Deck-5 Flashcards

1
Q

Users are reporting poor wireless performance in some areas of an industrial plant. The wireless controller is measuring a low EIRP value compared to the recommendations noted on the most recent site survey. Which of the following should be verified or replaced for the EIRP value to meet the site survey’s specifications? (Select TWO).

A. AP transmit power
B. Channel utilization
C. Signal loss
D. Update ARP tables
E. Antenna gain
F. AP association time

A

AP transmit power
. Antenna gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, the administrator sees the following entries:

Which of the following firewall rules is MOST likely causing the issue?

A. Rule 1
B. Rule 2
C. Rule 3
D. Rule 4

A

A. Rule1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit the company’s needs?

A. SFTP
B. Fibre Channel
C. iSCSI
D. FTP

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Here’s the content formatted properly:

A new office space is being designed. The network switches are up, but no services are running yet. A network engineer plugs in a laptop configured as a DHCP client to a switch. Which of the following IP addresses should be assigned to the laptop?

A. 10.1.1.1
B. 169.254.1.128
C. 172.16.128.128
D. 192.168.0.1

A

169.254.1.128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics in the switch’s CLI, the administrator discovers the uplink is at 100% utilization. However, the administrator is unsure how to identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?

A. SNMP
B. Traps
C. Syslog
D. NetFlow

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents. Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?

A. Change the default permissions to implicit deny
B. Configure uniform ACLs to employees and NAC for contractors
C. Deploy an RDP server to centralize the access to the network
D. Implement role-based access control

A

Implement role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat6 pin-out. Which of the following terminations should the technician use when running a cable from the ISP’s port to the front desk?

A. F-type connector
B. TIA/EIA-568-B
C. LC
D. SC

A

TIA/EIA-568-B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network technician is troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?

A. show route
B. show interface
C. show arp
D. show port

A

show interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator is investigating a performance issue on a dual-link connection—VPN and MPLS—to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected for the VPN connection. Which of the following will MOST likely point to the root cause of the issue?

A. Checking the routing tables on both sides to ensure there is no asymmetric routing
B. Checking on the partner network for a missing route pointing to the VPN connection
C. Running iPerf on both sides to confirm the delay that is measured is accurate
D. Checking for an incorrect VLAN assignment affecting the MPLS traffic

A

Checking the routing tables on both sides to ensure there is no asymmetric routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a security flaw in an application or network?
A. A threat
B. A vulnerability
C. An exploit
D. A risk

A

A vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following architectures is used for FTP?
A. Client-server
B. Service-oriented
C. Connection-oriented
D. Data-centric

A

Client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?

A. Capture a network baseline
B. Perform an environmental review
C. Read the network logs
D. Run a bandwidth test

A

Capture a network baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?

A. Warnings
B. Notifications
C. Alert
D. Errors

A

Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network technician is troubleshooting a network issue for employees who have reported issues with speed when accessing a server in another subnet. The server is in another building that is 410 ft (125 m) away from the employees’ building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?

A. The connection type is not rated for that distance
B. A broadcast storm is occurring on the subnet
C. The cable run has interference on it
D. The connection should be made using a Cat 6 cable

A

The connection should be made using a Cat 6 cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is investigating an issue with connectivity at a customer’s location. The technician confirms that users can access resources locally but not over the internet. The technician theorizes that the local router has failed and investigates further. The technician’s testing results show that the route is functional; however, users still are unable to reach resources on the internet. Which of the following describes what the technician should do NEXT?

A. Document the lessons learned
B. Escalate the issue
C. Identify the symptoms
D. Question users for additional information

A

Escalate the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is checking network devices to look for opportunities to improve security. Which of the following tools would BEST accomplish this task?

A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

All packets arriving at an interface need to be fully analyzed. Which of the following features should be used to enable monitoring of the packets?

A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter

A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following OSI model layers would allow a user to access and download files from a remote computer?

A. Session
B. Presentation
C. Network
D. Application

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?

A. Releasing and renewing the PC’s IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache

A

Replacing the patch cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A GRE tunnel has been configured between two remote sites. Which of the following features, when configured, ensures the GRE overhead does not affect payload?

A. Jumbo frames
B. Auto medium-dependent interface
C. Interface crossover
D. Collision detection

A

Jumbo frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network administrator views a network pcap and sees a packet containing the following: Which of the following are the BEST ways for the administrator to secure this type of traffic? (Select TWO).

A. Migrate the network to IPv6
B. Implement 802.1X authentication
C. Set a private community string
D. Use SNMPv3
E. Incorporate SSL encryption
F. Utilize IPSec tunneling

A

C. Set a private community string
D. Use SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator check after successfully testing the cable that was wired for TIA/EIA-568A on both ends?

A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches

A

If MDIX is enabled on the new switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?

A. Packet capture
B. IPerf
C. SIEM log review
D. Internet speed test

A

IPerf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An engineer needs to verify the external record for SMTP traffic. The engineer logged into the server and entered the nslookup command. Which of the following commands should the engineer send before entering the DNS name?

A. set type=A
B. is -d company-mail.com
C. set domain=company.mail.com
D. set querytype=MX

A

set querytype=MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?

A. Port tagging
B. Port security
C. Port mirroring
D. Port aggregation

A

Port tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?

A. NFV
B. SD-WAN
C. VIP
D. MPLS

A

NFV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An IT administrator received an assignment with the following objectives
* Conduct a totalscan within the company’s network tor all connected hosts
* Detect all the types of operating systems running on all devices
* Discover allservices offered by hosts on the network
* Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is a requirement when certifying a network cabling as Cat 7?
A. Ensure the patch panel is certified for the same category.
B. Limit 10Gb transmissions to 180ft (55m).
C. Use F-type connectors on the network terminations.
D. Ensure the termination standard is TIA/EIA-568-A.

A

Ensure the patch panel is certified for the same category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A cafeteria is facing lawsuits related to criminal internet access that was made over its guest network. The marketing team, however, insists on keeping the cafeteria phone number as the wireless passphrase. Which of the following actions would improve wireless security while accommodating the marketing team and accepting the terms of use?

A. Setting WLAN security to use EAP-TLS
B. Deploying a captive portal for user authentication
C. Using geofencing to limit the area covered by the WLAN
D. Configuring guest network isolation

A

B. Deploying a captive portal for user authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?

A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 100MB speed
D. Full duplex and 100MB speed

A

Full duplex and 100MB speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following attacks, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network?

A. VLAN hopping
B. On-path attack
C. IP spoofing
D. Evil twin

A

VLAN hopping

29
Q

A desktop support department has observed slow wireless speeds for a new line of laptops using the organization’s standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue?

A. Increasing wireless signal power
B. Installing a new WAP
C. Changing the protocol associated with the SSID
D. Updating the device wireless drivers

A

Updating the device wireless drivers

30
Q

An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization’s requirements?

A. Cloud site
B. Cold site
C. Warm site
D. Hot site

A

Cloud site

31
Q

A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low.

Which of the following is the MOST appropriate mechanism to handle this issue?

A. Traffic shaping
B. Flow control
C. NetFlow
D. Link aggregation

A

Traffic shaping

32
Q

A technician thinks one of the router ports is flapping. Which of the following available resources should the technician use in order to determine if the router is flapping?

Options:
A. Audit logs
B. NetFlow
C. Syslog
D. Traffic logs

A

Syslog

32
Q

Which of the following protocols can be routed?
A. FCoE
B. Fibre Channel
C. iSCSl
D. NetBEUI

A

iSCSl

33
Q

Which of the following situations would require an engineer to configure subinterfaces?

Options:
A. In a router-on-a-stick deployment with multiple VLANs
B. In order to enable inter-VLAN routing on a multilayer switch
C. When configuring VLAN trunk links between switches
D. After connecting a router that does not support 802.1Q VLAN tags

A

In a router-on-a-stick deployment with multiple VLANs

Arouter-on-a-stick is a configuration that allows asingle routerinterface to route traffic between
multipleVLANs onanetwork1

34
Q

Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet?

Options:
A. Allow connections only to an internal proxy server.
B. Deploy an IDS system and place it in line with the traffic.
C. Create a screened network and move the devices to it.
D. Use a host-based network firewall on each device.

A

Allow connections only to an internal proxy server.

35
Q

A customer called the help desk to report a network issue. The customer recently added a hub between the switch and the router in order to duplicate the traffic flow to a logging device. After adding the hub, all the other network components that were connected to the switch slowed more than expected. Which of the following is the MOST likely cause of the issue?

Options:
A. Duplex mismatch
B. Flow control failure
C. STP malfunction
D. 802.1Q disabled

A

Duplex mismatch

36
Q

A user reports that a crucial file share is unreachable following a network upgrade that was completed the night before. A network technician confirms the problem exists. Which of the following troubleshooting steps should the network technician perform NEXT?

Options:
A. Establish a theory of probable cause.
B. Implement a solution to fix the problem.
C. Create a plan of action to resolve the problem.
D. Document the problem and the solution.

A

Establish a theory of probable cause.

37
Q

A network administrator is investigating reports about network performance and finds high utilization on a switch uplink. The administrator is unsure whether this is an anomaly or normal behavior that will require an upgrade to resolve. Which of the following should the administrator reference to gain historical perspective?

Options:
A. Device configuration review
B. ARP table export
C. Service-level agreement
D. Network performance baseline

A

Network performance baselin

38
Q

A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?

Options:
A. Network performance baselines
B. VLAN assignments
C. Routing table
D. Device configuration review

A

Device configuration review

39
Q

A company has wireless APs that were deployed with 802.11g. A network engineer has noticed more frequent reports of wireless performance issues during the lunch hour in comparison to the rest of the day. The engineer thinks bandwidth consumption will increase while users are on their breaks, but network utilization logs do not show increased bandwidth numbers. Which of the following would MOST likely resolve this issue?

Options:
A. Adding more wireless APs
B. Increasing power settings to expand coverage
C. Configuring the APs to be compatible with 802.11a
D. Changing the wireless channel used

A

Changing the wireless channel used

40
Q

A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?

Options:
A. Site-to-site
B. Secure Shell
C. In-band management
D. Remote desktop connection

A

In-band management

41
Q

Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?

Options:
A. WLAN controller
B. Load balancer
C. SIEM solution
D. Syslog server

A

WLAN controller

42
Q

An ISP configured an internet connection to provide 20 Mbps, but actual data rates are occurring at 10 Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?

Options:
A. Throughput
B. Latency
C. Bandwidth
D. Jitter

A

Throughput

43
Q

An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information:

Network address: 172.28.16.0
CIDR: /22
The engineer collected the following information from the client workstation:

IP address: 172.28.17.206
Subnet mask: 255.255.252.0
Which of the following MOST likely explains why the tool is failing to detect some workstations?

Options:
A. The scanned network range is incorrect.
B. The subnet mask on the client is misconfigured.
C. The workstation has a firewall enabled.
D. The tool is unable to scan remote networks.

A

The workstation has a firewall enabled.

44
Q

Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?

Options:
A. Software development life-cycle policy
B. User acceptance testing plan
C. Change management policy
D. Business continuity plan

A

Business continuity plan

45
Q

A company is opening a new building on the other side of its campus. The distance from the closest building to the new building is 1,804 ft (550 m). The company needs to connect the networking equipment in the new building to the other buildings on the campus without using a repeater. Which of the following transceivers should the company use?

Options:
A. 10GBASE-SW
B. 10GBASE-LR
C. 10GBASE-LX4 over multimode fiber
D. 10GBASE-SR

A

10GBASE-LR

46
Q

An IT technician installs five old switches in a network. In addition to the low port rates on these switches, they also have improper network configurations. After three hours, the network becomes overwhelmed by continuous traffic and eventually shuts down. Which of the following is causing the issue?

Options:
A. Broadcast storm
B. Collisions
C. IP settings
D. Routing loops

A

Broadcast storm

47
Q

A technician is investigating a misconfiguration on a Layer 3 switch. When the technician logs in and runs a command, the following data is shown:

Output not provided in the question.

Which of the following commands generated this output?

Options:
A. show route
B. show config
C. show interface
D. tcpdump

A

show route

48
Q

A network administrator notices excessive wireless traffic occurring on an access point after normal business hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit wireless access outside the building?

Options:
A. Set up a private VLAN.
B. Disable roaming on the WAP.
C. Change to a directional antenna.
D. Stop broadcasting of the SSID.

A

C. Change to a directional antenna.

49
Q

A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?

Options:
A. MIMO
B. TKIP
C. LTE
D. SSID

A

SSID

50
Q

A network administrator is troubleshooting a client’s device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which of the following tools would be the BEST option for the network administrator to use to further troubleshoot?

Options:
A. Tone generator
B. Multimeter
C. Optical time-domain reflectometer
D. Cable tester

A

Cable tester

51
Q

Many IP security cameras use RTSP to control media playback. Which of the following default transport layer port numbers does RTSP use?

Options:
A. 445
B. 554
C. 587
D. 5060

A

554

RTSP stands for Real Time Streaming Protocol and is an application-level network protocol designed
Exam Dumps 363/383
for controlling media playback on streaming media servers. RTSP uses the default transport layer
portnumber 554forboth TCPandUDP1

52
Q

An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?

Options:
A. STP
B. 802.1Q
C. Duplex
D. LACP

A

LACP

53
Q

Whichof the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between
routers?
A. RIP
B. OSPF
C. BGP
D. EIGRP

A

OSPF

54
Q
A
55
Q

An APC and a network server have no network connectivity, and a help desk technician is attempting to resolve the issue. The technician plans to run a constant ping command from a Windows workstation while testing various possible reasons for the connectivity issue. Which of the following should the technician use?

Options:
A. ping -w
B. ping -i
C. ping -s
D. ping -t

A

ping -t

56
Q

A switch is connected to another switch. Incompatible hardware causes a surge in traffic on both switches. Which of the following configurations will cause traffic to pause, allowing the switches to drain buffers?

Options:
A. Speed
B. Flow control
C. 802.1Q
D. Duplex

A

Flow control

57
Q

A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).

Options:
A. 22
B. 53
C. 110
D. 389
E. 995
F. 3389

A

53

995

58
Q

A network technician is investigating a trouble ticket for a user who does not have network connectivity. All patch cables between the wall jacks and computers in the building were upgraded over the weekend from Cat 5 to Cat 6. The newly installed cable is crimped with a TIA/EIA 568A on one end and a TIA/EIA 568B on the other end. Which of the following should the technician do to MOST likely fix the issue?

Options:
A. Ensure the switch port has PoE enabled.
B. Crimp the cable as a straight-through cable.
C. Ensure the switch port has STP enabled.
D. Crimp the cable as a rollover cable.

A

Crimp the cable as a straight-through cable.

59
Q

Which of the following should be used to manage outside cables that need to be routed to various multimode uplinks?

Options:
A. Fiber distribution panel
B. 110 punchdown block
C. PDU
D. TIA/EIA-568A patch bay
E. Cat 6 patch panel

A

Fiber distribution panel

60
Q

A building was recently remodeled in order to expand the front lobby. Some mobile users have been unable to connect to the available network jacks within the new lobby, while others have had no issues. Which of the following is the MOST likely cause of the connectivity issues?

Options:
A. LACP
B. Port security
C. 802.11ax
D. Duplex settings

A

Port security

61
Q

A network technician is configuring a wireless access point and wants to only allow company-owned devices to associate with the network. The access point uses PSKs, and a network authentication system does not exist on the network. Which of the following should the technician implement?

Options:
A. Captive portal
B. Guest network isolation
C. MAC filtering
D. Geofencing

A

MAC filtering

62
Q

A consultant is working with two international companies. The companies will be sharing cloud resources for a project. Which of the following documents would provide an agreement on how to utilize the resources?

Options:
A. MOU
B. NDA
C. AUP
D. SLA

A

MOU

63
Q

A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?

Options:
A. 110
B. 66
C. Bix
D. Krone

A

110

64
Q

A network administrator is implementing process changes based on recommendations following a recent penetration test. The testers used a method to gain access to the network that involved exploiting a publicly available and fixed remote code execution vulnerability in the VPN appliance. Which of the following should the administrator do to BEST prevent this from happening again?

Options:
A. Change default passwords on internet-facing hardware.
B. Implement robust ACLs with explicit deny-all entries.
C. Create private VLANs for management plane traffic.
D. Routinely upgrade all network equipment firmware.

A

. Routinely upgrade all network equipment firmware.

65
Q

Which of the following is used when a workstation sends a DHCP broadcast to a server on another LAN?

Options:
A. Reservation
B. Dynamic assignment
C. Helper address
D. DHCP offer

A

Helper address

66
Q

A network administrator needs to monitor trafficon as pecificpor ton aswitch. Which of the
following should the administrator configure to accomplish the task?
A. Port security
B. Port tagging
C. Port mirroring
D. Media access control

A
67
Q

In which of the following components do routing protocols belong in a software-defined network?

Options:
A. Infrastructure layer
B. Control layer
C. Application layer
D. Management plane

A

Control layer

67
Q

A company is undergoing expansion but does not have sufficient rack space in its data center. Which of the following would be BEST to allow the company to host its new equipment without a major investment in facilities?

Options:
A. Using a colocation service
B. Using available rack space in branch offices
C. Using a flat network topology
D. Reorganizing the network rack and installing top-of-rack switching

A

Using a colocation service

68
Q

A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is MOST needed?

Options:
A. Temperature sensor in the network MDF
B. Water sensor in the network MDF
C. Temperature sensor in the data center
D. Water sensor in the data center

A

Water sensor in the network MDF

69
Q

A network engineer is concerned about VLAN hopping happening on the network. Which of the following should the engineer do to address this concern?

Options:
A. Configure private VLANs.
B. Change the default VLAN.
C. Implement ACLs on the VLAN.
D. Enable dynamic ARP inspection.

A

Change the default VLAN.

70
Q

A public wireless ISP mounts its access points on top of traffic signal poles. Fiber-optic cables are installed from a fiber switch through the ground and up the pole to a fiber-copper media converter, and then connected to the AP. In one location, the switch port is showing sporadic link loss to the attached AP. A similar link loss is not seen at the AP interface. The fiber-optic cable is moved to another unused switch port with a similar result. Which of the following steps should the assigned technician complete NEXT?

Options:
A. Disable and enable the switch port.
B. Clean the fiber-optic cable ends.
C. Replace the media converter.

A

Clean the fiber-optic cable ends.

71
Q

Which of the following would be BEST suited for use at the access layer in a three-tier architecture system?

Options:
A. Router
B. Multilayer switch
C. Layer 2 switch
D. Access point

A

Layer 2 switch