DECK -1 Flashcards
A company built a newbuilding atitsheadquarterslocation. The newbuilding is connected tothe
company’s LAN via fiber-optic cable. Multiple usersinthe new building are unable to accessthe
company’sintranetsiteviatheirwebbrowser,butthey areabletoaccessinternetsites.Whichof
the following describes how the network administrator can resolve thisissue?
A. Correct the DNS server entries in the DHCP scope
B. Correct the external firewall gateway address
C. CorrecttheNTPserversettingsontheclients
D. CorrectaTFTPIssueonthecompany’sserver
. Correct the DNS server entries in the DHCP scope
A technician is installing anew fiber connection to anetworkdevice in a datacenter. The connection
from the device to the switch also traverses apatch panel connection. The chain of connectionsisin
the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection isnotworking. The technician has changed both patch cableswith knownworking
patchcables. Thedevicehadbeentestedandwasworkingproperlybeforebeing installed.Whichof
the following isthe MOST liA. TX/RX is reversed
B. An incorrect cable was used
C. The device failed during installation
D. Attenuation is occurringkely cause of the issue?
TX/RX is reversed
A technician is searching for adevice that is connected to the network and has the device’s physical
network address.Which ofthe following should the technician review on the switch tolocate the
device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag
. MAC table
Which of the following provides redundancy on a file server to ensure the server is still connected to
a LAN even in the event of a port failure on a switch?
Exam Dumps 23/383
A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs
NIC teaming
A new cabling certificationisbeing requeste devery time a network technician rebuilds one end of a
Cat 6 (vendor-certified) cable to create a crossover connection thatis used to connect switches.
Which of the following would address this issue by allowing the use of the original cable?
A. CSMA/CD
B. LACP
Exam Dumps 25/383
C. PoE+
D. MDIX
MDIX
Acompanyhired atechnician tofindallthedevices connectedwithinanetwork.Which ofthe
following softwaretoolswould BESTassistthetechnician in completing thistask?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner
IP scanner
Atechnician is configuring anetwork switch tobe used in a publicly accessible location.Which ofthe
followingshouldthetechnicianconfigureontheswitchtopreventunintendedconnections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
Port security
A network engineer performs the following tasks to increase server bandwidth:
Exam Dumps 29/383
Connectstwonetworkcablesfromtheservertoaswitchstack
Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Whichofthefollowingneedstobe configuredontheserver?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
NIC teaming
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492
C.1500
D. 2304
1500
27 question
According to troubleshooting methodology, which of the following should the technician do NEXT
after determining the most likely probable cause of an issue?
Exam Dumps 32/383
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify fullsystem functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine thecause
. Establish a plan of action to resolve the issue and identify potential effects
Atechnician isinstalling a cablemodemin a SOHO. Which ofthe following cable typeswillthe
technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber
Coaxial
Which of the following is the physical topology for an Ethernet LAN?
Exam Dumps 35/383
A. Bus
B. Ring
C. Mesh
D. Star
Star
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtualserver to another physicalserverfor redundancy
C. A download of navigation data to a portable device for offline access
D. A query from an IoT device to a cloud-hosted server for a firmware update
. A duplication of a hosted virtualserver to another physicalserverfor redundancy
A technician is troubleshooting a network switch that seems to stop responding to requests
intermittentlywheneverthelogginglevelissetfordebugging.Whichofthefollowingmetricsshould
the technician check to begin troubleshooting the issue?
A. Audit logs
B. CPU utilization
C. CRC errors
D. Jitte
CPU utilizationisametricthatmeasuresthepercentageoftimeaCPUspendsexecutinginstructions.
When the logging level issetfordebugging,the routermay generate a large amount oflogging data,
which can increase CPU utilization and cause the router to stop responding to requests
intermittently
A user trie stoping 192.168.1.100 from the command promptonthe192.168.2.101networkbutgets
the following response:U.U.U.U.Which ofthe following needstobe configured forthese networks
to reach each other?
A. Network address translation
B. Default gateway
C. Loopback
D. Routing protocol
Default gateway
Abranch ofa company recently switchedtoanewISP. Thenetworkengineerwas given anew IP
range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now hasthe
following configurations on the interface that peersto the ISP:
Exam Dumps 40/383
ThenetworkengineerobservesthatallusershavelostInternetconnectivity.Whichofthefollowing
describes the issue?
A. The incorrect subnet mask was configured
B. The incorrect gateway was configured
C. The incorrect IP address was configured
D. The incorrect interface was configured
C. The incorrect IP address was configured ANSWER 39 QUESTION
Within the realm of network security, Zero Trust:
A. prevents attackers from moving laterally through a system.
B. allows a server to communicate with outside networks without a firewall.
C. block malicious software that istoo new to be found in virus definitions.
D. stops infected files from being downloaded via websites.
prevents attackers from moving laterally through a system.
WhichofthefollowingservicemodelswouldMOSTlikelybeusedtoreplaceon-premisesservers
with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS
B. IaaS
Which of the following factors should be considered when evaluating a firewall to protect a
datacenter’s east-west traffic?
A. Replication traffic between an on-premisesserver and a remote backup facility
B. Traffic between VMsrunning on different hosts
C. Concurrent connections generated by Internet DDoSattacks
D. VPN traffic from remote officesto the datacenter’s VMs
Traffic between VMsrunning on different hosts
Which of the following is used to prioritize Internet usage per application and peruser on the
network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance
. Bandwidth management
A network administrator needs toquery the NSs for a remote application.Which of the following
commands would BEST help the administrator accomplish thistask?
A. dig
B. arp
C. show interface
D. hostname
. dig
Which of the following would MOST likely be used to review previous upgrades to a system?
A. Business continuity plan
B. Change management
C. System life cycle
D. Standard operating procedures
Change management
A technician is deploying a new switchmodel and would like to add itto the existing network
monitoringsoftware.Thetechnicianwantstoknowwhatmetrics canbegatheredfromagiven
switch. Which ofthe following should the technician utilize forthe switch?
A. MIB
B. Trap
C. Syslog
D. Audit log
MIB
A network device is configured to send critical events to a syslogserver; however,the following
alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
A. The network device is not configured to log that level to the syslog server
B. Thenetwork device was down and could not send the event
C. The syslogserver is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message
The network device is not configured to log that level to the syslog server
A network administrator s implementing OSPF on all ofa company’s networkdevices.Whichofthe
following will MOST likely replace all the company’s hubs?
A. A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller
A Layer 3 switch
Anattackerisattempting tofindthepasswordtoanetworkbyinputtingcommonwordsandphrases
inplaintexttothepasswordprompt.WhichofthefollowingattacktypesBESTdescribesthis action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
Dictionary attack
Anetworkengineerisinvestigatingreportsofpoornetworkperformance.Uponreviewingadevice
configuration,theengineerfindsthatduplex settingsaremismatched onboth ends.Whichofthe
following would be the MOST likely result of thisfinding?
A. Increased CRC errors
B. Increased giants and runts
C. Increased switching loops
D. Increased device temperature
. Increased CRC errors
Which of the following devices would be used to manage a corporate WLAN?
A. A wireless NAS
B. A wireless bridge
C. A wireless router
D. A wireless controller
A wireless controller
Whichofthefollowingtypesofdevices canprovidecontentfilteringandthreatprotection,and
manage multiple IPSec site-to-site connections?
A. Layer 3 switch
B. VPN headend
C. Next-generation firewall
D. Proxy server
E. Intrusion prevention
. Next-generation firewall
Anengineernoticessome late collisionsonahalf-duplex link. The engineer verifiesthatthedevices
on both endsofthe connection are configured for half duplex.Which ofthe following istheMOST
likely cause of thisissue?
A. The link is improperly terminated
B. One of the devices is misconfigured
C. The cable length is excessive
D. One of the devices has a hardwareissue
The cable length is excessive
A network administrator is configuring a loadbalancer for two systems. Which of the following must
the administrator configure to ensure connectivity during a failover?
A. VIP
B. NAT
C. APIPA
D. IPv6 tunneling
E. Broadcast IP
VIP–AvirtualIP(VIP)addressmustbeconfigured toensureconnectivityduringafailover.AVIPaddressis
a single IP addressthatis assigned to a group ofservers or network devices. When one device fails,
traffic is automatically rerouted tothe remaining devices, and the VIP addressisreassigned tothe
backupdevice, allowing clientsto continue toaccesstheservicewithoutinterruption.
A technician istroubleshooting awireless connectivity issue in a small office located in a high-rise
building. Several APs are mounted in this office. The users report that the network connections
frequentlydisconnectandreconnectthroughouttheday.WhichofthefollowingistheMOSTlikely
cause of thisissue?
A. The AP association time is set too low
B. EIRP needs to be boosted
C. Channel overlap is occurring
D. The RSSI is misreported
Channel overlap is occurring
Anetworkengineerconfigurednewfirewallswiththecorrectconfigurationtobedeployedtoeach
remotebranch.Unneededservicesweredisabled, andallfirewallruleswereappliedsuccessfully.
Which ofthe following should thenetwork engineer performNEXT toensure allthe firewalls are
hardened successfully?
A. Ensure an implicit permit rule is enabled
B. Configure the log settings on the firewallsto the centralsyslog server
C. Update the firewalls with current firmware and software
D. Use the same complex passwords on allfirewalls
Update the firewalls with current firmware and software
At which of the following OSI model layers would a technician find an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
C. Layer 3
Anengineerisconfiguringredundantnetworklinksbetweenswitches.Whichofthefollowingshould
the engineer enable to prevent network stability issues?
A. 802.1Q
Exam Dumps 59/383
B. STP
C. Flow control
D. CSMA/CD
stp
Which of the following can be used to centrally manage credentials for various types of
administrative privileges on configured network devices?
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication
TACACS+
A network technician is installing new software on a Windows-based server in a different
geographical location.WhichofthefollowingwouldbeBESTforthetechniciantousetoperformthis
task?
A. RDP
B. SSH
C. FTP
D. DNS
RDP AS WINDOWS
Branchusersareexperiencingissueswithvideoconferencing.Whichofthefollowingwillthe
companyMOSTlikely configuretoimproveperformanceforthese applications?
A. Link Aggregation Control Protocol
B. Dynamic routing
C. Quality of service
D. Network load balancer
E. Static IP addresses
Quality of service
A technician is assisting a userwho cannot connect toa network resource.Thetechnician first checks
for a link light. According to troubleshooting methodology,this is an example of:
A. using a bottom-to-top approach.
B. establishing a plan of action.
C. documenting a finding.
D. questioning the obvious.
using a bottom-to-top approach
Which of the following transceiver types can support up to 40Gbps?
A. SFP+
B. QSFP+
C. QSFP
D. SFP
QSFP+
Which of the following TCP ports is used by the Windows OS for file sharing?
A. 53
B.389
C.445
D. 1433
445 -smb
A network administrator redesigned the positioning of the AP stocreate adjacent areas of wireless
coverage. After project validation, some users still report poor connectivity when their devices
maintainanassociationtoadistancedAP.Whichofthefollowingshouldthenetworkadministrator
check FIRST?
A. Validate the roaming settings on the APs and WLAN clients
B. VerifythattheAPantenna typeis correctforthenewlayout
C. ChecktoseeifMU-MIMOwasproperlyactivatedontheAPs
D. Deactivate the 2.4GHz band on the APS
Validate the roaming settings on the APs and WLAN clients
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
SFP—-SFP(SmallForm-factorPluggable)isaconnectortypethathasthemostflexibility.Itisahotswappable transceiver that can support different speeds, distances, and media types depending on
themodule inserted. It can be used for both copper and fiber connections and supports various
protocols such as Ethernet, Fibre Channel, and SONET
A network engineer is investigating reports of poor network performance. Upon reviewing a report,
the engineer finds that jitter atthe office is greater than10ms on the only WANc onnection available.
Which of the following would be MOST affected by thisstatistic?
A. A VoIP sales call with a customer
B. An in-office video call with a coworker
C. Routing table from the ISP
D. Firewall CPU processing time
A VoIP sales call with a customer—A VoIP sales callwith a customer would bemost affected by jitter greaterthan 10ms on the WAN
connection.Jitteristhevariationindelayofpackets arriving atthedestination. It cancausechoppy
ordistortedaudioqualityforVoIPapplications,especiallyoverWANlinksthathavelimited
bandwidthandhighlatency.TherecommendedjitterforVoIPislessthan10ms.
A technician is writing documentation regarding a company’s server farm.The technician needs to
confirm the server name for all Linux servers.Which of the following commands should the
technician run?
A. ipconfig
B. nslookup
C. arp
D. route
nslookup
Thenslookup command should beruntoconfirmthe servername for all Linux servers. Nslookup is a toolthat queriesDNS serverstoresolve hostnamesto IP addresses or vice versa. It can alsoprovide other information about DNS records, such as MX, NS, SOA, etc. By running nslookup with the IP address of a Linux server, the technician can obtain its hostname. Reference:
A technician is connecting multiple switches to create a large network for a new office. The switches
are unmanaged Layer 2 switches with multiple connections between each pair. The network is
experiencinganextremeamountoflatency.WhichofthefollowingisMOSTlikelyoccurring?
A. Ethernet collisions
B. A DDoS attack
C. A broadcaststorm
D. Routing loops
broadcast storm
After the A record of a public website was updated ,some visitorswereunable to access the website.
Which of the following should be adjusted to addressthe issue?
A. TTL
B. MX
C. TXT
D. SOA
TTL—TTL (Time ToLive)should be adjustedtoaddresstheissueofsome visitors beingunabletoaccessthe
website afterthe A record was updated. TTL is a value thatspecifies how long a DNS record should
becachedbyDNSserversandclientsbeforeitexpiresandneedstoberefreshed.IftheTTListoo
high,someDNSserversandclientsmaystillusetheoldArecordthatpointstothepreviousIP
address ofthe website,resulting in connection failures
A store owne would like to have secure wireless access available for both business equipment and
patron use.Which ofthefollowing features should be configured to allow different wireless access
through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
SSID
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
FTP
Anetworkadministratorisinstallingawirelessnetworkataclient’soffice.Whichofthefollowing
IEEE 802.11standardswouldbeBESTtouseformultiple simultaneous client access?
A. CDMA
B. CSMA/CD
C. CSMA/CA
D. GSM
CSMA/CA
CSMA/CA(Carrier SenseMultipleAccesswith CollisionAvoidance)is an IEEE 802.11standardthat
would be bestto use formultiple simultaneous client access on awireless network. CSMA/CA is a
media access control method that allows multiple devices to share the same wireless channel
without causing collisionsorinterference. Itworksbyhaving each devicesensethechannelbefore
transmittingdataandwaiting foranacknowledgmentfromthereceiver aftereachtransmission.If
the channel is busyorno acknowledgmentisreceived,thedevicewill backoff and retry laterwith a
random delay
AtechnicianisinstallingmultipleUPSunitsinamajorretailstore. Thetechnicianisrequiredtokeep
trackof all changesto new and old equipment. Which ofthe following will allow the technician to
record these changes?
A. Asset tags
B. A smart locker
C. An access control vestibule
D. A camera
Asset tags
A technician wants to install aWAP in the center of a room that provides service in a radius
surrounding a radio.Which of the following antenna typesshouldtheAPutilize?
A. Omni
B. Directional
C. Yagi
D. Parabolic
Omni
A website administrator is concerned the company’s static website could be defaced by hacktivists or
used as a pivot point to attack interna l systems. Which of the following should a network security
administrator recommend to assist with detecting these activities?
A. Implement file integrity monitoring.
B. Change the default credentials.
C. Use SSL encryption.
Exam Dumps 77/383
D. Update the web-server software.
Implement file integrity monitoring.
A wireless network was installed in awarehouse for employees to scan crates with a wireless
handheld scanner. The wireless network was placed in thecornerofthebuildingneartheceiling for
maximum coverage However users in the offices adjacent lot hewarehouse have noticed a large
amount o f ignal overlapfromthe newnetwork Additionally warehouse employees report difficulty
connecting to the wirelessnetwork from the otherside of hebuilding; however they have no issues
when Ihey are nearthe antenna Which ofthe following is MOST likely the cause?
Exam Dumps 79/383
A. The wireless signal is being refracted by the warehouse’s windows
B. The antenna’s power level was set too high and is overlapping
C. An omnidirectional antenna was used instead of a unidirectional antenna
D. The wireless access points are using channelsfrom the 5GHzspectrum
An omnidirectional antenna was used instead of a unidirectional antenna
An organization with one core and five distribution switche sis transitioning from a start oa full-mesh
topology Whichofthefollowingisthe number of additional network connections needed?
A. 5
B. 7
C. 10
D. 15
10 additional network connections are needed to transition froma starto a full-mesh topology. A
startopology is a network topology where each device is connected to a central device,such as a
switch or ahub.Afull-mesh topology is anetwork topologywhere each device isdirectly connected
toeveryotherdevice. Thenumberof connectionsneeded forafull-meshtopology canbecalculated
bytheformulan(n-1)/2,wherenisthenumberofdevices.Inthiscase,therearesixdevices(one
coreandfivedistributionswitches),sothenumberofconnectionsneededforafull-meshtopologyis
6(6-1)/2 = 15. Since there are already five connections in the star topology (one from each
distribution switch tothe core switch),the number of additional connections needed is 15 - 5 = 10.
A network technician isinvestigating an issuewith adesktop that is not connecting to the network.
The desktop was connecting successfully the previousday,and no changes were made to the
environment. The technician locates the switchport where the device is connected and observes the
LEDstatuslight on the switchportisnotliteven though the desktop isturned onOther devicesthat
arc plugged into the switch are connecting to the network successfully Which of the following is
MOST likely the cause ofthe desktop not connecting?
A. Transceiver mismatch
B. VLAN mismatch
C. Port security
D. Damaged cable
E. Duplex mismatch
Damaged cable
A network technician has multimode fiber optic cable available in a nexistingIDF. Which of the
following Ethernet standards should the technician use to connect the network switch to the existing
fiber?
A. 10GBaseT
B. 1000BaseT
C. 1000BaseSX
D. 1000BaseLX
1000BaseSX
Anetworktechnician isobserving thebehavior ofanunmanaged switchwhen anewdevice is added
tothe network and transmits dat
a. Which of the following BEST describes how the switch processes this information?
A. The data isflooded out of every port. including the one on which it came in.
B. The data isflooded out of every port but only in the VLAN where it islocated.
C. The data isflooded out of every port, except the one on which it came in
D. The data isflooded out of every port, excluding the VLAN where it islocated
he data isflooded out of every port, except the one on which it came in. – THIS IS UNMANAGED OR NEW SWITHC CHracterstics
Which of the following technologies allows traffic to be sent through two different ISP sto increase
performance?
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation
Load balancing
There are two managed legacy switches running that cannot be replaced or upgraded. These
switches do not support cryptographic functions, but they are password protected. Which of the
following should a network administrator configure to BEST prevent unauthorized access?
A. Enable a management access list
B. Disable access to unnecessary services.
C. Configure a stronger password for access
D. Disable access to remote management
E. Use an out-of-band access method.
. Use an out-of-band access method
A network engineer is designing a new secure wireles snetwork. The engineer has been given the
following requirements:
1Must not useplaintextpasswords
2 Must be certificate based
3. Must be vendor neutral
Exam Dumps 85/383
Which of the following methods should the engineer select?
A. TWP-RC4
B. CCMP-AES
C. EAP-TLS
D. WPA2
EAP-TLS. ) is an
authentication protocolthatuses X.509digital certificatesforboth clients andservers. Itprovides
strong security andmutual authentication byusing TLS encryption and public key cryptography. It
doesnotuseplaintextpasswordsorshared secretsthat canbecompromised or guessed. I