DECK -1 Flashcards
A company built a newbuilding atitsheadquarterslocation. The newbuilding is connected tothe
company’s LAN via fiber-optic cable. Multiple usersinthe new building are unable to accessthe
company’sintranetsiteviatheirwebbrowser,butthey areabletoaccessinternetsites.Whichof
the following describes how the network administrator can resolve thisissue?
A. Correct the DNS server entries in the DHCP scope
B. Correct the external firewall gateway address
C. CorrecttheNTPserversettingsontheclients
D. CorrectaTFTPIssueonthecompany’sserver
. Correct the DNS server entries in the DHCP scope
A technician is installing anew fiber connection to anetworkdevice in a datacenter. The connection
from the device to the switch also traverses apatch panel connection. The chain of connectionsisin
the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection isnotworking. The technician has changed both patch cableswith knownworking
patchcables. Thedevicehadbeentestedandwasworkingproperlybeforebeing installed.Whichof
the following isthe MOST liA. TX/RX is reversed
B. An incorrect cable was used
C. The device failed during installation
D. Attenuation is occurringkely cause of the issue?
TX/RX is reversed
A technician is searching for adevice that is connected to the network and has the device’s physical
network address.Which ofthe following should the technician review on the switch tolocate the
device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag
. MAC table
Which of the following provides redundancy on a file server to ensure the server is still connected to
a LAN even in the event of a port failure on a switch?
Exam Dumps 23/383
A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs
NIC teaming
A new cabling certificationisbeing requeste devery time a network technician rebuilds one end of a
Cat 6 (vendor-certified) cable to create a crossover connection thatis used to connect switches.
Which of the following would address this issue by allowing the use of the original cable?
A. CSMA/CD
B. LACP
Exam Dumps 25/383
C. PoE+
D. MDIX
MDIX
Acompanyhired atechnician tofindallthedevices connectedwithinanetwork.Which ofthe
following softwaretoolswould BESTassistthetechnician in completing thistask?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner
IP scanner
Atechnician is configuring anetwork switch tobe used in a publicly accessible location.Which ofthe
followingshouldthetechnicianconfigureontheswitchtopreventunintendedconnections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
Port security
A network engineer performs the following tasks to increase server bandwidth:
Exam Dumps 29/383
Connectstwonetworkcablesfromtheservertoaswitchstack
Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Whichofthefollowingneedstobe configuredontheserver?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
NIC teaming
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492
C.1500
D. 2304
1500
27 question
According to troubleshooting methodology, which of the following should the technician do NEXT
after determining the most likely probable cause of an issue?
Exam Dumps 32/383
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify fullsystem functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine thecause
. Establish a plan of action to resolve the issue and identify potential effects
Atechnician isinstalling a cablemodemin a SOHO. Which ofthe following cable typeswillthe
technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber
Coaxial
Which of the following is the physical topology for an Ethernet LAN?
Exam Dumps 35/383
A. Bus
B. Ring
C. Mesh
D. Star
Star
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtualserver to another physicalserverfor redundancy
C. A download of navigation data to a portable device for offline access
D. A query from an IoT device to a cloud-hosted server for a firmware update
. A duplication of a hosted virtualserver to another physicalserverfor redundancy
A technician is troubleshooting a network switch that seems to stop responding to requests
intermittentlywheneverthelogginglevelissetfordebugging.Whichofthefollowingmetricsshould
the technician check to begin troubleshooting the issue?
A. Audit logs
B. CPU utilization
C. CRC errors
D. Jitte
CPU utilizationisametricthatmeasuresthepercentageoftimeaCPUspendsexecutinginstructions.
When the logging level issetfordebugging,the routermay generate a large amount oflogging data,
which can increase CPU utilization and cause the router to stop responding to requests
intermittently
A user trie stoping 192.168.1.100 from the command promptonthe192.168.2.101networkbutgets
the following response:U.U.U.U.Which ofthe following needstobe configured forthese networks
to reach each other?
A. Network address translation
B. Default gateway
C. Loopback
D. Routing protocol
Default gateway
Abranch ofa company recently switchedtoanewISP. Thenetworkengineerwas given anew IP
range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now hasthe
following configurations on the interface that peersto the ISP:
Exam Dumps 40/383
ThenetworkengineerobservesthatallusershavelostInternetconnectivity.Whichofthefollowing
describes the issue?
A. The incorrect subnet mask was configured
B. The incorrect gateway was configured
C. The incorrect IP address was configured
D. The incorrect interface was configured
C. The incorrect IP address was configured ANSWER 39 QUESTION
Within the realm of network security, Zero Trust:
A. prevents attackers from moving laterally through a system.
B. allows a server to communicate with outside networks without a firewall.
C. block malicious software that istoo new to be found in virus definitions.
D. stops infected files from being downloaded via websites.
prevents attackers from moving laterally through a system.
WhichofthefollowingservicemodelswouldMOSTlikelybeusedtoreplaceon-premisesservers
with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS
B. IaaS
Which of the following factors should be considered when evaluating a firewall to protect a
datacenter’s east-west traffic?
A. Replication traffic between an on-premisesserver and a remote backup facility
B. Traffic between VMsrunning on different hosts
C. Concurrent connections generated by Internet DDoSattacks
D. VPN traffic from remote officesto the datacenter’s VMs
Traffic between VMsrunning on different hosts
Which of the following is used to prioritize Internet usage per application and peruser on the
network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance
. Bandwidth management
A network administrator needs toquery the NSs for a remote application.Which of the following
commands would BEST help the administrator accomplish thistask?
A. dig
B. arp
C. show interface
D. hostname
. dig
Which of the following would MOST likely be used to review previous upgrades to a system?
A. Business continuity plan
B. Change management
C. System life cycle
D. Standard operating procedures
Change management
A technician is deploying a new switchmodel and would like to add itto the existing network
monitoringsoftware.Thetechnicianwantstoknowwhatmetrics canbegatheredfromagiven
switch. Which ofthe following should the technician utilize forthe switch?
A. MIB
B. Trap
C. Syslog
D. Audit log
MIB