Exam 51-60 Flashcards
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of
the following ports on the terminal should be configured to allow for connectivity? (Select THREE).
A. TCP 25 B. TCP C. TCP 143 D. TCP 389 E. TCP 587 F. TCP 993 G. TCP 995
E. TCP 587
F. TCP 993
G. TCP 995
An administrator is moving to a new office. There will be several network runs through the ceiling area of the office.
Which of the following is the BEST to utilize in these areas?
A. Single-mode fiber-optic cabling
B. Cat 5e-rated cabling
C. Cat 6-rated cabling
D. Plenum-rated cabling
D. Plenum-rated cabling
A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable
HTTPS on the spare router, the technician discovers the feature is unavailable. The support office was able to connect to
the previous router. Which of the following actions should the technician perform to enable HTTPS access for the
support team?
A. Reboot the router
B. Enable HTTP on the router
C. Update the firmware of the spare router
D. Perform a factory reset on the router
C. Update the firmware of the spare router
Which of the following is the correct port number for NTP?
A. 25
B. 69
C. 123
D. 161
C. 123
Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honeypot
C. DMZ
D. Proxy server
B. Honeypot
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following
BEST describes the benefit of this approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A. It segments broadcast domains in the network infrastructure
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The
technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the
entry is “Incomplete”. Which of the following could cause this condition?
A. VLAN mismatch
B. Duplex/Speed mismatch
C. Duplicate IP address
D. TX/RX reverse
B. Duplex/Speed mismatch
A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it
yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users’ laptops.
Which of the following issues should be reviewed to help the user to connect to the wireless network?
A. Wireless switch toggled off
B. WAP settings
C. WLAN IP address out of scope
D. Wireless controller misconfiguration
A. Wireless switch toggled off
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network.
The management network is segregated from the production network and uses site-to-site VPN connections. Some of the
equipment does not support encryption, Witch of the following should the technician choose that all the equipment
would support?
A. Telnet
B. SSL
C. SSH
D. IPSec
A. Telnet
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is
interference from nearby wireless networks. Which of the following should the technician perform to discover possible
interference?
A. Site survey B. Vulnerability scanning C. Wardriving D. Checking logical diagram E. Bandwidth test
A. Site survey