Deck-5 Flashcards
Users are reporting poor wireless performance in some areas of an industrial plant. The wireless controller is measuring a low EIRP value compared to the recommendations noted on the most recent site survey. Which of the following should be verified or replaced for the EIRP value to meet the site survey’s specifications? (Select TWO).
A. AP transmit power
B. Channel utilization
C. Signal loss
D. Update ARP tables
E. Antenna gain
F. AP association time
AP transmit power
. Antenna gain
An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, the administrator sees the following entries:
Which of the following firewall rules is MOST likely causing the issue?
A. Rule 1
B. Rule 2
C. Rule 3
D. Rule 4
A. Rule1
A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit the company’s needs?
A. SFTP
B. Fibre Channel
C. iSCSI
D. FTP
iSCSI
Here’s the content formatted properly:
A new office space is being designed. The network switches are up, but no services are running yet. A network engineer plugs in a laptop configured as a DHCP client to a switch. Which of the following IP addresses should be assigned to the laptop?
A. 10.1.1.1
B. 169.254.1.128
C. 172.16.128.128
D. 192.168.0.1
169.254.1.128
An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics in the switch’s CLI, the administrator discovers the uplink is at 100% utilization. However, the administrator is unsure how to identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?
A. SNMP
B. Traps
C. Syslog
D. NetFlow
NetFlow
The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents. Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?
A. Change the default permissions to implicit deny
B. Configure uniform ACLs to employees and NAC for contractors
C. Deploy an RDP server to centralize the access to the network
D. Implement role-based access control
Implement role-based access control
An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat6 pin-out. Which of the following terminations should the technician use when running a cable from the ISP’s port to the front desk?
A. F-type connector
B. TIA/EIA-568-B
C. LC
D. SC
TIA/EIA-568-B
A network technician is troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?
A. show route
B. show interface
C. show arp
D. show port
show interface
A network administrator is investigating a performance issue on a dual-link connection—VPN and MPLS—to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected for the VPN connection. Which of the following will MOST likely point to the root cause of the issue?
A. Checking the routing tables on both sides to ensure there is no asymmetric routing
B. Checking on the partner network for a missing route pointing to the VPN connection
C. Running iPerf on both sides to confirm the delay that is measured is accurate
D. Checking for an incorrect VLAN assignment affecting the MPLS traffic
Checking the routing tables on both sides to ensure there is no asymmetric routing
Which of the following is a security flaw in an application or network?
A. A threat
B. A vulnerability
C. An exploit
D. A risk
A vulnerability
Which of the following architectures is used for FTP?
A. Client-server
B. Service-oriented
C. Connection-oriented
D. Data-centric
Client-server
A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?
A. Capture a network baseline
B. Perform an environmental review
C. Read the network logs
D. Run a bandwidth test
Capture a network baseline
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. Notifications
C. Alert
D. Errors
Notifications
A network technician is troubleshooting a network issue for employees who have reported issues with speed when accessing a server in another subnet. The server is in another building that is 410 ft (125 m) away from the employees’ building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?
A. The connection type is not rated for that distance
B. A broadcast storm is occurring on the subnet
C. The cable run has interference on it
D. The connection should be made using a Cat 6 cable
The connection should be made using a Cat 6 cable
A technician is investigating an issue with connectivity at a customer’s location. The technician confirms that users can access resources locally but not over the internet. The technician theorizes that the local router has failed and investigates further. The technician’s testing results show that the route is functional; however, users still are unable to reach resources on the internet. Which of the following describes what the technician should do NEXT?
A. Document the lessons learned
B. Escalate the issue
C. Identify the symptoms
D. Question users for additional information
Escalate the issue
A technician is checking network devices to look for opportunities to improve security. Which of the following tools would BEST accomplish this task?
A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner
Protocol analyzer
All packets arriving at an interface need to be fully analyzed. Which of the following features should be used to enable monitoring of the packets?
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
Port mirroring
Which of the following OSI model layers would allow a user to access and download files from a remote computer?
A. Session
B. Presentation
C. Network
D. Application
Application
A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC’s IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
Replacing the patch cable
A GRE tunnel has been configured between two remote sites. Which of the following features, when configured, ensures the GRE overhead does not affect payload?
A. Jumbo frames
B. Auto medium-dependent interface
C. Interface crossover
D. Collision detection
Jumbo frames
A network administrator views a network pcap and sees a packet containing the following: Which of the following are the BEST ways for the administrator to secure this type of traffic? (Select TWO).
A. Migrate the network to IPv6
B. Implement 802.1X authentication
C. Set a private community string
D. Use SNMPv3
E. Incorporate SSL encryption
F. Utilize IPSec tunneling
C. Set a private community string
D. Use SNMPv3
On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator check after successfully testing the cable that was wired for TIA/EIA-568A on both ends?
A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches
If MDIX is enabled on the new switch
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
A. Packet capture
B. IPerf
C. SIEM log review
D. Internet speed test
IPerf
An engineer needs to verify the external record for SMTP traffic. The engineer logged into the server and entered the nslookup command. Which of the following commands should the engineer send before entering the DNS name?
A. set type=A
B. is -d company-mail.com
C. set domain=company.mail.com
D. set querytype=MX
set querytype=MX
A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?
A. Port tagging
B. Port security
C. Port mirroring
D. Port aggregation
Port tagging
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NFV
B. SD-WAN
C. VIP
D. MPLS
NFV
An IT administrator received an assignment with the following objectives
* Conduct a totalscan within the company’s network tor all connected hosts
* Detect all the types of operating systems running on all devices
* Discover allservices offered by hosts on the network
* Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump
nmap
Which of the following is a requirement when certifying a network cabling as Cat 7?
A. Ensure the patch panel is certified for the same category.
B. Limit 10Gb transmissions to 180ft (55m).
C. Use F-type connectors on the network terminations.
D. Ensure the termination standard is TIA/EIA-568-A.
Ensure the patch panel is certified for the same category.
A cafeteria is facing lawsuits related to criminal internet access that was made over its guest network. The marketing team, however, insists on keeping the cafeteria phone number as the wireless passphrase. Which of the following actions would improve wireless security while accommodating the marketing team and accepting the terms of use?
A. Setting WLAN security to use EAP-TLS
B. Deploying a captive portal for user authentication
C. Using geofencing to limit the area covered by the WLAN
D. Configuring guest network isolation
B. Deploying a captive portal for user authentication
A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?
A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 100MB speed
D. Full duplex and 100MB speed
Full duplex and 100MB speed