Exam 211-220 Flashcards
Which of the following is a secure way to connect to a device?
A. RSH
B. TFTP
C. SNMPv2
D. SFTP
D. SFTP
Which of the following is used to provide hot standby capabilities using paired routers?
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
A. CARP
A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the
router since the network is down. Which of the following network troubleshooting methodology steps should Joe have
performed FIRST?
A. Determine if anything has changed
B. Once a theory is confirmed determine the next step is to resolve the problem
C. Implement the solution or escalate as necessary
D. Question the obvious
A. Determine if anything has changed
Which of the following is the BEST way to mitigate security threats on a network?
A. Social engineering
B. User training
C. Incident response
D. Man-in-the- middle
B. User training
The software that allows a machine to run multiple operating systems at once is called the:
A. Server manager
B. Hypervisor
C. Boot loader
D. Partition manager
B. Hypervisor
Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented? A. Network security policy B. Network baseline C. Logical network diagram D. Wiring schematic
C. Logical network diagram
A company has a large number of employees that need VPN access from home. Which of the following is the BEST
solution for deploying and managing the remote access?
A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall
C. SSL VPN
Which of the following cables has the MOST twists per inch? A. CAT3 B. CAT5 C. CAY5e D. CAT6
D. CAT6
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She
can reach the Internet, but cannot access any internal network resources.
Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
A. Incorrect DNS
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A. 802.11a