Exam 81-90 Flashcards
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the
following scheme:
Company b uses the following scheme:
Subnet 1: 192.168.1.50/28
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is
the BEST way for the company to connect these networks?
A. DMZ
B. PAT
C. NAT
D. VLAN
C. NAT
A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows
clients can connect to the network.
Which of the following components should the technician check on the Windows workstations? (Choose two.)
A. Start the Wired AutoConfig service in the Services console
B. Enable IEEE 802.1q Authentication in Network Interface Card Properties
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
D. Start the Wireless AutoConfig service in the Services console
E. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties
A. Start the Wired AutoConfig service in the Services console
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running
remote control software without encryption. Which of the following should the technician use to secure the connection?
A. SSH in tunnel mode
B. RDP set to console connection
C. EAP-PEAP
D. SFTP
A. SSH in tunnel mode
To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to
perform maintenance UPS in the future without affecting the availability of the attached switch.
Which of the following would BEST allow this to happen?
A. Add a redundant power supply to the switch
B. Implement stacking on the switches in the rack
C. Add a second UPS into the rack
D. Install a power converter for the switch
A. Add a redundant power supply to the switch
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
C. BYOD
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been
lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician
is able to ping the machine from the accounting department’s router, but is not able to ping the machine from the IT
network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
A. Incorrect default gateway
A network technician has created a network that consists of a router, a firewall, a switch, and several PC’s. Which of the
following physical network topologies was created?
A. Star
B. Mesh
C. Ring
D. Bus
D. Bus
A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber
optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types
should the fiber patch cable have?
A. LC B. ST C. SC D. MTRJ E. MTP
B. ST
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of:
A. ARP cache poisoning
B. IP spoofing
C. amplified DNS attack
D. evil twin
A. ARP cache poisoning
The server team has just installed an application across three different servers. They are asking that all requests to the
application are spread evenly across the three servers. Which of the following should the network team implement to
fulfil the request?
A. Proxy server
B. UTM appliance
C. Content filter
D. Load balancer
D. Load balancer