Exam 351-360 Flashcards
Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems
high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the
wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network?
(Select TWO).
A. WPA encryption B. Changing wireless channels C. MAC filtering D. Changing wireless speed standards E. SSID disable
A. WPA encryption
C. MAC filtering
Which of the following solutions will detect and disable a rogue access point?
A. Port scan
B. Packet sniffer
C. IPS
D. IDS
C. IPS
A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should
the technician check?
A. The arp table of the new customer’s router.
B. The route table of the next-hop router.
C. The route table of the new customer’s router.
D. The arp table of a network user.
C. The route table of the new customer’s router.
A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the
IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?
A. Butt set
B. Punch down tool
C. Toner probe
D. D. Protocol analyzer
C. Toner probe
There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network
traffic?
A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor
A. Protocol analyzer
A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to
replace the RJ-45 connector?
A. Wire tester
B. Punch down
C. Crimper
D. Multimeter
C. Crimper
A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network
layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased
traffic?
A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop
D. Switching loop
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase
usable bandwidth?
A. Channel bonding
B. MIMO
C. Spartial reuse
D. 20MHz channel spacing
A. Channel bonding
Which of the following protocols is used to securely connect to a multi-layer switch? A. HTTP B. SMTP C. SSH D. Telnet
C. SSH
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s
NIC.
Which of the following would be used to verify the wiring back to the patch panel?
A. Butt set
B. Cable certifier
C. Toner probe
D. Snips
B. Cable certifier