterns?

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network consultant is reviewing header fields and is looking for evidence that packets are arriving at their destination.

What is the name of the output ping that provides this information?

A

TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems engineer is documenting a customer’s network. Knowing that all of the hosts connect in a physical star configuration, which data link layer device supports this type of topology?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company uses multiple internet providers to maintain a reliable network. The company’s wide area network (WAN) interfaces with a firewall that handles the traffic bandwidth by using policies.

Considering the company’s approach to Internet access, what is one of the primary roles of the firewall?

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A junior-level systems administrator troubleshoots network connectivity. The results of the troubleshooting reveal a device that is new to the administrator. This device connects all hosts and routes network traffic.

After evaluating the possibilities, and based on the device’s characteristics, what does the network utilize for connectivity and traffic flow?

A

Multilayer switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A managed service provider is looking to set up a home network for a client and needs to set up a device that can connect to the client’s internet provider.

What kind of box should the consumer install for the client?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A server technician is shopping for new storage for data on the business network. The storage requirement has risen over the last year, and the servers currently have limited space.

Which of the following is an option for the technician to purchase to increase the available server storage on the local network?

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator needs to set up a circuit-level stateful inspection of traffic coming in and out of a specific segment of the network.

What type of device should the network administrator use in this case?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What piece of network equipment allows network engineers to allow or deny traffic to specific locations within the network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A department in an organization asks a systems administrator to set up a small network for a test project that consists of five computers. The admin searches the storage closet for a spare device to make the connection.

Considering the functionality of network connectivity devices, which of the following can satisfy the testing environment requirement?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An engineer upgrades an organization’s network. Part of the upgrade focuses on the consolidation of devices. In particular, planning to replace routers and switches is on the agenda.

When evaluating how network appliances operate, which device is a suitable replacement that performs the required functions?

A

Multilayer switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A wireless router commonly mounted on an office ceiling is widely known as which of the following devices?

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company uses multiple redundant paths on the internal network to reduce network latency.

A firewall installed in the company’s demilitarized zone (screened subnet) includes multiple network interfaces that can systematically route traffic to these internal paths depending on bandwidth and other network policies.

Considering the incoming Internet traffic, what other purpose does this firewall serve as?

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following topologies is a network of two or more nodes that shares access to the network, but only one node can be active at any one time?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following methods is used to encapsulate IP packets for transmission over serial digital lines?

A

Point-to-point protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What approach is used to communicate multiprotocol data between two routers?

A

Point-to-point protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In a spine and leaf topology, there are two layers: the spine and the leaf.

What do the top-tier switches in the spine layer comprise, even though neither link to the other?

A

Backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cisco’s design principles for a three-tiered hierarchy break large networks into smaller sections with different functions that are specific to each tier.

Which layer of the three tiers provides fault-tolerant interconnections between different access blocks and is capable of using routing boundaries?

A

Distribution/aggregation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An employee working from home uses a virtual private network (VPN) to access certain websites. To connect to the VPN, the employee needs to request access to a server.

What kind of traffic is the employee’s request from the machine to the server?

A

North-South

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which deployment model might a travel organization use to handle higher utilization forecast during certain times of the year?

A

Hybrid

23
Q

IT engineers evaluate a network for upgrade purposes. IT engineers recommend replacing a hub with a switch.

Which of the following represents the current physical topology and the current logical topology?

A

Star, bus

24
Q

A new office building has ports along the walls in each room where computers, phones, and printers plug in to connect to workgroup switches. A network technician needs to explain to a junior network technician which tier of the network hierarchy the devices are connecting to.

Which tier would the senior network technician be describing?

A

Access/edge

25
Q

You’ve implemented an ad hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.

Which type of physical network topology have you implemented in this network?

A

Mesh

26
Q

A real estate agent is uploading photos of the latest listing onto the corporate website. Once the agent uploads the photos, they pass through multiple servers undergoing quality checks and sorting to ensure that they appear in the most relevant searches.

What term best describes the passing of data from server to server in this scenario?

A

East-West

27
Q

A network technician is setting up a new office space by plugging in computers, printers, and telephones to workgroup switches via structured cabling and ports on the wall.

What tier of the network hierarchy is the network technician plugging these devices?

A

Access/edge

28
Q

An IT engineer troubleshoots a small network. Previously, IT wired all nodes to a central closet. In the closet, the engineer discovers a hub.

Which of the following represents the current physical topology and the current logical topology?

A

Star, bus

29
Q

A network administrator is looking at an ARP table on a switch for connected devices. Which Open Systems Interconnection (OSI) layer are they looking at?

A

Data Link

30
Q

Which of the following protocols reside at the application layer of the Open Systems Interconnection (OSI) model? (Select two.)

HTTP
SMTP
IP
TCP

A

HTTP
SMTP

31
Q

An organization has asked a network administrator to research and submit a purchase order for new network access points. The network administrator is attempting to choose between using wired and wireless access points.

Which layer of the OSI model is the administrator making a decision?

A

Physical layer

32
Q

Which Open Systems Interconnection (OSI) layer assumes responsibility for managing network connections between applications?

A

Session

33
Q

What is the role of an Access Control List (ACL) at Layer 3 (Network layer) of the OSI model?

A

To filter network traffic by permitting or blocking packets based on IP addresses and other criteria.

34
Q

Which of the following functions are performed by the OSI Transport layer? (Select three.)

Data segmentation and reassembly

Selected
Reliable message delivery

Selected
End-to-end flow control

Unselected
Consistent data formatting between dissimilar systems

A

Data segmentation and reassembly

Selected
Reliable message delivery

Selected
End-to-end flow control

35
Q

Which OSI layer assumes responsibility for managing network connections between applications?

A

Session layer

36
Q

When considering a troubleshooting methodology, which of the following topics concern identifying a problem? (Select three.)

Gather information

Identify symptoms

Duplicate the problem, if possible

Question the obvious

A

Gather information

Identify symptoms

Duplicate the problem, if possible

37
Q

A system that contains custom applications routinely crashes. IT decides to upgrade the operating system after speaking with application support personnel.

In which of the following ways should IT troubleshoot the matter?

A

Establish a plan of action to resolve the problem and identify potential effects.

38
Q

A sysadmin is reviewing an alert for the firewall that a piece of malware was downloaded to a computer on the network.
What steps should the sysadmin do to help mitigate this in the future? (Select two.)

Confirm the theory

Establish a plan of action to resolve the problem

Determine if anything has changed

Implement preventative measures

A

Confirm the theory

Establish a plan of action to resolve the problem

39
Q

A technician tries to duplicate a reported problem on a user’s computer.

Which of the following troubleshooting steps is the technician focusing on?

A

Problem identification

40
Q

Which of the following troubleshooting steps includes open and closed approaches to obtaining information?

A

Question users.

41
Q

A new physical server has been deployed and is connected to a client switch.

While logged in to the server via a KVM (key, video, mouse) device, the network admin notices that the network port is not connected. In addition, the switch configurations have disabled all unused ports.

After establishing a theory of probable cause and testing the theory, which course of action should the network admin take next?

A

Step 1. Establish a plan Step 2. Implement a solution Step 3. Verify network connectivity

42
Q

When following standard troubleshooting guidelines, an IT support technician asks a user “Did it ever work?” and “When did it last work?”

These questions help with which of the following troubleshooting approaches when identifying the problem?

A

Determine if anything has changed.

43
Q

When identifying a network problem, which of the following would help pinpoint or isolate the actual issue a user, system, or organization may be experiencing? (Select two.)

Question users.

Duplicate the problem.

Determine the next steps to resolve.

Implement a solution.

A

Question users.

Duplicate the problem.

44
Q

A user is unable to print to a network printer. Which of the following is the first step that a technician should take to troubleshoot the issue?

A

Identify the problem.

45
Q

When changing a system as part of implementing a troubleshooting solution, which of the following practices should be followed? (Select two.)

Make changes without backing up data and configuration.

Test after each change to ensure the problem is resolved.

Record all changes made during the troubleshooting process.

Implement all suggested solutions simultaneously to save time.

A

Test after each change to ensure the problem is resolved.

Record all changes made during the troubleshooting process.

46
Q

To fully solve a problem, what proactive step should be taken?

A

Try to eliminate any factors that may cause the problem to recur.

47
Q

A help desk operator is troubleshooting a site that is no longer responsive.

Which of the following is the last step the operator should perform?

A

Document findings

48
Q

When troubleshooting a hardware malfunction, which of the following strategies would assist in accurately identifying the root cause affecting a device’s performance? (Select two.)

Determine the next steps to resolve.

Implement a solution.

Question users.

Duplicate the problem.

A

Question users.

Duplicate the problem.

49
Q

A technician tries the suggested troubleshooting steps to remedy a computer issue. The steps do not fix the problem. The technician discovers additional suggestions at a support website that provide a different cause and potential fix for the problem.

What troubleshooting path should the technician follow?

A

If the theory is not confirmed, reestablish a new theory or escalate.

50
Q

A technician determines that a faulty network connection caused a system error.

Which logical approach allows for methodical steps to diagnose the cause?

A

OSI (Open Systems Interconnection) reference model guidance

51
Q

A user contacts support to report that their computer is running slowly and they cannot access the company’s internal website.

What is the most effective troubleshooting strategy to identify the issues?

A

Approach multiple problems individually.

52
Q

A newly deployed stack with servers, network switches, a KVM (Key, Video, Mouse), storage unit, and uninterruptible power supplies has just been fully cabled. After powering on the stack, there seems to be a network connectivity issue between the switch and servers.

What is the best approach when trying to resolve this type of network issue?

A

Bottom-to-top

53
Q

A technician is troubleshooting an issue with an employee’s computer after a recent update. The technician asks the employee questions such as, ‘Has this setup worked properly before?’ and ‘When was the last time it worked as expected?’

These questions help with which of the following troubleshooting approaches in pinpointing the issue?

A

Determine if anything has changed.

54
Q

A physical server has been plugged in, powered on, and networked into the communication closet. Using a KVM (key, video, mouse) device, the network technician notices there is no network connectivity. Examining the back of the server, the LED status indicators for the port are off.

After identifying the issue, establishing a theory of probable cause and testing the theory, which course of action should the network technician take next?

A

Step 1. Establish a plan Step 2. Implement a solution Step 3. Verify network connectivity