Exam 341-350 Flashcards
Which of the following technologies could be implemented to improve call clarity when using VoIP technology?
A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding
C. QoS
Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the
information be sent securely to the monitoring station. Which of the following protocols will support secure transmission
of the data?
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP
A. SNMP v2
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are
reporting that they are unable to access the Internet.
Which of the following is the MOST likely reason?
A. Incorrectly configured ACL
B. Implicit allow statement
C. SMTP requests are being denied
D. All protocols are being allowed in
A. Incorrectly configured ACL
A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources
would be used?
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP
D. SNMP
Which of the following DNS records allows for reverse lookup of a domain?
A. PTR
B. AAAA
C. A
D. MX
A. PTR
Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?
A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same
subnet.
B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same
subnet.
C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace.
D. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.
B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same
subnet.
Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP
D. Password and hardware token OTP
A Windows server has a problem after booting up. Kim, a technician, should immediately check the:
A. history logs.
B. cron logs.
C. application logs.
D. system logs.
D. system logs.
Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing
D. Load balancing
The network optimization process used to allow reasonable use of data, voice, and video on the same network
infrastructure is called:
A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.
B. QoS