DECK -1 Flashcards

1
Q

A company built a newbuilding atitsheadquarterslocation. The newbuilding is connected tothe
company’s LAN via fiber-optic cable. Multiple usersinthe new building are unable to accessthe
company’sintranetsiteviatheirwebbrowser,butthey areabletoaccessinternetsites.Whichof
the following describes how the network administrator can resolve thisissue?

A. Correct the DNS server entries in the DHCP scope
B. Correct the external firewall gateway address
C. CorrecttheNTPserversettingsontheclients
D. CorrectaTFTPIssueonthecompany’sserver

A

. Correct the DNS server entries in the DHCP scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician is installing anew fiber connection to anetworkdevice in a datacenter. The connection
from the device to the switch also traverses apatch panel connection. The chain of connectionsisin
the following order:

Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection isnotworking. The technician has changed both patch cableswith knownworking
patchcables. Thedevicehadbeentestedandwasworkingproperlybeforebeing installed.Whichof
the following isthe MOST liA. TX/RX is reversed
B. An incorrect cable was used
C. The device failed during installation
D. Attenuation is occurringkely cause of the issue?

A

TX/RX is reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is searching for adevice that is connected to the network and has the device’s physical
network address.Which ofthe following should the technician review on the switch tolocate the
device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag

A

. MAC table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following provides redundancy on a file server to ensure the server is still connected to
a LAN even in the event of a port failure on a switch?
Exam Dumps 23/383
A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs

A

NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A new cabling certificationisbeing requeste devery time a network technician rebuilds one end of a
Cat 6 (vendor-certified) cable to create a crossover connection thatis used to connect switches.
Which of the following would address this issue by allowing the use of the original cable?
A. CSMA/CD
B. LACP
Exam Dumps 25/383
C. PoE+
D. MDIX

A

MDIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acompanyhired atechnician tofindallthedevices connectedwithinanetwork.Which ofthe
following softwaretoolswould BESTassistthetechnician in completing thistask?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner

A

IP scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Atechnician is configuring anetwork switch tobe used in a publicly accessible location.Which ofthe
followingshouldthetechnicianconfigureontheswitchtopreventunintendedconnections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP

A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network engineer performs the following tasks to increase server bandwidth:
Exam Dumps 29/383
Connectstwonetworkcablesfromtheservertoaswitchstack
Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Whichofthefollowingneedstobe configuredontheserver?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering

A

NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492
C.1500
D. 2304

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

27 question

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to troubleshooting methodology, which of the following should the technician do NEXT
after determining the most likely probable cause of an issue?
Exam Dumps 32/383
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify fullsystem functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine thecause

A

. Establish a plan of action to resolve the issue and identify potential effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Atechnician isinstalling a cablemodemin a SOHO. Which ofthe following cable typeswillthe
technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the physical topology for an Ethernet LAN?
Exam Dumps 35/383
A. Bus
B. Ring
C. Mesh
D. Star

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtualserver to another physicalserverfor redundancy
C. A download of navigation data to a portable device for offline access
D. A query from an IoT device to a cloud-hosted server for a firmware update

A

. A duplication of a hosted virtualserver to another physicalserverfor redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is troubleshooting a network switch that seems to stop responding to requests
intermittentlywheneverthelogginglevelissetfordebugging.Whichofthefollowingmetricsshould
the technician check to begin troubleshooting the issue?
A. Audit logs
B. CPU utilization
C. CRC errors
D. Jitte

A

CPU utilizationisametricthatmeasuresthepercentageoftimeaCPUspendsexecutinginstructions.
When the logging level issetfordebugging,the routermay generate a large amount oflogging data,
which can increase CPU utilization and cause the router to stop responding to requests
intermittently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user trie stoping 192.168.1.100 from the command promptonthe192.168.2.101networkbutgets
the following response:U.U.U.U.Which ofthe following needstobe configured forthese networks
to reach each other?
A. Network address translation
B. Default gateway
C. Loopback
D. Routing protocol

A

Default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Abranch ofa company recently switchedtoanewISP. Thenetworkengineerwas given anew IP
range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now hasthe
following configurations on the interface that peersto the ISP:
Exam Dumps 40/383
ThenetworkengineerobservesthatallusershavelostInternetconnectivity.Whichofthefollowing
describes the issue?
A. The incorrect subnet mask was configured
B. The incorrect gateway was configured
C. The incorrect IP address was configured
D. The incorrect interface was configured

A

C. The incorrect IP address was configured ANSWER 39 QUESTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Within the realm of network security, Zero Trust:
A. prevents attackers from moving laterally through a system.
B. allows a server to communicate with outside networks without a firewall.
C. block malicious software that istoo new to be found in virus definitions.
D. stops infected files from being downloaded via websites.

A

prevents attackers from moving laterally through a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WhichofthefollowingservicemodelswouldMOSTlikelybeusedtoreplaceon-premisesservers
with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS

A

B. IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following factors should be considered when evaluating a firewall to protect a
datacenter’s east-west traffic?
A. Replication traffic between an on-premisesserver and a remote backup facility
B. Traffic between VMsrunning on different hosts
C. Concurrent connections generated by Internet DDoSattacks
D. VPN traffic from remote officesto the datacenter’s VMs

A

Traffic between VMsrunning on different hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is used to prioritize Internet usage per application and peruser on the
network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance

A

. Bandwidth management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network administrator needs toquery the NSs for a remote application.Which of the following
commands would BEST help the administrator accomplish thistask?
A. dig
B. arp
C. show interface
D. hostname

A

. dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following would MOST likely be used to review previous upgrades to a system?
A. Business continuity plan
B. Change management
C. System life cycle
D. Standard operating procedures

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A technician is deploying a new switchmodel and would like to add itto the existing network
monitoringsoftware.Thetechnicianwantstoknowwhatmetrics canbegatheredfromagiven
switch. Which ofthe following should the technician utilize forthe switch?
A. MIB
B. Trap
C. Syslog
D. Audit log

A

MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network device is configured to send critical events to a syslogserver; however,the following
alerts are not being received:

Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
A. The network device is not configured to log that level to the syslog server
B. Thenetwork device was down and could not send the event
C. The syslogserver is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message

A

The network device is not configured to log that level to the syslog server

26
Q

A network administrator s implementing OSPF on all ofa company’s networkdevices.Whichofthe
following will MOST likely replace all the company’s hubs?
A. A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller

A

A Layer 3 switch

27
Q

Anattackerisattempting tofindthepasswordtoanetworkbyinputtingcommonwordsandphrases
inplaintexttothepasswordprompt.WhichofthefollowingattacktypesBESTdescribesthis action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack

A

Dictionary attack

28
Q

Anetworkengineerisinvestigatingreportsofpoornetworkperformance.Uponreviewingadevice
configuration,theengineerfindsthatduplex settingsaremismatched onboth ends.Whichofthe
following would be the MOST likely result of thisfinding?
A. Increased CRC errors
B. Increased giants and runts
C. Increased switching loops
D. Increased device temperature

A

. Increased CRC errors

29
Q

Which of the following devices would be used to manage a corporate WLAN?
A. A wireless NAS
B. A wireless bridge
C. A wireless router
D. A wireless controller

A

A wireless controller

30
Q

Whichofthefollowingtypesofdevices canprovidecontentfilteringandthreatprotection,and
manage multiple IPSec site-to-site connections?
A. Layer 3 switch
B. VPN headend
C. Next-generation firewall
D. Proxy server
E. Intrusion prevention

A

. Next-generation firewall

31
Q

Anengineernoticessome late collisionsonahalf-duplex link. The engineer verifiesthatthedevices
on both endsofthe connection are configured for half duplex.Which ofthe following istheMOST
likely cause of thisissue?
A. The link is improperly terminated
B. One of the devices is misconfigured
C. The cable length is excessive
D. One of the devices has a hardwareissue

A

The cable length is excessive

32
Q

A network administrator is configuring a loadbalancer for two systems. Which of the following must
the administrator configure to ensure connectivity during a failover?
A. VIP
B. NAT
C. APIPA
D. IPv6 tunneling
E. Broadcast IP

A

VIP–AvirtualIP(VIP)addressmustbeconfigured toensureconnectivityduringafailover.AVIPaddressis
a single IP addressthatis assigned to a group ofservers or network devices. When one device fails,
traffic is automatically rerouted tothe remaining devices, and the VIP addressisreassigned tothe
backupdevice, allowing clientsto continue toaccesstheservicewithoutinterruption.

33
Q

A technician istroubleshooting awireless connectivity issue in a small office located in a high-rise
building. Several APs are mounted in this office. The users report that the network connections
frequentlydisconnectandreconnectthroughouttheday.WhichofthefollowingistheMOSTlikely
cause of thisissue?
A. The AP association time is set too low
B. EIRP needs to be boosted
C. Channel overlap is occurring

D. The RSSI is misreported

A

Channel overlap is occurring

34
Q

Anetworkengineerconfigurednewfirewallswiththecorrectconfigurationtobedeployedtoeach
remotebranch.Unneededservicesweredisabled, andallfirewallruleswereappliedsuccessfully.
Which ofthe following should thenetwork engineer performNEXT toensure allthe firewalls are
hardened successfully?
A. Ensure an implicit permit rule is enabled
B. Configure the log settings on the firewallsto the centralsyslog server
C. Update the firewalls with current firmware and software
D. Use the same complex passwords on allfirewalls

A

Update the firewalls with current firmware and software

35
Q

At which of the following OSI model layers would a technician find an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

A

C. Layer 3

36
Q

Anengineerisconfiguringredundantnetworklinksbetweenswitches.Whichofthefollowingshould
the engineer enable to prevent network stability issues?
A. 802.1Q
Exam Dumps 59/383
B. STP
C. Flow control
D. CSMA/CD

A

stp

37
Q

Which of the following can be used to centrally manage credentials for various types of
administrative privileges on configured network devices?
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication

A

TACACS+

38
Q

A network technician is installing new software on a Windows-based server in a different
geographical location.WhichofthefollowingwouldbeBESTforthetechniciantousetoperformthis
task?
A. RDP
B. SSH
C. FTP
D. DNS

A

RDP AS WINDOWS

39
Q

Branchusersareexperiencingissueswithvideoconferencing.Whichofthefollowingwillthe
companyMOSTlikely configuretoimproveperformanceforthese applications?
A. Link Aggregation Control Protocol
B. Dynamic routing
C. Quality of service
D. Network load balancer
E. Static IP addresses

A

Quality of service

40
Q

A technician is assisting a userwho cannot connect toa network resource.Thetechnician first checks
for a link light. According to troubleshooting methodology,this is an example of:
A. using a bottom-to-top approach.
B. establishing a plan of action.
C. documenting a finding.
D. questioning the obvious.

A

using a bottom-to-top approach

41
Q

Which of the following transceiver types can support up to 40Gbps?
A. SFP+
B. QSFP+

C. QSFP
D. SFP

A

QSFP+

42
Q

Which of the following TCP ports is used by the Windows OS for file sharing?
A. 53
B.389
C.445
D. 1433

A

445 -smb

43
Q

A network administrator redesigned the positioning of the AP stocreate adjacent areas of wireless
coverage. After project validation, some users still report poor connectivity when their devices
maintainanassociationtoadistancedAP.Whichofthefollowingshouldthenetworkadministrator
check FIRST?
A. Validate the roaming settings on the APs and WLAN clients
B. VerifythattheAPantenna typeis correctforthenewlayout
C. ChecktoseeifMU-MIMOwasproperlyactivatedontheAPs
D. Deactivate the 2.4GHz band on the APS

A

Validate the roaming settings on the APs and WLAN clients

44
Q

Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45

A

SFP—-SFP(SmallForm-factorPluggable)isaconnectortypethathasthemostflexibility.Itisahotswappable transceiver that can support different speeds, distances, and media types depending on
themodule inserted. It can be used for both copper and fiber connections and supports various
protocols such as Ethernet, Fibre Channel, and SONET

45
Q

A network engineer is investigating reports of poor network performance. Upon reviewing a report,

the engineer finds that jitter atthe office is greater than10ms on the only WANc onnection available.
Which of the following would be MOST affected by thisstatistic?
A. A VoIP sales call with a customer
B. An in-office video call with a coworker
C. Routing table from the ISP
D. Firewall CPU processing time

A

A VoIP sales call with a customer—A VoIP sales callwith a customer would bemost affected by jitter greaterthan 10ms on the WAN
connection.Jitteristhevariationindelayofpackets arriving atthedestination. It cancausechoppy
ordistortedaudioqualityforVoIPapplications,especiallyoverWANlinksthathavelimited
bandwidthandhighlatency.TherecommendedjitterforVoIPislessthan10ms.

46
Q

A technician is writing documentation regarding a company’s server farm.The technician needs to
confirm the server name for all Linux servers.Which of the following commands should the
technician run?
A. ipconfig
B. nslookup
C. arp
D. route

A

nslookup

Thenslookup command should beruntoconfirmthe servername for all Linux servers. Nslookup is a toolthat queriesDNS serverstoresolve hostnamesto IP addresses or vice versa. It can alsoprovide other information about DNS records, such as MX, NS, SOA, etc. By running nslookup with the IP address of a Linux server, the technician can obtain its hostname. Reference:

47
Q

A technician is connecting multiple switches to create a large network for a new office. The switches
are unmanaged Layer 2 switches with multiple connections between each pair. The network is
experiencinganextremeamountoflatency.WhichofthefollowingisMOSTlikelyoccurring?
A. Ethernet collisions
B. A DDoS attack
C. A broadcaststorm
D. Routing loops

A

broadcast storm

48
Q

After the A record of a public website was updated ,some visitorswereunable to access the website.
Which of the following should be adjusted to addressthe issue?
A. TTL
B. MX
C. TXT
D. SOA

A

TTL—TTL (Time ToLive)should be adjustedtoaddresstheissueofsome visitors beingunabletoaccessthe
website afterthe A record was updated. TTL is a value thatspecifies how long a DNS record should
becachedbyDNSserversandclientsbeforeitexpiresandneedstoberefreshed.IftheTTListoo
high,someDNSserversandclientsmaystillusetheoldArecordthatpointstothepreviousIP
address ofthe website,resulting in connection failures

48
Q

A store owne would like to have secure wireless access available for both business equipment and
patron use.Which ofthefollowing features should be configured to allow different wireless access
through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID

A

SSID

49
Q

Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP

A

FTP

50
Q

Anetworkadministratorisinstallingawirelessnetworkataclient’soffice.Whichofthefollowing
IEEE 802.11standardswouldbeBESTtouseformultiple simultaneous client access?
A. CDMA
B. CSMA/CD
C. CSMA/CA
D. GSM

A

CSMA/CA

CSMA/CA(Carrier SenseMultipleAccesswith CollisionAvoidance)is an IEEE 802.11standardthat
would be bestto use formultiple simultaneous client access on awireless network. CSMA/CA is a
media access control method that allows multiple devices to share the same wireless channel
without causing collisionsorinterference. Itworksbyhaving each devicesensethechannelbefore
transmittingdataandwaiting foranacknowledgmentfromthereceiver aftereachtransmission.If
the channel is busyorno acknowledgmentisreceived,thedevicewill backoff and retry laterwith a
random delay

51
Q

AtechnicianisinstallingmultipleUPSunitsinamajorretailstore. Thetechnicianisrequiredtokeep
trackof all changesto new and old equipment. Which ofthe following will allow the technician to
record these changes?
A. Asset tags
B. A smart locker
C. An access control vestibule
D. A camera

A

Asset tags

52
Q

A technician wants to install aWAP in the center of a room that provides service in a radius
surrounding a radio.Which of the following antenna typesshouldtheAPutilize?
A. Omni
B. Directional
C. Yagi
D. Parabolic

A

Omni

53
Q

A website administrator is concerned the company’s static website could be defaced by hacktivists or
used as a pivot point to attack interna l systems. Which of the following should a network security
administrator recommend to assist with detecting these activities?
A. Implement file integrity monitoring.
B. Change the default credentials.
C. Use SSL encryption.
Exam Dumps 77/383
D. Update the web-server software.

A

Implement file integrity monitoring.

54
Q

A wireless network was installed in awarehouse for employees to scan crates with a wireless
handheld scanner. The wireless network was placed in thecornerofthebuildingneartheceiling for
maximum coverage However users in the offices adjacent lot hewarehouse have noticed a large
amount o f ignal overlapfromthe newnetwork Additionally warehouse employees report difficulty
connecting to the wirelessnetwork from the otherside of hebuilding; however they have no issues
when Ihey are nearthe antenna Which ofthe following is MOST likely the cause?
Exam Dumps 79/383
A. The wireless signal is being refracted by the warehouse’s windows
B. The antenna’s power level was set too high and is overlapping
C. An omnidirectional antenna was used instead of a unidirectional antenna
D. The wireless access points are using channelsfrom the 5GHzspectrum

A

An omnidirectional antenna was used instead of a unidirectional antenna

55
Q

An organization with one core and five distribution switche sis transitioning from a start oa full-mesh
topology Whichofthefollowingisthe number of additional network connections needed?
A. 5
B. 7
C. 10
D. 15

A

10 additional network connections are needed to transition froma starto a full-mesh topology. A
startopology is a network topology where each device is connected to a central device,such as a
switch or ahub.Afull-mesh topology is anetwork topologywhere each device isdirectly connected
toeveryotherdevice. Thenumberof connectionsneeded forafull-meshtopology canbecalculated
bytheformulan(n-1)/2,wherenisthenumberofdevices.Inthiscase,therearesixdevices(one
coreandfivedistributionswitches),sothenumberofconnectionsneededforafull-meshtopologyis
6(6-1)/2 = 15. Since there are already five connections in the star topology (one from each
distribution switch tothe core switch),the number of additional connections needed is 15 - 5 = 10.

56
Q

A network technician isinvestigating an issuewith adesktop that is not connecting to the network.
The desktop was connecting successfully the previousday,and no changes were made to the
environment. The technician locates the switchport where the device is connected and observes the
LEDstatuslight on the switchportisnotliteven though the desktop isturned onOther devicesthat
arc plugged into the switch are connecting to the network successfully Which of the following is
MOST likely the cause ofthe desktop not connecting?
A. Transceiver mismatch
B. VLAN mismatch
C. Port security
D. Damaged cable
E. Duplex mismatch

A

Damaged cable

57
Q

A network technician has multimode fiber optic cable available in a nexistingIDF. Which of the
following Ethernet standards should the technician use to connect the network switch to the existing
fiber?
A. 10GBaseT
B. 1000BaseT
C. 1000BaseSX
D. 1000BaseLX

A

1000BaseSX

58
Q

Anetworktechnician isobserving thebehavior ofanunmanaged switchwhen anewdevice is added
tothe network and transmits dat
a. Which of the following BEST describes how the switch processes this information?
A. The data isflooded out of every port. including the one on which it came in.
B. The data isflooded out of every port but only in the VLAN where it islocated.
C. The data isflooded out of every port, except the one on which it came in
D. The data isflooded out of every port, excluding the VLAN where it islocated

A

he data isflooded out of every port, except the one on which it came in. – THIS IS UNMANAGED OR NEW SWITHC CHracterstics

59
Q

Which of the following technologies allows traffic to be sent through two different ISP sto increase
performance?
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation

A

Load balancing

60
Q

There are two managed legacy switches running that cannot be replaced or upgraded. These
switches do not support cryptographic functions, but they are password protected. Which of the
following should a network administrator configure to BEST prevent unauthorized access?
A. Enable a management access list
B. Disable access to unnecessary services.
C. Configure a stronger password for access
D. Disable access to remote management
E. Use an out-of-band access method.

A

. Use an out-of-band access method

61
Q

A network engineer is designing a new secure wireles snetwork. The engineer has been given the
following requirements:
1Must not useplaintextpasswords
2 Must be certificate based
3. Must be vendor neutral
Exam Dumps 85/383
Which of the following methods should the engineer select?
A. TWP-RC4
B. CCMP-AES
C. EAP-TLS
D. WPA2

A

EAP-TLS. ) is an
authentication protocolthatuses X.509digital certificatesforboth clients andservers. Itprovides
strong security andmutual authentication byusing TLS encryption and public key cryptography. It
doesnotuseplaintextpasswordsorshared secretsthat canbecompromised or guessed. I