Exam Flashcards
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz.
Which of the following should the systems administrator select to meet this requirement?
802.11ax
Which of the following would be BEST to use to detect a MAC spoofing attack?
Reverse Address Resolution Protocol
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
Spectrum analyzer
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
Verify the session time-out configuration on the captive portal settings
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk.
Which of the following attacks did the network administrator prevent?
Tailgating
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
CPU usage
Memory
Client devices cannot enter a network, and the network administrator determines the DHCP ( dynamic host configuration protocol) scope is exhausted. The administrator wants to avoid creating a new DHCP pool.
Which of the following can the administrator perform to resolve the issue?
Reduce the lease time
A network is experiencing a number of CRC (Cyclic Redundancy Check) errors during normal network communication. At which of the following layers of the OSI (Open Systems Interconnection) model will the administrator MOST likely start to troubleshoot?
Layer 2
Data Link
An administrator is writing a script to periodically log the 1Pv6 and MAC addresses of all the devices on a network segment.
Which of the following switch features will MOST likely be used to assist with this task?
Neighbor Discovery Protocol
Which of the following DNS records works as an alias to another record?
CNAME
Canonical Name Pg. 237 Student Guide
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites.
Which of the following describes how the network administrator can resolve this issue?
Correct the DNS server entries in the DHCP scope
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
NIC teaming
Network Interface Card
A technician is searching for a device that is connected to the network and has the device’s physical network address.
Which of the following should the technician review on the switch to locate the device’s network port?
MAC table
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations.
Which of the following technologies BEST meets the organization’s requirements?
Content delivery network
A user reports being unable to access network resources after making some changes in the office.
Which of the following should a network technician do FlRST?
Ask what changes were made
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches.
Which of the following would address this issue by allowing the use of the original cable?
MDIX
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
IP Scanner
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference.
Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
5GHz
A technician is configuring a network switch to be used in a publicly accessible location.
Which of the following should the technician configure on the switch to prevent unintended connections?
Port security
Which of the following is used to track and document various types of known vulnerabilities?
CVE
Common Vulnerabilities and Exposures Pg 299 Student Guide
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
Two-Factor Authentication
Complex passwords
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the
following subnets should the technician use?
255.255.240.0
Which of the following is the LARGEST MTU for a standard Ethernet frame?
1500
Pg 70 Student Guide
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
Test the theory to determine the cause