Chapter 1 Flashcards
QUESTION 1 Which of the following provides the ability to deploy consistent access point configurations from a central location? A. Wireless controller B. AAA server C. WiFi-protected setup D. Proxy server E. VPN concentrator
Answer: A
QUESTION 2 A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following products in the technician MOST likely to consider? (Select 3). A. SIP B. NTP C. H.323 D. SMB E. ICMP F. RTP G. IPSec
Answer: A,C,F
QUESTION 3
A Network administrator has been given a network .16.85.0/21 and wants to know the usable range of IP addresses on
that subnet. Witch of the following indicates the correct IP address range?
A. 172.16.80.0 - 172.16.85.254
B. 172.16.80.0 - 172.16.88.255
C. 172.16.80.1 - 172.16.87.254
D. 172.16.80.1 - 172.16.85.255
Answer: C
QUESTION 4
A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a
network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable
devices is crucial to the plan. Which of the following is the network engineer being asked to implement?
A. LAN
B. PAN
C. MAN
D. WAN
Answer: C
QUESTION 5 Which of the following should current network performance be compared against to determine networks memories? A. Baseline B. Traffic analysis C. Packet capture D. Logs
Answer: A
QUESTION 6
Users in the administration building of a multi-building campus are reporting loss of network connectivity. A network technician suspects conversation workers may have severed the link between the core switch located in the datacenter in
the administration building’s distribution switch. Which of the following tools should be used to identity where the breakoccurred?
A. OTDR
B. Multimeter
C. FCoE
D. Tone generator
Answer: D
QUESTION 7
A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?
A. Tone generator
B. Multimeter
C. OTDR
D. Loopback adapter
Answer: A
QUESTION 8
Which of the following is a reason why a business may be hesitant to move sensitive data to aSaaS cloud service?
A. Decreased performance of internal network
B. Loss of full control over data resources
C. Increased malware exposure
D. Incompatibility with the current network
Answer: B
QUESTION 9
Which of the following VPN protocols establishes a secure session that can be initiated using a browser?
A. IPSec
B. SSL VPN
C. PTP
D. PPTP
Answer: B
QUESTION 10
A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?
A. Loopback adapter
B. Cable tester
C. Tone generator
D. Multimeter
Answer: A
QUESTION 11
Witch of the following policies would Joe, a user have to agree to when he brings in his personal tablet to connect to the
company’s Guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
Answer: C
QUESTION 12
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)
A. Network scan
B. Banner grab
C. TracertD. DHCP server check
D. Brute-force attack
Answer: A, C
QUESTION 13
A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation.
Which of the following protocols is the technician MOST likely to consider? (Choose three.)
A. SIP B. NTP C. H.323 D. SMB E. ICMP F. RTP G. IPSec H. RDP
Answer: A, C, F
QUESTION 14
A network technician is able to connect the switches between two offices, but the offices cannot communication with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?
A. Bridge
B. Access point
C. Router
D. Range Extender
Answer: C
QUESTION 15
A user checks an IP address using an external website. The address is different than the one the user sees when opening a
command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses.
This is BEST explained by the interworking of:
A. network devices
B. packet flow
C. public/private networks
D. traffic-routing protocols
Answer: C
QUESTION 16
A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
A. a
B. ac
C. g
D. n
Answer: B
QUESTION 17
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?
A. Disaster recovery plan
B. Business continuity plan
C. Service level agreement
D. First responder training
Answer: B
QUESTION 18
A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?
A. /24
B. /25
C. /30
D. /32
Answer: C
QUESTION 19
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?
A. Changing the management software’s default credentials
B. Disabling unnecessary services from the server and management software
C. Changing the management software’s default port
D. Replacing the management software’s self-signed certificate with a valid certificate
Answer: A
QUESTION 20
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network?
A. Reverse the fiber strands of the cable and reconnect them to the server
B. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
C. Replace the server’s single-mode fiber cable with multimode fiber
D. Move the fiber cable to different port on the switch where both strands function
Answer: A
QUESTION 21
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?
A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site
Answer: A
QUESTION 22
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices,
but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?
A. Device software
B. Printer drivers
C. Printer firmware
D. NIC drivers
Answer: C
QUESTION 23
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
A. SIP
B. BGP
C. LACP
D. LLDP
Answer: C
QUESTION 24
A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of this device?
A. Content filtering and network analysis
B. Load balancing and providing high availability
C. Port sniffing and protocol analysis
D. Clustering and NIC teaming
Answer: B