Deck-4 Flashcards

1
Q

Which of the following is associated with the session layer of the OSI model?

A. Data representation
B. Packets
C. Sockets
D. Frames

A

Sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator needs to connect two laptops directly to each other using 802.11 ac but does not
have an AP available. Which of the following describes this configuration?
A. Basic service set
B. Extended service set
C. Independent basic service set
D. MU-MIMO

A

Independent basic service set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Fortune 500 firm is decidingOn the kind or data center equipment to install given its five-year
budgetOutlook. TheChiefInformation comparing equipmentbased on the life expectancyOf
different models. Which Ofthe
following concepts BEST represents this metric?
A. MTBF
B. MTRR
C. RPO
D. RTO

A

MTBF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), even though it is connected to a gigabit switch.

Upon reviewing the interface information in the switch CLI, the technician notes that the port is operating at 100 FD but shows many RX and TX errors. The technician moves the computer to another switch port and experiences the same issues.

Which of the following is MOST likely the cause of the low data rate and port errors?

A. Bad switch ports
B. Duplex issues
C. Cable length
D. Incorrect pinout

A

Duplex issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator wants to check all network connections and see the output in integer form.

Which of the following commands should the administrator run on the command line?

A. netstat
B. netstat -a
C. netstat -e
D. netstat -n

A

D. netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would MOST likely utilize PoE?
A. A camera
B. A printer
C. A hub
D. A modem

A

A camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network engineer is investigating issues on a Layer 2 switch. The department typically shares a switch port during meetings for presentations, but after the first user shares, no other users can connect.

a.Spanning Tree Protocol is enabled on theswitch.
B. VLAN trunking is enabled on the switch.

C. Port security is configured on the switch.
D. Dynamic ARP inspection is configured on the switch.

A

Port security is configured on the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources.

Which of the following needs to be reconfigured?

A. The IP address
B. The subnet mask
C. The gateway address
D. The DNS servers

A

The gateway address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator is attempting to add a new system to monitoring but is unsuccessful. The
administrator noticesthe systemissimilar to another one on the network;however,the new one has
an updated OS version.Which of the followingshould the administrator consider updating?
A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps

A

System baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols can beused tochange device configurations via encrypted and
authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog

A

SNMPv3
B. SSh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is used to elect an STP root?
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch’s root por

A

A bridge ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network technician needs to ensure that all files on a company’s network can be moved in a safe and protected manner without interception from someone who is not the intended recipient.

Which of the following would allow the network technician to meet these requirements?

A. FTP
B. TFTP
C. SMTP
D. SFTP

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?

A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification

A

Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

318.
company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company’s network hardware.

The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.

The following settings are common to all network configurations:

Which of the following actions would MOST likely reduce this issue? (Select TWO).

A. Change to WPA encryption
B. Change the DNS server to 10.1.10.1
C. Change the default gateway to 10.0.0.1
D. Change the DHCP scope end to 10.1.10.250
E. Disable AP isolation
F. Change the subnet mask to 255.255.255.192
G. Reduce the DHCP lease time to four hours

A

Change the DHCP scope end to 10.1.10.250

Reduce the DHCP lease time to four hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following uses the link-state routing algorithm and operates with in a single
autonomous system?
A. EIGRP
B. OSPF
C. RIP
D. BGP

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A large metropolitan city is looking to standardize the ability for police department laptops to connect to the city government’s VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers. Latency and overall bandwidth needs are not high priorities.

Which of the following would BEST meet the city’s needs?

A. 5G
B. LTE
C. Wi-Fi 4
D. Wi-Fi 5
E. Wi-Fi 6

A

LTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet.

Which of the following is the appropriate NEXT step?

A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application

A

Check for the existence of a known exploit in order to assess the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator is getting reports of some internal users who cannot connect to network resources. The users state they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks.

Which of the following is the MOST likely cause of the issue?

A. The client DHCP scope is fully utilized
B. The wired network is experiencing electrical interference
C. The captive portal is down and needs to be restarted
D. SNMP traps are being received
E. The packet counter on the router interface is high

A

The client DHCP scope is fully utilized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network engineer needs to create a subnet that has the capacity for five VLANs, with the following number of clients to be allowed on each:

Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?

A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24

A

B. 10.0.0.0/22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following architectures reduces network latency by enforcing a limit on the number of switching devices on the frame’s path between any internal hosts?

A. Spine and leaf
B. Software-defined network
C. Three-tiered
D. Collapsed core

A

Spine and leaf

It does this by using a two-level hierarchy of switches, where the spine switches connect to the leaf switches, which in turn connect to the end hosts. This reduces the number of hops a packet must take from one host to another, thus reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While walking from the parking lot to an access-controlled door, an employee sees an authorized user open the door. Then the employee notices that another person catches the door before it closes and goes inside.

Which of the following attacks is taking place?

A. Tailgating
B. Piggybacking
C. Shoulder surfing
D. Phishing

A

Tailgating

Thedifferencebetweenpiggybacking andtailgaiting isthatwithpiggybacking,thepersoniswillfully
andintentionally letting youin.Inthisparticular case,theperson caughtthedoorbeforeit closed,so
it istailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following bandwidth management techniques uses buffers at the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?

A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization

A

Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Users within a corporate network need to connect to the Internet, but corporate network policy does not allow direct connections.

Which of the following is MOST likely to be used?

A. Proxy server
B. VPN client
C. Bridge
D. VLAN

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company is deploying a SAN at headquarters and a branch office 1,000 mi (1,609 km) away that will access small amounts of data.

Which of the following types of connections would be MOST cost-effective to implement?

A. iSCSI
B. FCoE
C. Ethernet
D. FC

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency.

Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?

A. SNMP
B. Link state
C. Syslog
D. QoS
E. Traffic shaping

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A user calls the help desk to report being unable to reach a file server. The technician logs in to the user’s computer and verifies that pings fail to respond back when trying to reach the file server.

Which of the following would BEST help the technician verify whether the file server is reachable?

A. netstat
B. ipconfig
C. nslookup
D. traceroute

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network administrator is decommissioning a server.

Which of the following will the network administrator MOST likely consult?

A. Onboarding and offboarding policies
B. Business continuity plan
C. Password requirements
D. Change management documentation

A

Change management documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A technician is contracted to install a redundant cluster of devices from the ISP in case of a hardware failure within the network.

Which of the following would provide the BEST redundant solution in Layer 2 devices?

A. Multiple routers
B. Multiple switches
C. Multiple firewalls
D. Multiple bridges

A

Multiple switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection.

Which of the following settings should provide better network stability?

A. Client association timeout
B. RSSI roaming threshold
C. RF attenuation ratio
D. EIRP power setting

A

RSSI roaming threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network technician is troubleshooting an area where the wireless connection to devices is poor. The technician theorizes that the signal-to-noise ratio in the area is causing the issue.

Which of the following should the technician do NEXT?

A. Run diagnostics on the relevant devices.
B. Move the access point to a different location.
C. Escalate the issue to the vendor’s support team.
D. Remove any electronics that might be causing interference.

A

. Remove any electronics that might be causing interference.

26
Q

During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols.

Which of the following ports should be disallowed so only encrypted protocols are allowed? (Select TWO.)

A. 22
B. 23
C. 69
D. 443
E. 587
F. 8080

A

B. 23
C. 69

27
Q

A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files.

Which of the following DHCP services can be used to accomplish this task?

A. Scope options
B. Exclusion ranges
C. Lease time
D. Relay

A

Scope options

28
Q

An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members.

Which of the following technologies will be BEST to use to implement this filtering without creating rules?

A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing

A

Private VLANs

29
Q

345 The following DHCP scope was configured for a new VLAN dedicated to a large deployment of 325 IoT sensors:

The first 244 IoT sensors were able to connect to the TFTP server, download the configuration file, and register to an IoT management system. The other sensors are being shown as offline.

Which of the following should be performed to determine the MOST likely cause of the partial deployment of the sensors?

A. Check the gateway connectivity to the TFTP server.
B. Check the DHCP network scope.
C. Check whether the NTP server is online.
D. Check the IoT devices for a hardware failure.

A

Check the DHCP network scope.

30
Q

A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect; however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information:

Which of the following is MOST likely causing this connection failure?

A. Transmission speed
B. Incorrect passphrase
C. Channel overlap
D. Antenna cable attenuation/signal loss

A

Incorrect passphrase

31
Q

A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application.

Which of the following actions will BEST support the administrator’s response?

A. Generate a network baseline report for comparison.
B. Export the firewall traffic logs.
C. Collect the router’s NetFlow data.
D. Plot interface statistics for dropped packets.

A

Collect the router’s NetFlow data.

32
Q

A technician is investigating packet loss to a device that has varying data bursts throughout the day.

Which of the following will the technician MOST likely configure to resolve the issue?

A. Flow control
B. Jumbo frames
C. Duplex
D. Port mirroring

A

Flow control

33
Q

A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch.

Which of the following cable connectors should be used?

A. RJ45
B. LC
C. MT
D. F-type

A

LC

34
Q

A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources.

Which of the following types of attacks BEST describes this finding?

A. Rogue access point
B. Evil twin
C. ARP spoofing
D. VLAN hopping

A

Rogue access point

35
Q

Which of the following is a valid and cost-effective solution to connect a fiber cable into a network switch without available SFP ports?
A. Use a media converter and a UTP cable
B. Install an additional transceiver module and use GBICs
C. Change the type of connector from SC to F-type
D. Use a loopback adapter to make the connection

A

Use a media converter and a UTP cable

36
Q

Which of the following would enable a network technician to implement dynamic routing?
A. An IPS
B. A bridge
C. A Layer 3 switch
D. A hub

A

A Layer 3 switch

37
Q

A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?
A. Network performance baselines
B. VLAN assignments
C. Routing table
D. Device configuration review

A

Device configuration review

38
Q

A network administrator has received calls every day for the past few weeks from three users who cannot access the network. The administrator asks all the users to reboot their PCs, but the same users still cannot access the system. The following day, three different users report the same issue, and the administrator asks them all to reboot their PCs; however, this does not fix the issue.

Which of the following is MOST likely occurring?
A. Incorrect firewall settings
B. Inappropriate VLAN assignment
C. Hardware failure
D. Overloaded CAM table in switch
E. DHCP scope exhaustion

A

DHCP scope exhaustion

38
Q

358.A network administrator is investigating a network event that is causing all communication to stop. The network administrator is unable to use SSH to connect to the switch but is able to gain access using the serial console port. While monitoring port statistics, the administrator sees the following:

Which of the following is MOST likely causing the network outage?
A. Duplicate IP address
B. High collisions
C. Asynchronous route
D. Switch loop

A

High collisions

39
Q

An administrator wants to increase the availability of a server that is connected to the office network. Which of the following allows for multiple NICs to share a single IP address and offers maximum performance while providing fault tolerance in the event of a NIC failure?
A. Multipathing
B. Spanning Tree Protocol
C. First Hop Redundancy Protocol
D. Elasticity

A

Multipathing

40
Q

A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?

A. Implement CDMA.
B. Change from omni to directional.
C. Change the SSID.
D. Change the frequency.

A

Change the frequency.

41
Q

Network traffic is being compromised by DNS poisoning every time a company’s router is connected to the internet. The network team detects an unauthorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router?

A. Change the device’s default password.
B. Disable router advertisement guard.
C. Activate control plane policing.
D. Disable unneeded network services.

A

Activate control plane policing

42
Q

Which of the following can be used to validate domain ownership by verifying the presence of pre-agreed content contained in a DNS record?

A. SOA
B. SRV
C. AAA
D. TXT

A

TXT

43
Q

An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?

A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP

A

DNS poisoning

44
Q

An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?

A. Subinterfaces
B. Link aggregation
C. Load balancing
D. Tunneling

A

Subinterfaces

44
Q

An organization is interested in purchasing a backup solution that supports the organization’s goals.
Which ofthe following concepts would specify the maximum duration that a given service can be
down before impacting operations?
A. MTTR
B. RTO
C. MTBF
D. RPO

A

RTO

45
Q

Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?

A. SDWAN
B. MAN
C. PAN
D. MPLS

A

SDWAN

46
Q

During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue?

A. Traps
B. MIB
C. OID
D. Baselines

A

Traps

46
Q

A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do?

A. Confirm that memory usage on the network devices in the IDF is normal.
B. Access network baseline data for references to an air conditioning issue.
C. Verify severity levels on the corporate syslog server.
D. Check for SNMP traps from a network device in the IDF.
E. Review interface statistics looking for cyclic redundancy errors.

A

Check for SNMP traps from a network device in the IDF.

47
Q

Which of the following is the NEXT step to perform network troubleshooting after identifying an issue?

A. Implement a solution.
B. Establish a theory.
C. Escalate the issue.
D. Document the findings.

A

. Establish a theory.

48
Q

Identify the Problem

Develop a Theory

Test the Theory

Plan of Action

Implement the Solution

Verify System Functionality

A
49
Q

Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?
A. Data link
B. Network
C. Transport
D. Session

A

Data link

50
Q

A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat?
A. An approved vendor with on-site offices
B. An infected client that pulls reports from the firm
C. A malicious attacker from within the same country
D. A malicious attacker attempting to socially engineer access into corporate offices

A

An approved vendor with on-site offices

50
Q

Network users reported that a recent firmware upgrade to a firewall did not resolve the issue that prompted the upgrade. Which of the following should be performed NEXT?

A. Reopen the service ticket, request a new maintenance window, and rollback to the anterior firmware version.
B. Gather additional information to ensure users’ concerns are not being caused by a different issue with similar symptoms.
C. Employ a divide-and-conquer troubleshooting methodology by engaging the firewall vendor’s support.
D. Escalate the issue to the IT management team in order to negotiate a new SLA with the user’s manager.

A

Gather additional information to ensure users’ concerns are not being caused by a different issue with similar symptoms.

51
Q

A company’s primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?
A. Diverse paths
B. Load balancing
C. Multipathing
D. Virtual Router Redundancy Protocol

A

Multipathing

52
Q

A technician manages a DHCP scope but needs to allocate a portion of the scope’s subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?
A. Dynamic assignment
B. Exclusion range
C. Address reservation
D. IP helper

A

Exclusion range

53
Q

A technician is configuring a static IP address on a new device in a newly created subnet. The work order specifies the following requirements:

The IP address should use the highest address available in the subnet.
The default gateway needs to be set to 172.28.85.94.
The subnet mask needs to be 255.255.255.224.
Which of the following addresses should the engineer apply to the device?
A. 172.28.85.93
B. 172.28.85.95
C. 172.28.85.254
D. 172.28.85.255

A

172.28.85.93

IP Address: 172.28.85.95/27
Netmask: 255.255.255.224
Network Address: 172.28.85.64
Usable Host Range: 172.28.85.65 - 172.28.85.94
Broadcast Address: 172.28.85.95

54
Q

Question: Which of the following is most likely to have the HIGHEST latency while being the most accessible?
A. Satellite
B. DSL
C. Cable
D. 4G

A

Satellite

55
Q

Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
A. netstat -a
B. ifconfig
C. ip addr
D. ipconfig /all

A

ipconfig /all

56
Q

An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern’s work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?

A. Insufficient power at the antennas
B. PoE and UTP incompatibility
C. Electromagnetic interference
D. Wrong cable pinout

A

Electromagnetic interference

57
Q

Several users with older devices are reporting intermittent connectivity while in an outdoor patio area. After some research, the network administrator determines that an outdoor WAP might help with the issue. However, the company does not want the signal to bleed into the building and cause interference. Which of the following should the network administrator perform to BEST resolve the issue?

A. Disable the SSID broadcast on the WAP in the patio area.
B. Install a WAP and enable 5GHz only within the patio area.
C. Install a directional WAP in the direction of the patio.
D. Install a repeater on the back wall of the patio area.

A

Install a directional WAP in the direction of the patio.

58
Q

A network engineer developed a plan of action to resolve an ongoing issue. Which of the following steps should the engineer take NEXT?

A. Verify full system functionality and implement preventative measures.
B. Implement the solution to resolve the problem.
C. Document findings, actions, outcomes, and lessons learned.
D. Establish a theory of probable cause.

A

Identify the Problem. …
Develop a Theory. …
Test the Theory. …
Plan of Action. …
Implement the Solution. …
Verify System Functionality. …
Document the Issue.

B. Implement the solution to resolve the problem.

59
Q

Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem?
A. F-type
B. RJ45
C. LC
D. RJ11

A

F-type

60
Q

Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
A. 2
B. 4
C. 19
D. 100

A

19

61
Q

After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information?

A. SNMP OID values
B. NetFlow data export
C. Network baseline configurations
D. Security information and event management

A

SNMP OID values

62
Q

A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation?
A. Latency
B. Jitter
C. Speed
D. Bandwidth

A

. Latency

62
Q

A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. Out-of-band access
B. Split-tunnel connections
C. Virtual network computing
D. Remote desktop gateways

A

Out-of-band access

63
Q

Due to space constraints in an IDF, a network administrator can only do a single switch to accommodate three data networks. The administrator needs a configuration that will allow each device to access its expected network without additional connections. The configuration must also allow each device to access the rest of the network. Which of the following should the administrator do to meet these requirements? (Select TWO).

A. Untag the three VLANs across the uplink
B. Tag an individual VLAN across the uplink
C. Untag an individual VLAN per device port
D. Tag an individual VLAN per device port
E. Tag the three VLANs across the uplink
F. Tag the three VLANs per device port

A

A. Untag the three VLANs across the uplink
C. Untag an individual VLAN per device port

Here’s why:

Untag the three VLANs across the uplink: This allows all three VLANs to be carried over the single uplink to the main network without requiring additional tagging or configuration.
Untag an individual VLAN per device port: This ensures that each device is only connected to its specific VLAN, preventing cross-talk between different VLANs.
By untagging the three VLANs across the uplink and per device port, the network administrator can effectively segment the three data networks on a single switch, allowing each device to access its expected network without additional connections.