Deck-4 Flashcards
Which of the following is associated with the session layer of the OSI model?
A. Data representation
B. Packets
C. Sockets
D. Frames
Sockets
An administrator needs to connect two laptops directly to each other using 802.11 ac but does not
have an AP available. Which of the following describes this configuration?
A. Basic service set
B. Extended service set
C. Independent basic service set
D. MU-MIMO
Independent basic service set
A Fortune 500 firm is decidingOn the kind or data center equipment to install given its five-year
budgetOutlook. TheChiefInformation comparing equipmentbased on the life expectancyOf
different models. Which Ofthe
following concepts BEST represents this metric?
A. MTBF
B. MTRR
C. RPO
D. RTO
MTBF
While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), even though it is connected to a gigabit switch.
Upon reviewing the interface information in the switch CLI, the technician notes that the port is operating at 100 FD but shows many RX and TX errors. The technician moves the computer to another switch port and experiences the same issues.
Which of the following is MOST likely the cause of the low data rate and port errors?
A. Bad switch ports
B. Duplex issues
C. Cable length
D. Incorrect pinout
Duplex issues
A network administrator wants to check all network connections and see the output in integer form.
Which of the following commands should the administrator run on the command line?
A. netstat
B. netstat -a
C. netstat -e
D. netstat -n
D. netstat -n
Which of the following would MOST likely utilize PoE?
A. A camera
B. A printer
C. A hub
D. A modem
A camera
A network engineer is investigating issues on a Layer 2 switch. The department typically shares a switch port during meetings for presentations, but after the first user shares, no other users can connect.
a.Spanning Tree Protocol is enabled on theswitch.
B. VLAN trunking is enabled on the switch.
C. Port security is configured on the switch.
D. Dynamic ARP inspection is configured on the switch.
Port security is configured on the switch
A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources.
Which of the following needs to be reconfigured?
A. The IP address
B. The subnet mask
C. The gateway address
D. The DNS servers
The gateway address
An administrator is attempting to add a new system to monitoring but is unsuccessful. The
administrator noticesthe systemissimilar to another one on the network;however,the new one has
an updated OS version.Which of the followingshould the administrator consider updating?
A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps
System baseline
Which of the following protocols can beused tochange device configurations via encrypted and
authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
SNMPv3
B. SSh
Which of the following is used to elect an STP root?
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch’s root por
A bridge ID
A network technician needs to ensure that all files on a company’s network can be moved in a safe and protected manner without interception from someone who is not the intended recipient.
Which of the following would allow the network technician to meet these requirements?
A. FTP
B. TFTP
C. SMTP
D. SFTP
SFTP
Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification
Traffic shaping
318.
company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company’s network hardware.
The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:
Which of the following actions would MOST likely reduce this issue? (Select TWO).
A. Change to WPA encryption
B. Change the DNS server to 10.1.10.1
C. Change the default gateway to 10.0.0.1
D. Change the DHCP scope end to 10.1.10.250
E. Disable AP isolation
F. Change the subnet mask to 255.255.255.192
G. Reduce the DHCP lease time to four hours
Change the DHCP scope end to 10.1.10.250
Reduce the DHCP lease time to four hours
Which of the following uses the link-state routing algorithm and operates with in a single
autonomous system?
A. EIGRP
B. OSPF
C. RIP
D. BGP
OSPF
A large metropolitan city is looking to standardize the ability for police department laptops to connect to the city government’s VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers. Latency and overall bandwidth needs are not high priorities.
Which of the following would BEST meet the city’s needs?
A. 5G
B. LTE
C. Wi-Fi 4
D. Wi-Fi 5
E. Wi-Fi 6
LTE
A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet.
Which of the following is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application
Check for the existence of a known exploit in order to assess the risk
A network administrator is getting reports of some internal users who cannot connect to network resources. The users state they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks.
Which of the following is the MOST likely cause of the issue?
A. The client DHCP scope is fully utilized
B. The wired network is experiencing electrical interference
C. The captive portal is down and needs to be restarted
D. SNMP traps are being received
E. The packet counter on the router interface is high
The client DHCP scope is fully utilized
A network engineer needs to create a subnet that has the capacity for five VLANs, with the following number of clients to be allowed on each:
Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?
A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24
B. 10.0.0.0/22
Which of the following architectures reduces network latency by enforcing a limit on the number of switching devices on the frame’s path between any internal hosts?
A. Spine and leaf
B. Software-defined network
C. Three-tiered
D. Collapsed core
Spine and leaf
It does this by using a two-level hierarchy of switches, where the spine switches connect to the leaf switches, which in turn connect to the end hosts. This reduces the number of hops a packet must take from one host to another, thus reducing latency.
While walking from the parking lot to an access-controlled door, an employee sees an authorized user open the door. Then the employee notices that another person catches the door before it closes and goes inside.
Which of the following attacks is taking place?
A. Tailgating
B. Piggybacking
C. Shoulder surfing
D. Phishing
Tailgating
Thedifferencebetweenpiggybacking andtailgaiting isthatwithpiggybacking,thepersoniswillfully
andintentionally letting youin.Inthisparticular case,theperson caughtthedoorbeforeit closed,so
it istailgating.
Which of the following bandwidth management techniques uses buffers at the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization
Traffic shaping
Users within a corporate network need to connect to the Internet, but corporate network policy does not allow direct connections.
Which of the following is MOST likely to be used?
A. Proxy server
B. VPN client
C. Bridge
D. VLAN
Proxy server
A company is deploying a SAN at headquarters and a branch office 1,000 mi (1,609 km) away that will access small amounts of data.
Which of the following types of connections would be MOST cost-effective to implement?
A. iSCSI
B. FCoE
C. Ethernet
D. FC
iSCSI
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency.
Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
A. SNMP
B. Link state
C. Syslog
D. QoS
E. Traffic shaping
SNMP
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user’s computer and verifies that pings fail to respond back when trying to reach the file server.
Which of the following would BEST help the technician verify whether the file server is reachable?
A. netstat
B. ipconfig
C. nslookup
D. traceroute
traceroute
A network administrator is decommissioning a server.
Which of the following will the network administrator MOST likely consult?
A. Onboarding and offboarding policies
B. Business continuity plan
C. Password requirements
D. Change management documentation
Change management documentation
A technician is contracted to install a redundant cluster of devices from the ISP in case of a hardware failure within the network.
Which of the following would provide the BEST redundant solution in Layer 2 devices?
A. Multiple routers
B. Multiple switches
C. Multiple firewalls
D. Multiple bridges
Multiple switches
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection.
Which of the following settings should provide better network stability?
A. Client association timeout
B. RSSI roaming threshold
C. RF attenuation ratio
D. EIRP power setting
RSSI roaming threshold