Exam 381-390 Flashcards

1
Q

Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure
ALL workstations have Internet connectivity.
Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select
the Done button. Explanation
All ports should be enabled.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the
following:
1) Client PC 1 has an IP address if 192.168.10.25/25
2) PC 1 can successfully ping its gateway .168.10.1/25 which is an interface of router A
3) Server A is named ‘BLDGBFILESRVR01’ and has an IP address .168.10.145/25
4) PC 2 with an IP address .168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the
MOST likely cause?
A. Link from touter A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down

A

A. Link from touter A to PC 1 are on different subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local
printer. Which of the following commands would be MOST helpful in determining the MAC address?

A. ping
B. arp
C. route
D. dig

A

B. arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long
cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the
following BEST describes what the network designer was referring to?

A. Bad connectors
B. Cross-talk
C. EMI / Interference
D. dB loss

A

D. dB loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company only wants preapproved laptops to be able to connect to a wireless access point.
Which of the following should be configured?

A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering

A

D. MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician needs to verify an Ethernet run is functioning properly.
Which of the following tools should be used?

A. Protocol analyzer
B. Crimper
C. Cable tester
D. Punch down tool

A

C. Cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign
private IP addresses to users inside the network. Which of the following processes should be set up?

A. Port security
B. MAC filtering
C. ACL
D. NAT

A

D. NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following security threats relies primarily on user deception and misinformation?

A. Rogue access points
B. DoS attacks
C. Man-in-the-middle attacks
D. Phishing

A

D. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point.
Which of the following would resolve this issue?

A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency

A

B. Reduce the transmission power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is used to create a secure connection between a client and a host?

A. VLAN
B. Proxy server
C. IIS server
D. VPN

A

D. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly