Deck-5 Flashcards
Users are reporting poor wireless performance in some areas of an industrial plant. The wireless controller is measuring a low EIRP value compared to the recommendations noted on the most recent site survey. Which of the following should be verified or replaced for the EIRP value to meet the site survey’s specifications? (Select TWO).
A. AP transmit power
B. Channel utilization
C. Signal loss
D. Update ARP tables
E. Antenna gain
F. AP association time
AP transmit power
. Antenna gain
An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, the administrator sees the following entries:
Which of the following firewall rules is MOST likely causing the issue?
A. Rule 1
B. Rule 2
C. Rule 3
D. Rule 4
A. Rule1
A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit the company’s needs?
A. SFTP
B. Fibre Channel
C. iSCSI
D. FTP
iSCSI
Here’s the content formatted properly:
A new office space is being designed. The network switches are up, but no services are running yet. A network engineer plugs in a laptop configured as a DHCP client to a switch. Which of the following IP addresses should be assigned to the laptop?
A. 10.1.1.1
B. 169.254.1.128
C. 172.16.128.128
D. 192.168.0.1
169.254.1.128
An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics in the switch’s CLI, the administrator discovers the uplink is at 100% utilization. However, the administrator is unsure how to identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?
A. SNMP
B. Traps
C. Syslog
D. NetFlow
NetFlow
The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents. Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?
A. Change the default permissions to implicit deny
B. Configure uniform ACLs to employees and NAC for contractors
C. Deploy an RDP server to centralize the access to the network
D. Implement role-based access control
Implement role-based access control
An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat6 pin-out. Which of the following terminations should the technician use when running a cable from the ISP’s port to the front desk?
A. F-type connector
B. TIA/EIA-568-B
C. LC
D. SC
TIA/EIA-568-B
A network technician is troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?
A. show route
B. show interface
C. show arp
D. show port
show interface
A network administrator is investigating a performance issue on a dual-link connection—VPN and MPLS—to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected for the VPN connection. Which of the following will MOST likely point to the root cause of the issue?
A. Checking the routing tables on both sides to ensure there is no asymmetric routing
B. Checking on the partner network for a missing route pointing to the VPN connection
C. Running iPerf on both sides to confirm the delay that is measured is accurate
D. Checking for an incorrect VLAN assignment affecting the MPLS traffic
Checking the routing tables on both sides to ensure there is no asymmetric routing
Which of the following is a security flaw in an application or network?
A. A threat
B. A vulnerability
C. An exploit
D. A risk
A vulnerability
Which of the following architectures is used for FTP?
A. Client-server
B. Service-oriented
C. Connection-oriented
D. Data-centric
Client-server
A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?
A. Capture a network baseline
B. Perform an environmental review
C. Read the network logs
D. Run a bandwidth test
Capture a network baseline
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. Notifications
C. Alert
D. Errors
Notifications
A network technician is troubleshooting a network issue for employees who have reported issues with speed when accessing a server in another subnet. The server is in another building that is 410 ft (125 m) away from the employees’ building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?
A. The connection type is not rated for that distance
B. A broadcast storm is occurring on the subnet
C. The cable run has interference on it
D. The connection should be made using a Cat 6 cable
The connection should be made using a Cat 6 cable
A technician is investigating an issue with connectivity at a customer’s location. The technician confirms that users can access resources locally but not over the internet. The technician theorizes that the local router has failed and investigates further. The technician’s testing results show that the route is functional; however, users still are unable to reach resources on the internet. Which of the following describes what the technician should do NEXT?
A. Document the lessons learned
B. Escalate the issue
C. Identify the symptoms
D. Question users for additional information
Escalate the issue
A technician is checking network devices to look for opportunities to improve security. Which of the following tools would BEST accomplish this task?
A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner
Protocol analyzer
All packets arriving at an interface need to be fully analyzed. Which of the following features should be used to enable monitoring of the packets?
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
Port mirroring
Which of the following OSI model layers would allow a user to access and download files from a remote computer?
A. Session
B. Presentation
C. Network
D. Application
Application
A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC’s IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
Replacing the patch cable
A GRE tunnel has been configured between two remote sites. Which of the following features, when configured, ensures the GRE overhead does not affect payload?
A. Jumbo frames
B. Auto medium-dependent interface
C. Interface crossover
D. Collision detection
Jumbo frames
A network administrator views a network pcap and sees a packet containing the following: Which of the following are the BEST ways for the administrator to secure this type of traffic? (Select TWO).
A. Migrate the network to IPv6
B. Implement 802.1X authentication
C. Set a private community string
D. Use SNMPv3
E. Incorporate SSL encryption
F. Utilize IPSec tunneling
C. Set a private community string
D. Use SNMPv3
On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator check after successfully testing the cable that was wired for TIA/EIA-568A on both ends?
A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches
If MDIX is enabled on the new switch
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
A. Packet capture
B. IPerf
C. SIEM log review
D. Internet speed test
IPerf
An engineer needs to verify the external record for SMTP traffic. The engineer logged into the server and entered the nslookup command. Which of the following commands should the engineer send before entering the DNS name?
A. set type=A
B. is -d company-mail.com
C. set domain=company.mail.com
D. set querytype=MX
set querytype=MX
A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?
A. Port tagging
B. Port security
C. Port mirroring
D. Port aggregation
Port tagging
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NFV
B. SD-WAN
C. VIP
D. MPLS
NFV
An IT administrator received an assignment with the following objectives
* Conduct a totalscan within the company’s network tor all connected hosts
* Detect all the types of operating systems running on all devices
* Discover allservices offered by hosts on the network
* Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump
nmap
Which of the following is a requirement when certifying a network cabling as Cat 7?
A. Ensure the patch panel is certified for the same category.
B. Limit 10Gb transmissions to 180ft (55m).
C. Use F-type connectors on the network terminations.
D. Ensure the termination standard is TIA/EIA-568-A.
Ensure the patch panel is certified for the same category.
A cafeteria is facing lawsuits related to criminal internet access that was made over its guest network. The marketing team, however, insists on keeping the cafeteria phone number as the wireless passphrase. Which of the following actions would improve wireless security while accommodating the marketing team and accepting the terms of use?
A. Setting WLAN security to use EAP-TLS
B. Deploying a captive portal for user authentication
C. Using geofencing to limit the area covered by the WLAN
D. Configuring guest network isolation
B. Deploying a captive portal for user authentication
A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?
A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 100MB speed
D. Full duplex and 100MB speed
Full duplex and 100MB speed
Which of the following attacks, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network?
A. VLAN hopping
B. On-path attack
C. IP spoofing
D. Evil twin
VLAN hopping
A desktop support department has observed slow wireless speeds for a new line of laptops using the organization’s standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue?
A. Increasing wireless signal power
B. Installing a new WAP
C. Changing the protocol associated with the SSID
D. Updating the device wireless drivers
Updating the device wireless drivers
An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization’s requirements?
A. Cloud site
B. Cold site
C. Warm site
D. Hot site
Cloud site
A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low.
Which of the following is the MOST appropriate mechanism to handle this issue?
A. Traffic shaping
B. Flow control
C. NetFlow
D. Link aggregation
Traffic shaping
A technician thinks one of the router ports is flapping. Which of the following available resources should the technician use in order to determine if the router is flapping?
Options:
A. Audit logs
B. NetFlow
C. Syslog
D. Traffic logs
Syslog
Which of the following protocols can be routed?
A. FCoE
B. Fibre Channel
C. iSCSl
D. NetBEUI
iSCSl
Which of the following situations would require an engineer to configure subinterfaces?
Options:
A. In a router-on-a-stick deployment with multiple VLANs
B. In order to enable inter-VLAN routing on a multilayer switch
C. When configuring VLAN trunk links between switches
D. After connecting a router that does not support 802.1Q VLAN tags
In a router-on-a-stick deployment with multiple VLANs
Arouter-on-a-stick is a configuration that allows asingle routerinterface to route traffic between
multipleVLANs onanetwork1
Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet?
Options:
A. Allow connections only to an internal proxy server.
B. Deploy an IDS system and place it in line with the traffic.
C. Create a screened network and move the devices to it.
D. Use a host-based network firewall on each device.
Allow connections only to an internal proxy server.
A customer called the help desk to report a network issue. The customer recently added a hub between the switch and the router in order to duplicate the traffic flow to a logging device. After adding the hub, all the other network components that were connected to the switch slowed more than expected. Which of the following is the MOST likely cause of the issue?
Options:
A. Duplex mismatch
B. Flow control failure
C. STP malfunction
D. 802.1Q disabled
Duplex mismatch
A user reports that a crucial file share is unreachable following a network upgrade that was completed the night before. A network technician confirms the problem exists. Which of the following troubleshooting steps should the network technician perform NEXT?
Options:
A. Establish a theory of probable cause.
B. Implement a solution to fix the problem.
C. Create a plan of action to resolve the problem.
D. Document the problem and the solution.
Establish a theory of probable cause.
A network administrator is investigating reports about network performance and finds high utilization on a switch uplink. The administrator is unsure whether this is an anomaly or normal behavior that will require an upgrade to resolve. Which of the following should the administrator reference to gain historical perspective?
Options:
A. Device configuration review
B. ARP table export
C. Service-level agreement
D. Network performance baseline
Network performance baselin
A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?
Options:
A. Network performance baselines
B. VLAN assignments
C. Routing table
D. Device configuration review
Device configuration review
A company has wireless APs that were deployed with 802.11g. A network engineer has noticed more frequent reports of wireless performance issues during the lunch hour in comparison to the rest of the day. The engineer thinks bandwidth consumption will increase while users are on their breaks, but network utilization logs do not show increased bandwidth numbers. Which of the following would MOST likely resolve this issue?
Options:
A. Adding more wireless APs
B. Increasing power settings to expand coverage
C. Configuring the APs to be compatible with 802.11a
D. Changing the wireless channel used
Changing the wireless channel used
A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?
Options:
A. Site-to-site
B. Secure Shell
C. In-band management
D. Remote desktop connection
In-band management
Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?
Options:
A. WLAN controller
B. Load balancer
C. SIEM solution
D. Syslog server
WLAN controller
An ISP configured an internet connection to provide 20 Mbps, but actual data rates are occurring at 10 Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?
Options:
A. Throughput
B. Latency
C. Bandwidth
D. Jitter
Throughput
An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information:
Network address: 172.28.16.0
CIDR: /22
The engineer collected the following information from the client workstation:
IP address: 172.28.17.206
Subnet mask: 255.255.252.0
Which of the following MOST likely explains why the tool is failing to detect some workstations?
Options:
A. The scanned network range is incorrect.
B. The subnet mask on the client is misconfigured.
C. The workstation has a firewall enabled.
D. The tool is unable to scan remote networks.
The workstation has a firewall enabled.
Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?
Options:
A. Software development life-cycle policy
B. User acceptance testing plan
C. Change management policy
D. Business continuity plan
Business continuity plan
A company is opening a new building on the other side of its campus. The distance from the closest building to the new building is 1,804 ft (550 m). The company needs to connect the networking equipment in the new building to the other buildings on the campus without using a repeater. Which of the following transceivers should the company use?
Options:
A. 10GBASE-SW
B. 10GBASE-LR
C. 10GBASE-LX4 over multimode fiber
D. 10GBASE-SR
10GBASE-LR
An IT technician installs five old switches in a network. In addition to the low port rates on these switches, they also have improper network configurations. After three hours, the network becomes overwhelmed by continuous traffic and eventually shuts down. Which of the following is causing the issue?
Options:
A. Broadcast storm
B. Collisions
C. IP settings
D. Routing loops
Broadcast storm
A technician is investigating a misconfiguration on a Layer 3 switch. When the technician logs in and runs a command, the following data is shown:
Output not provided in the question.
Which of the following commands generated this output?
Options:
A. show route
B. show config
C. show interface
D. tcpdump
show route
A network administrator notices excessive wireless traffic occurring on an access point after normal business hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit wireless access outside the building?
Options:
A. Set up a private VLAN.
B. Disable roaming on the WAP.
C. Change to a directional antenna.
D. Stop broadcasting of the SSID.
C. Change to a directional antenna.
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
Options:
A. MIMO
B. TKIP
C. LTE
D. SSID
SSID
A network administrator is troubleshooting a client’s device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which of the following tools would be the BEST option for the network administrator to use to further troubleshoot?
Options:
A. Tone generator
B. Multimeter
C. Optical time-domain reflectometer
D. Cable tester
Cable tester
Many IP security cameras use RTSP to control media playback. Which of the following default transport layer port numbers does RTSP use?
Options:
A. 445
B. 554
C. 587
D. 5060
554
RTSP stands for Real Time Streaming Protocol and is an application-level network protocol designed
Exam Dumps 363/383
for controlling media playback on streaming media servers. RTSP uses the default transport layer
portnumber 554forboth TCPandUDP1
An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?
Options:
A. STP
B. 802.1Q
C. Duplex
D. LACP
LACP
Whichof the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between
routers?
A. RIP
B. OSPF
C. BGP
D. EIGRP
OSPF
An APC and a network server have no network connectivity, and a help desk technician is attempting to resolve the issue. The technician plans to run a constant ping command from a Windows workstation while testing various possible reasons for the connectivity issue. Which of the following should the technician use?
Options:
A. ping -w
B. ping -i
C. ping -s
D. ping -t
ping -t
A switch is connected to another switch. Incompatible hardware causes a surge in traffic on both switches. Which of the following configurations will cause traffic to pause, allowing the switches to drain buffers?
Options:
A. Speed
B. Flow control
C. 802.1Q
D. Duplex
Flow control
A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).
Options:
A. 22
B. 53
C. 110
D. 389
E. 995
F. 3389
53
995
A network technician is investigating a trouble ticket for a user who does not have network connectivity. All patch cables between the wall jacks and computers in the building were upgraded over the weekend from Cat 5 to Cat 6. The newly installed cable is crimped with a TIA/EIA 568A on one end and a TIA/EIA 568B on the other end. Which of the following should the technician do to MOST likely fix the issue?
Options:
A. Ensure the switch port has PoE enabled.
B. Crimp the cable as a straight-through cable.
C. Ensure the switch port has STP enabled.
D. Crimp the cable as a rollover cable.
Crimp the cable as a straight-through cable.
Which of the following should be used to manage outside cables that need to be routed to various multimode uplinks?
Options:
A. Fiber distribution panel
B. 110 punchdown block
C. PDU
D. TIA/EIA-568A patch bay
E. Cat 6 patch panel
Fiber distribution panel
A building was recently remodeled in order to expand the front lobby. Some mobile users have been unable to connect to the available network jacks within the new lobby, while others have had no issues. Which of the following is the MOST likely cause of the connectivity issues?
Options:
A. LACP
B. Port security
C. 802.11ax
D. Duplex settings
Port security
A network technician is configuring a wireless access point and wants to only allow company-owned devices to associate with the network. The access point uses PSKs, and a network authentication system does not exist on the network. Which of the following should the technician implement?
Options:
A. Captive portal
B. Guest network isolation
C. MAC filtering
D. Geofencing
MAC filtering
A consultant is working with two international companies. The companies will be sharing cloud resources for a project. Which of the following documents would provide an agreement on how to utilize the resources?
Options:
A. MOU
B. NDA
C. AUP
D. SLA
MOU
A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?
Options:
A. 110
B. 66
C. Bix
D. Krone
110
A network administrator is implementing process changes based on recommendations following a recent penetration test. The testers used a method to gain access to the network that involved exploiting a publicly available and fixed remote code execution vulnerability in the VPN appliance. Which of the following should the administrator do to BEST prevent this from happening again?
Options:
A. Change default passwords on internet-facing hardware.
B. Implement robust ACLs with explicit deny-all entries.
C. Create private VLANs for management plane traffic.
D. Routinely upgrade all network equipment firmware.
. Routinely upgrade all network equipment firmware.
Which of the following is used when a workstation sends a DHCP broadcast to a server on another LAN?
Options:
A. Reservation
B. Dynamic assignment
C. Helper address
D. DHCP offer
Helper address
A network administrator needs to monitor trafficon as pecificpor ton aswitch. Which of the
following should the administrator configure to accomplish the task?
A. Port security
B. Port tagging
C. Port mirroring
D. Media access control
In which of the following components do routing protocols belong in a software-defined network?
Options:
A. Infrastructure layer
B. Control layer
C. Application layer
D. Management plane
Control layer
A company is undergoing expansion but does not have sufficient rack space in its data center. Which of the following would be BEST to allow the company to host its new equipment without a major investment in facilities?
Options:
A. Using a colocation service
B. Using available rack space in branch offices
C. Using a flat network topology
D. Reorganizing the network rack and installing top-of-rack switching
Using a colocation service
A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is MOST needed?
Options:
A. Temperature sensor in the network MDF
B. Water sensor in the network MDF
C. Temperature sensor in the data center
D. Water sensor in the data center
Water sensor in the network MDF
A network engineer is concerned about VLAN hopping happening on the network. Which of the following should the engineer do to address this concern?
Options:
A. Configure private VLANs.
B. Change the default VLAN.
C. Implement ACLs on the VLAN.
D. Enable dynamic ARP inspection.
Change the default VLAN.
A public wireless ISP mounts its access points on top of traffic signal poles. Fiber-optic cables are installed from a fiber switch through the ground and up the pole to a fiber-copper media converter, and then connected to the AP. In one location, the switch port is showing sporadic link loss to the attached AP. A similar link loss is not seen at the AP interface. The fiber-optic cable is moved to another unused switch port with a similar result. Which of the following steps should the assigned technician complete NEXT?
Options:
A. Disable and enable the switch port.
B. Clean the fiber-optic cable ends.
C. Replace the media converter.
Clean the fiber-optic cable ends.
Which of the following would be BEST suited for use at the access layer in a three-tier architecture system?
Options:
A. Router
B. Multilayer switch
C. Layer 2 switch
D. Access point
Layer 2 switch