Deck-3 Flashcards

1
Q

An administrator wouldlike to allow Windows clients from outside meofficeto access workstations
without using third-partysoftware. Which or the following access methods would meetthis
requirement?
A. Remote desktop gateway
B. Spit tunnel
C. Site-to-site VPN
D. VNC

A

Remote desktop gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a benefit of the spine-and-leaf network topology?
A. Increased network security
B. Stable network latency
C. Simplified network management
D. Eliminated need for inter-VLAN routing

A

Stable network latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To access production applicationsand data, developers must first connect remotely to a different
serverFrom there, the developers are able to access production data Whichof the following does
this BEST represent?
A. A management plane
B. A proxy server
C. An out-of-band management device
D. A site-to-site VPN
E. A jump box

A

A jump box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A help desktechnicianis concernedt hataclient’s networkcable issuesmay becausing intermittent
connectivity.Whichofthefollowingwouldhelpthetechniciandetermineifthisistheissue?
A. Run the show interface command on the switch
B. Run the tracerouute command on the server
C. Run iperf on the technician’s desktop
D. Ping the client’s computer from the router
E. Run a port scanner on the client’s IPaddress

A

Run the show interface command on the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator is reviewing the following metrics from a network management system
regardingaswitchport.Theadministratorsuspectsanissuebecauseusersarecallinginregardsto
the switchport’s performance:
Based on the information in the chart above, which of the following fs the cause of these
performance issues?
A. The connected device is exceeding the configuredMTU.
B. The connected device is sending too many packets
C. The switchport has been up for toolong
D. The connected device is receiving too manypackets.
E. The switchport does not have enough CRCs

A

The connected device is exceeding the configuredMTU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company’s web server is hosted at a local ISP. This is an example of:

A. colocation.
B. an on-premises data center.
C. a branch office.
D. a cloud provider.

A

colocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician receives a report from the server team that a server’s network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data:

Which of the following should the network technician perform to correct the issue?

A. Replace the Cat 5 patch cable with a Cat 6 cable.
B. Install a crossover cable between the server and the switch.
C. Reset the switchport configuration.
D. Use NetFlow data from the switch to isolate the issue.
E. Disable MDIX on the switchport and reboot the server.

A

Replace the Cat 5 patch cable with a Cat 6 cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acompany streams video tomultiple devices across a campus.When this happens,several users
report adegradationofnetworkperformance.WhichofthefollowingwouldMOSTlikelyaddress
thisissue?
A. Enable IGMP snooping on the switches.
B. Implement another DHCP server.
C. Reconfigure port tagging for the videotraffic.
D. Change the SSID of the APs

A

Enable IGMP snooping on the switches

IGMP snooping helps manage multicast traffic, which is typically used for streaming video. By enabling IGMP snooping on the switches, they can listen to IGMP messages and maintain a list of which devices are part of which multicast groups. This way, the switches can forward multicast traffic only to the ports where the interested receivers are located, reducing unnecessary traffic on other ports and improving overall network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator is reviewing thenetworkdevice logsona syslog server. The messages are
normal but the stampson the messages are incorrect.Which of the following actions should the
administrator take to ensure the log message time stamps are correct?
A. Change the NTP settings on the network device
B. Changethe timeonthesyslogserver
C. Update the network device firmware
D. Adjust the timeout settings on the syslog server
E. Adjust the SSH settings on the networkdevice

A

Change the NTP settings on the network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which ofthe followingDHCP settingswould beusedtoensure adevice getsthe same IP address
each time it is connected to the network?
A. Scope options
B. Reservation
C. Exclusion
D. Relay
E. Pool

A

Scope options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the primary function of the core layer of the three-tiered model?
A. Routing
B. Repeating
C. Bridging
D. Switchin

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is utilizing multifactor authentication fordatacenteraccess .Which ofthe following is the
MOSTeffectivesecuritymechanismagainstphysicalintrusionsduetostolencredentials?
A. Biometrics security hardware
B. Access card readers
C. Access control vestibule
D. Motion detection cameras

A

. Biometrics security hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logs show an unauthorized IP address entering a secure partofthe network everynight at8:00pm.
The network administratoris concerned thatthisIP address will cause an issue toa criticalserver
and would like to deny the IP address atthe edge ofthe network. Which ofthe following solutions
would address these concerns?
A. Changing the VLAN of the web server
B. Changing the server’s IP address
C. Implementing an ACL
D. Instating a rule on the firewall connected to the web server

A

Implementing an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Due to concerns around singlepoints of failure, a company decided toadd anadditionalWANtothe
network. The company added a second MPLS vendortothe current MPLSWANand deployed an
additional WAN router a teach site. BothMPLS providers use OSPF onthe WANnetwork, andEIGRP
is run internally. The firstsite to go livewith the new WAN issuccessful, but when the second site is
activated significant network issues occur.Which ofbthe following istheMOST likely cause forthe
WAN instability?

A. A routing loop
B. Asymmetrical routing
C. A switching loop
D. An incorrect IP address

A

Asymmetrical routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network technician receives a reportfromthe serverteamthat a server’snetwork connection is
not working correctly. The server team confirms the server is operating correctly except forthe
network connection. The technician checks the switchport connected to the server and reviews the
following data;
Which of the following should the network technician perform to correct the issue?
A. Replace the Cat 5 patch cable with a Cat 6 cable
B. Install a crossover cable between the server and the switch
Exam Dumps 163/383
C. Reset the switchport configuration.
D. Use NetFlow data from the switch to isolate the issue.
E. Disable MDIX on the switchport and reboot the server.

A

Replace the Cat 5 patch cable with a Cat 6 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following will reduce routing table lookups by performing packetf orwarding decisions
independently of the network layer header?
A. MPLS
B. mGRE
C. EIGRP
D. VRRP

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An employee reports to a networkadministrator that internet accessis not working. Which of the
following should the administrator do FIRST?
A. Establish a theory of probable cause.
B. Identify symptoms.
C. Determine if anything has changed.
D. Ask the user to restart the computer

A

Determine if anything has changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network clientistrying toconnecttothewrong TCPport.Which ofthefollowing responseswould
the client MOST likelyreceive?
A. RST
B. FIN
Exam Dumps 166/383
C. ICMP Time Exceeded
D. Redirec

A

RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A securityadministratoris tryingto preventincorrect Paddressesfrom beingassignedtoclientson
thenetwork.WhichofthefollowingwouldMOSTlikelypreventthisandallowthenetworkto
continue to operate?
A. Configuring DHCP snooping on the switch
B. Preventing broadcast messages leaving the client network
C. Blocking ports 67/68 on the client network
D. Enabling port security on access ports

A

Configuring DHCP snooping on the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?

A. The switch was configured with port security.
B. Newly added machines are running into DHCP conflicts.
C. The IPS was not configured to recognize the new users.
D. Recently added users were assigned to the wrong VLAN

A

Recently added users were assigned to the wrong VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician is consolidating a topologywith multiple SSlDs intooneuniqueSSIDdeployment.Which
ofthe following features will be possible afterthis new configuration?
A. Seamless roaming
B. Basic service set
C. WPA
D. MU-MIMO

A

Seamless roaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which oft hefollowing is the MOST cost-effective alternative that provides proper cabling and
supports gigabit Ethernet devices?
A. Twisted cable with a minimum Cat 5e certification
B. Multimode fiber with an SC connector
C. Twinaxial cabling using an F-type connector
D. Cable termination using TIA/EIA-568-B

A

Twisted cable with a minimum Cat 5e certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A nemployeeworking inawarehousefacility isexperiencing interruptions inmobilea pplications
whilewalking aroundthefacilit y.According toa recentsitesurvey,theWLAN comprises
autonomous APs that are directly connected to the internet, providing adequate signal coverage.
Which ofthe following isthe BEST solution to improve network stability?
A. Implement clientroaming using an extended service deployment employing awireless controller.
B. Remove omnidirectional antennas and adopt a directionalbridge.
C. Ensure all APs of the warehouse support MIMO and Wi-Fi 4.
D. Verify thatthe level of EIRP powersettingsissetto the maximumpermitted by regulations.

A

mplement clientroaming using an extended service deployment employing awireless contr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An engineeris gatheringdata todetermine theeffectiveness ofUPS sinusea tremoteretail
locations.Whichof thefollowing statistics cantheengineerusetodeterminetheavailabilityofthe
remote network equipment?
A. Uptime
B. NetFlow baseline
C. SNMP traps
D. Interface statistics

A

Uptime

24
Q

A network technician is planning a network scope. The web server needs tobe within 12.31 69.1to
12.31.69.29. Which of the following would meet this requirement?
A. Lease time
B. Range reservation
C. DNS
D. Superscop

A

Range reservation

25
Q

Which ofthe following would beused whenconnecting devicesthathave differentphysical
characteristics?
A. A proxy server
B. An industrial control system
C. A load balancer
D. A media converte

A

A media converte

26
Q

An etworktechnician receives ar eport about a performance issueona clientPCthatis connected to
port1/3onanetworkswitch. Thetechnician observes the following configuration outputfrom the
switch:
Which of the following is a cause of the issue on port 1/3?
A. Speed
B. Duplex
C. Errors
Exam Dumps 176/383
D. VLAN

A

Speed

27
Q

The power company notifies anetwork administratorthatitwill be turning offthe powertothe
buildingovertheweekend.Whichofthefollowing istheBESTsolutiontopreventthe serversfrom
going down?
A. Redundant power supplies
B. Uninterruptible power supply
C. Generator
D. Power distribution unit

A

Redundant power supplies

27
Q

Which of the following issues are present with RIPv2? (Select TWO).
A. Route poisoning
B. Time to converge
C. Scalability
D. Unicast
E. Adjacent neighbors

A

Time to converge
Scalability

28
Q

A technician is monitoring a network interface and notices the device is dropping packets. The cable
and interfaces, however, are in working order. Which ofthe following is MOST likely the cause?
A. OID duplication
B. MIB mismatch
C. CPU usage
D. Encapsulation errors

A

CPU usage

29
Q

A companyjoinsabank’s financial networkand establishesa connectionto theclearinghouseservers
in the range 192 168.124.0/27.An ITtechnician then realizesthe range exists within theVMpool at
the data center. Which ofthe following isthe BESTway forthe technician to connectto the bank’s
servers?
A. NAT
B. PAT
C. CIDR
D. SLAAC

A

NAT

29
Q

A security engineer istrying to determine whether an internalserver was accessed by hosts on the
internet. The internalserverwasshut down during the investigation Which ofthe followingwillthe
engineerreview todetermine whetherthe internalserverhad an unauthorized access attempt?
A. The server’s syslog
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switc

A

The server’s syslog

30
Q

Acompany streams video tomultiple devices across a campus.When this happens,several users
report adegradationofnetworkperformance.WhichofthefollowingwouldMOSTlikelyaddress
thisissue?

A. Enable IGMP snooping on the switches.
B. Implement another DHCP server.
C. Reconfigure port tagging for the videotraffic.
D. Change the SSID of the APs

A

Enable IGMP snooping on the switches.

31
Q

A networktechnician hasd eterminedthecauseof anetworkdisr uption.Whichofthe following is
the NEXT step for the technician to perform?
A. Validate the findings in a top-to-bottomapproach
B. Duplicate the issue, if possible
C. Establish a plan of action to resolve theissue
D. Document the findings and actions

A

Establish a plan of action to resolve theissue

32
Q

Whichofthefollowing connectors andterminations arerequiredtomakeaCat6cablethat connects
from a PC to a non-capable MDIX switch? (Select TWO).
A. T1A-568-A - TIA-568-B
B. TIA-568-B - TIA-568-B
C. RJ11
D. RJ45
E. F-type

A

T1A-568-A - TIA-568-B

RJ45

33
Q

Users are reporting intermittent Wi-Fi connectivity in specific parts of a building. Which ofthe
following should the network administrator check FIRST when troubleshooting this issue? (Select
TWO).
A. Site survey
B. EIRP
C. AP placement
D. Captive portal
E. SSID assignment
F. AP association time

A

Site survey

AP placement

34
Q

A networkmanager is configuring switches in IDFs toensure unauthorized client computers are not
connecting to a secure wired network. Which ofthe following isthe networkmanager MOST likely
performing?
A. Disabling unneeded switchports
B. Changing the default VLAN
C. Configuring DHCP snooping
D. Writing ACLs to prevent access to theswitch

A

Disabling unneeded switchports

35
Q

A technician installed an 8-portswitch in auser’s office. Theuser needstoadd a second computerin
theoffice,sothetechnician connects bothPCstotheswitch andconnectstheswitchtothewalljack.
However,thenewPCcannotconnecttonetworkresources.Thetechnicianthenobservesthe
following:
* The new computer does not get an IP address on the client’s VLAN.
* Both computers have a link light on their NICs.
* The new PC appearsto be operating normally except for the network issue.
* The existing computer operates normally.
Which of the following should the technician do NEXT to address the situation?
A. Contact the network team to resolve the port security issue.
B. Contactthe server team to have a record created in DNS for the new PC.
C. Contact the security team to review the logs on the company’s SIEM.
D. Contactthe application team to check NetFlow data from the connected switch.

A

Contact the network team to resolve the port security issue.

36
Q

Whichofthefollowingdeviceshavethecapabilitytoallowcommunicationbetweentwodifferent
subnetworks? (Select TWO).
A. IDS
B. Access point
C. Layer 2 switch
D. Layer 3 switch
E. Router
F. Media converter

A

D. Layer 3 switch
E. Router

37
Q

A networki s experiencing extremelatency whenaccessing aparticular website.Whichofthe
following commands will BEST help identify the issue?
A. ipconfig
B. netstat
C. tracert
D. ping

A

tracert

38
Q

Anetwork technician isimplementing a solution thatwill allow end usersto gain accesstomultiple
applications afterloggingon.Which ofthefollowing authenticationmethods would allowthistype
of access?
A. SSO
B. LDAP
C. EAP
D. TACACS+

A

SSO

38
Q

A networkengineeris investigating reports ofpoor network performance.Upon reviewing a report,
the engineerfinds hundreds of CRC errors on an interface.Which ofthe following isthe MOST likely
cause of these errors?
A. A bad wire on the Cat 5e cable
B. The wrong VLAN assignment to the switchport
C. A misconfigured QoS setting on the router
D. Both sides of the switch trunk set to full duplex

A

A bad wire on the Cat 5e cable

39
Q

Anetwork attack caused a network outage bywiping the configuration and logs ofthe border
firewall.Which ofthe following sources, in an investigation todeterminehowthe firewallwas
compromised, can provide the MOST detailed data?
A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data

A

Syslog server messages

40
Q

which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporateresources.
B. Upgrade security via the use of an NFVtechnology
C. Connect two data centers across theinternet.
D. Increase VPN availability by using a SDWANtechnology.

A

ecure web access to internal corporateresources.

41
Q

Which of the following options represents the participating computers in a network?
A. Nodes
B. CPUs
C. Servers
D. Clients

A

Nodes

41
Q

A technician istrying to determine whether an LACP bundle isfully operational.Which of the
following commands will the technician MOST likely use?
A. show interface
B. show config
C. how route
D. show arp

A

show interface

42
Q

Whichofthe following is conducted frequently to maintainan updated list ofasystem’s
weaknesses?
A. Penetration test
B. Posture assessment
C. Risk assessment
D. Vulnerability scan

A

Vulnerability scan

43
Q

Which ofthe following protocols iswidely usedi nlarge-scale enterprise networks tosupport
complex networkswith multiplerouters andbalancetrafficload onmultiplelinks?
A. OSPF
B. RIPv2
C. QoS
D. STP

A

OSPF

44
Q

Anauditorassessing network bestpractices wasable toconnecta rogue switch into a networkJack
and get network connectivity. Whichofthe following controls would BESTaddressthisrisk?
A. Activate portsecurity on the switchports providing end user access.
B. Deactivate Spanning Tree Protocol on network interfacesthat are facing public areas.
C. Disable Neighbor Resolution Protocol in the Layer 2devices.
D. Ensure port tagging isin place for network interfaces in guest areas

A

Activate portsecurity on the switchports providing end user access.

44
Q

A technician knows the MAC address of a device and is attempting to find the device’s IP address.
Exam Dumps 196/383
Which of the following should the technician look at to find the IP address? (Select TWO).
A. ARP table
B. DHCP leases
C. IP route table
D. DNS cache
E. MAC address table
F. STP topolog

A

ARP table
MAC address table

45
Q

Severa lemployeeshav eexpresse dconcern sabo utthe company monitoringtheir internet activity
whent heyar eworking fromhome. Thecompanywants tomitigate thisissue and reassure
employees thattheir private internetactivity isno tbeing monitored.Which of the following would
satisfy company and employee needs?
A. Split tunnel
B. Full tunnel
C. Site-to-site tunnel
D. Virtual desktop

A

Split tunnel

46
Q

An etworkadministrator installeda nadditiona lIDFduring abuilding expansionproject. Whichofthe
following documents need to be updated to reflectthe change? (Select TWO).
A. Data loss prevention policy
B. BYOD policy
C. Acceptable use policy
D. Non-disclosure agreement
Exam Dumps 200/383
E. Disaster recovery plan
F. Physical network diagram

A

E. Disaster recovery plan
F. Physical network diagram

47
Q

A technician was cleaning astorage closet and foundaboxo ftransceiversl abeled8Gbps. Whichof
the following protocols usesthose transceivers?
A. Coaxial over Ethernet
B. Internet Small Computer Systems Interface
C. Fibre Channel
D. Gigabit interface converter

A

Fibre Channe

47
Q

A network administratoris designing awireless network. The administrato rmust ensure arented
officespacehasasufficientsignal.Reducing exposuretothewirelessnetwork isimportant,butitis
secondarytotheprimaryobjective.WhichofthefollowingwouldMOSTlikelyfacilitatethecorrect
accessibility to the Wi-Finetwork?
A. Polarization
B. Channel utilization
C. Channel bonding
D. Antenna type
E. MU-MIMO

A

Antenna type

48
Q

Which of the following records can be used to track the number of changes on a DNS zone?
A. SOA
B. SRV
C. PTR
D. NS

A

SOA

48
Q

A newglobal ISPneeds to connect from central offices inNorth Americatothe United Kingdom.
Which ofthe following would be the BEST cabling solution forthis project?
A. Single-mode
B. Coaxial
C. Cat 6a
D. Twinaxial

A

Single-mode

49
Q

A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket:

  • The server’s IP address can be pinged from the client PCs.
  • Access to the web resource works correctly when on the server’s console.
  • No clients can access the server’s data via URL.
  • The server does not have a firewall configured.
  • No ACLs are preventing connectivity from the client’s network.
  • All services on the server are operating normally, which was confirmed by the server team.

Which of the following actions will resolve the issue?

A. Reset port security on the switchport connecting the server.
B. Adjust the web server’s NTP setting to match the client settings.
C. Configure A records for the web server.
D. Install the correct MIB on the web server.

A

Configure A recordsfor the web server.

50
Q

A technician is trying to install a VolP phone, butthephone is notturning on. The technician checks
the cable gong fromthephone tothe switch, and the cable is good.Which ofthe following actionsIS
needed for this phone to work?
A. Add a POE injector
B. Enable MDIX.
C. Use a crossover cable.
D. Reconfigure the port.

A

Add a POE injector

50
Q

A user calls the IT department to report being unable to log in after locking the computer The user
resets thepassword, butl aterin theday theuseris again unable tolog in afterlocking the computer
Which ofthe following attacks againstthe userIS MOST likely taking place?
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing

A

Brute-force

becaue someone is doing a brute froce attacks