Exam 31-40 Flashcards

1
Q

A technician discovers that multiple switches require a major update. Which of the following policies should be followed?

A. Change management policy
B. Remote access policy
C. Acceptable use policy
D. Memorandum of understanding

A

A. Change management policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician receives a call from a use who is experiencing network connectivity issues. The network technician
questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the
network. Which of the following has the user MOST likely introduced to the network?

A. Rogue DHCP server
B. Evil twin
C. VLAN mismatch
D. Honeypot

A

A. Rogue DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following
steps should the network technician take NEXT?
A. Test the possible solution
B. Question the users
C. Determine what has changed
D. Document the theory

A

A. Test the possible solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable
route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable.
As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is
too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?

A. Bend radius exceeded
B. Fiber cable mismatch
C. Fiber type mismatch
D. Bad fiber switch

A

A. Bend radius exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers
in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in
question to connect directly to another computer. Which of the following is MOST likely issue with the cable?

A. The cable is a crossover cable
B. The cable is rollover cable
C. The cable has bent pins
D. The cable is a Cat 5 cable

A

A. The cable is a crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the
company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform
BEFORE making the needed changes? (Choose two.)

A. Document the reason for the request
B. Scan the file for malware to protect the sales department’s computers
C. Follow the company’s approval process for the implementation
D. Install a TFTP server for the customers to use for the transfer
E. Create a honeypot to store the file on for the customers to use
F. Write the SLA for the sales department authorizing the change

A

A. Document the reason for the request

C. Follow the company’s approval process for the implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the
following should be implemented?

A. DLP
B. AUP
C. NDA
D. SLA

A

A. DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the
network card?

A. MAC address reservation
B. Static IP address
C. IP address exclusion
D. Custom DNS server entry

A

A. MAC address reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the
background. Which of the following tools would provide the information on TCP connections?

A. netstat 
B. tracert 
C. arp 
D. ipconfig 
E. route
A

A. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the
corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead
configuration? (Choose two.)

A. Enable SSID broadcasting to identify the guest network
B. Configure visitor devices to use static IP addresses
C. Enable two-factor authentication on visitor devices
D. Configure the access point to use WPA2-AES encryption
E. Ensure the access point is not running in mixed mode

A

A. Enable SSID broadcasting to identify the guest network

B. Configure visitor devices to use static IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly