Net+ Flashcards
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
A. 192.168.0.55
B. 192.168.1.0
C. 192.168.1.1
D. 192.168.5.5
E. 255 255 255.0
C
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
A. SIP
B. BGP
C. LACP
D. LLDP
C
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?
A. Decreased performance of internal network
B. Loss of full control over data resources
C. Increased malware exposure
D. Incompatibility with the current network
B
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?
A. AUP
B. SLA
C. NDA
D. MOU
A
A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?
A. Light sensors are interfering with the network
B. EMI from the lights is interfering with the network cables
C. Network wiring is run perpendicular to electrical conduit
D. Temperature changes are causing attenuation in copper cabling
C
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an
issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
B. ping
C. nslookup
D. netstat
A
A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
A. Layer 2 switch
B. Layer 3 switch
C. Bridge
D. Load balancer
B
A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server
that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure
the Linux server can reach the backup location?
A. netstat
B. traceroute
C. route
D. dig
E. ifconfig
B
An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of
the following is needed to protect BOTH the employee and the company?
A. An NDA ensuring work data stored on the personal phone remains confidential
B. An AUP covering how a personal phone may be used for work matters
C. A consent to monitoring policy covering company audits of the personal phone
D. Real-time remote monitoring of the phone’s activity and usage
D
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
C.
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera
C.
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this
approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A
A network administrator wants to ensure sensitive data is not infiltrated from the system electronically. Which of the following should be implemented
A. DLP
B. AUP
C. NDA
D. SLA
C
A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the
business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the
application. Which of the following would be the MOST cost effective for the administrator to recommend?
A. Create Ethernet VLANs
B. Disable autonegotiation on the servers
C. Install 10Gb Ethernet NICs in the servers
D. Install Fibre Channel for the server network
C?
The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician
suspects the performance issues are network related Which of the following should the technician do to improve performance?
A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel
C
A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output:
Which of the following changes should be made to allow all customers to access the company’s secure website?
A. Allow any any 10.5.0.10 443
B. Allow any any 12.73.15.5 443
C. Allow 10.5.0.10 443 any any
D. Allow 10.5.0.10 any 10.5.0.10 30
C
A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular
connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician
need to complete the installation?
A. LC to SC
B. SC to ST
C. LC to ST
D. ST to ST
E. SC to SC
C
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet
access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e
specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following
actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A. Place a switch at the hotel’s patch panel for connecting each room’s cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there
A
A technician is investigating a server performance issue, The technician has gathered the server utilization statistics. Which of the following should the
technician use to determine which statistics are not in the normal range?
A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs
A
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician
confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should
the technician use to reveal the location of the fault?
A. OTDR
B. Light meter
C. Tone generator
D. CSU/DSU
A
A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which
of the following threats is MOST likely involved?
A. Smurf attack
B. Rogue AP
C. Compromised system
D. Unintentional DoS
C
A technician is connecting a router directiy to a PC using the G1 /0/1 interface. Without the use of auto-sensing ports, which of the following cables should be
used?
A. Straight-through
B. Console
C. Rollover
D. Crossover
D
A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following shouId the technician perform to ensure another
cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all access points
D. Use TACACS+ authentication
B
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager
notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems
involved in security incidents?
A. Enforce port security to require system authentication
B. Implement a standardized UNC
C. Label existing systems with current hostnames
D. Forward the DHCP logs to the security manager every day
B
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch
does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A. Damaged fiber
B. Corrupted operating system
C. VLAN mismatch
D. Bad port
B
In which of the following ways does a DDoS attack differ from a spoofing attack?
A. DDoS attacks target multiple networks
B. Spoofing attacks originate from a single host
C. DDoS attacks are launched from multiple hosts
D. Spoofing attacks require physical presence
C
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation.
No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is not
able to ping the machine from the IT network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
A
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can
communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
A. iSCSI
B. Fibre Channel
C. NAS
D. DAS
C
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the
following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?
A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site
A
An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
*WLAN architecture supporting speeds in excess of 150 Mbps
*Client less remote network access
*Port-based network access control
Which of the following solution sets properly addresses all of the identified requirements?
A. 802.11a, IPSec VPN, 802.1x
B. 802.11ac, MPLS, 802.3
C. 802.11b, PPTP,802.1x
D. 802.11g, MS-CHAP, 802.16
E. 802.11n, SSL-VPN, 802.1x
E
Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to
printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?
A. Determine if any network equipment was replaced recently
B. Verify malware has not disabled the users’ PC firewalls
C. Replace users’ network cables with known-good network cables
D. Power cycle the web server
A
A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet
jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)
A. RG-9
B. DB-9
C. RJ-11
D. DB-25
E. RJ-45
F. BNC
BE
A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable HTTPS on the spa re router, the technician discovers the feature is unavailable. The support office was able to connect to the previous router. Which of the following actions should the technician perform
to enable HTTPS access for the support team?
A. Reboot the router
B. Enable HTTP on the router
C. Update the firmware of the spare router
D. Perform a factory reset on the router
C
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?
A. Sticky MAC
B. 802.1x
C. ACL
D. NAC
A
A network technician is able to connect the switches between to offices, but the offices cannot communicate with each other, as each office uses a different IP
addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?
A. Bridge
B. Access point
C. Router
D. Range extender
C
A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is
192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web
browser. Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the
firewall’s WAN port? (Choose two.)
A. Permit 192.168.1.143.25
B. Permit 192.168.1.143.80
C. Permit 192.168.1.143.110
D. Permit 192.168.1.143.143
E. Permit 192.168.1.143.443
F. Permit 192.168.1.143.587
EF
A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user
brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced to the
network?
A. Rogue DHCP server
B. Evil twin
C. VLAN mismatch
D. Honey pot
A
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)
A. Point-to-multipoint
B. Bus
C. Point-to-point
D. Mesh
E. Peer-peer
F. Ring
CD
Which of the following provides the ability to deploy consistent access point configurations from a central location?
A. Wireless controller
B. AAA server
C. WiFi-protected setup
D. Proxy server
E. VPN concentrator
A
A network technician is implementing a solution on the network to hide the workstation internal IP addresses across a WAN. Which of the following is the
technician configuring?
A. QoS
B. DMZ
C. RIP
D. NAT
D
An end-user device requires a specific IP address every time it connects to the corporate network, however, corporate policy does not allow the use of static IP
addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?
A. DHCP relay
B. DHCP exclusion
C. DHCP option
D. DHCP reservation
D
Which of the following is a system of notation that uses base 16 rather than base 10?
A. Hex
B. Octal
C. Binary
D. CIDR
A
A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames
and passwords to access the system. Which of the following will increase the authentication factor to three?
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
B. Adding a fingerprint reader and retina scanner
C. Using a smart card and RSA token
D. Enforcing a stronger password policy and using a hand geometry scan
A
A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist- style
connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?
A. LC
B. ST
C. SC
D. MTRJ
E. MTP
B
A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that
ports are reported as closed. Which of the following BEST explains this response?
A. The ports belong to an active system and are denying requests
B. The ports are associated with deprecated services
C. The ports do not belong to a live system
D. The ports replied with a SYN/ACK response
B
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low
power levels. The badging system has to cover 99,9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A. Install additional WAPs
B. Install external antennas
C. Move the WAPs closer to the more populated area
D. Change the antenna types
A
A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the
database server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the
purpose of this device?
A. Content filtering and network analysis
B. Load balancing and providing high availability
C. Port sniffing and protocol analysis
D. Clustering and NIC teaming
B
Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honey pot
C. DMZ
D. Proxy server
B
A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for
this equipment. Which of the following would be the FIRST issue to remediate?
A. Air flow and cooling
B. UPS capability
C. Circuit labeling
D. Power redundancy
A
A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11 ac router. The SSID, encryption and
password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago,
Which of the following is MOST likely the problem?
A. the password needs to be re-entered.
B. there is a security type mismatch.
C. there is insufficient antenna power.
D. there is a frequency mismatch.
E. the channel has changed.
D
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A. STP
B. RTP
C. RIP
D. NTP
E. SIP
C
A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies
was created?
A. Star
B. Mesh
C. Ring
D. Bus
D
A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the
network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST
likely issue with the cable?
A. The cable is a crossover cable
B. The cable is rollover cable
C. The cable has bent pins
D. The cable is a Cat 5 cable
A
Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement.
After optimizing the network, which of the following would be required?
A. IDF/MDF documentation
B. Change management
C. Performance baseline
D. Physical diagram
C
Which of the following DNS records needs to be configured for SMTP traffic?
A. MX
B. CNAME
C. AAAA
D. PTR
A
Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to
occur most often around midday. Which of the following is the MOST likely cause?
A. There is interference from small appliances
B. The signal coverage area is too small
C. Not enough DHCP addresses have been allotted
D. The DNS cache on the users’ computers has become corrupt
C
An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the
analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst
allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which
of the following attacks has the analyst successfully performed in this scenario?
A. Bluesnarfing
B. Session hijacking
C. MAC spoofing
D. VLAN hopping
E. Man-in the middle
E
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the
three servers. Which of the following should the network team implement to fulfil the request?
A. Proxy server
B. UTM appliance
C. Content filter
D. Load balancer
D
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan
and fax files from their computers Which of the following should the technician update to allow this functionality?
A. Device software
B. Printer drivers
C. Printer firmware
D. NIC drivers
C
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A. Time division multiplexing
B. Analog circuit switching
C. CSMA/CD
D. Time division spread spectrum
A
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of
the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages.
Which of the following should the CIO complete?
A. Disaster recovery plan
B. Business continuity plan
C. Service level agreement
D. First responder training
B
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the
network?
A. Power levels
B. Overcapacity
C. Distance limitations
D. Channel overlap
A
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme:
Subnet 1: 192.168.1.0/26
Subnet 2: 192.160.1.65/26
Company b uses the following scheme:
Subnet 1: 192.168.1.50/28
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to
connect these networks?
A. DMZ
B. PAT
C. NAT
D. VLAN
C
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
A. Routing loop
B. Routing table
C. Route redistribution
D. Dynamic routes
B
Which of the following is used to classify network data for the purpose of providing QoS?
A. STP
B. VLANs
C. SIP
D. DSCP
D
A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the
appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?
A. Tone generator
B. Multimeter
C. OTDR
D. Loopback adapter
A
A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address
on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?
A. The WAP antenna is damaged
B. The WAP transmitter light is dim
C. The terminal emulation software is misconfigured
D. The LWAPP image is installed on the WAP
C
A network engineer is designing a new network for a remote site, The remote site consists of ten desktop computers, ten VoIP phones, and two network printers.
In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers.
Which of the following represents the BEST configuration for the remote site?
A. One router connected to one 24-port switch configured with three VLANS: one for the manager’s computers and printer, one for the other computers and
printer, and one for the VoIP phones
B. Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager’s desktop computers, VoIP
phones, and printer
C. One router connected to one 12-port switch configured for the manager’s computers, phones, and printer, and one 12-port switch configured for the other
computers, VoIP phones, and printer
D. One router connected to one 24-port switch configured with two VLANS: one for the manager’s computers, VoIP phones, and printer, and one for the other
computers, VoIP phones, and printer
A
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which
of the following is the number of collision domain that exist?
A. 3
B. 12
C. 13
D. 14
E. 15
D
Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services?
(Choose two.)
A. VPN concentrator
B. Proxy server
C. Wireless controller
D. RADIUS server
E. Multilayer switch
CD
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s
computer. This type of attack is an example of:
A. ARP cache poisoning
B. IP spoofing
C. amplified DNS attack
D. evil twin
A
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following
indicates the correct IP address range?
A. 172.16.80.0-172.16.85.254
B. 172.16.80.0-172.16.88.255
C. 172.16.80.1-172.16.87.254
D. 172.16.80.1 -172.16.85.255
C
Which of the following should a technician investigate when using a network baseline to troubleshoot?
A. Tracing a network wire connectivity issue from the datacenter to a host.
B. Determining if the server performance is degraded.
C. Changes that have been made to the network configuration.
D. Location of networking equipment in a rack.
B?
A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the
technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and
the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?
A. Swap the fiber pairs in one of the SFPs
B. Replace the jumpers with single-mode fiber
C. Set the correct MTU on the new interface
D. Install an optic that matches the fiber type
B
The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a
dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious
traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?
A. Session hijacking
B. Blocking
C. Throttling
D. Data usage limits
E. Bandwidth quotas
C
Which of the following BEST describes the differences between VLAN hopping and session hijacking?
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web
connection to execute commands
B. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection
C. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate
privileges
D. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation
A
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of
rules is the administrator implementing?
A. NAT
B. PAT
C. STP
D. SNAT
E. ARP
B
A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the
firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?
A. Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389
B. Allow the firewall to accept inbound traffic to ports 80,110,143, and 443
C. Set the firewall to operate in transparent mode
D. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123
B
A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and
often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
A. GSM
B. TDM
C. CDMA
D. PSTN
E. MIMO
A
Which of the following protocols do MOST MITM attacks utilize?
A. ARP
B. SIP
C. FTP
D. SCP
A
A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would
provide the information on TCP connections?
A. netstat
B. tracert
C. arp
D. ipconfig
E. route
A
A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The
network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician
refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
D
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
A. MAC address reservation
B. Static IP address
C. IP address exclusion
D. Custom DNS server entry
A
A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would
BEST ensure this requirement?.
A. High availability
B. Snapshots
C. NIC teaming
D. Cold site
A
A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying
connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the
wired network than the wireless network. Which of the following is the MOST likely explanation?
A. There is less local congestion on the wireless network
B. The testing server for the wired network was farther away
C. The firewall is configured to throttle traffic to specific websites
D. The wireless access points were misconfigured
B
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is
segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following
should the technician choose that all the equipment would support?
A. Telnet
B. SSL
C. SSH
D. IPSec
A
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands
to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the
following tools would allow the technician to view the handshake?
A. Packet analyzer
B. Port analyzer
C. SNMP traps
D. Spectrum analyzer
A
A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is
causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full
monitoring capabilities?
A. Remove SNMP polling and configure SNMP traps on each network device
B. Remove SNMP polling and implement snmpwalk on each network device
C. Upgrade SNMP to the latest version to mitigate vulnerabilities
D. Modify SNMP polling to poll only during business hours
A
A company finds that many desktops are being reported as missing or lost Which of the following would BEST assist in recovering these devices?
A. Asset tracking tags
B. Motion detectors
C. Security guards
D. Computer locks
D
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router
and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will
collect traffic. Which of the following should the technician install to BEST meet the goal?
A. Bridge
B. Crossover cable
C. Hub
D. Media converter
C
Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the
cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive
signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?
A. Bend radius exceeded
B. Fiber cable mismatch
C. Fiber type mismatch
D. Bad fiber switch
A
A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs
to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician
identify in the proposal?
A. laaS
B. PaaS
C. SaaS
D. MaaS
C
Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?
A. biometric scanners
B. door locks
C. video surveillance
D. motion detectors
B
A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling
other than what is already in place. Which of the following solutions should the technician install to meet these requirements?
A. DOCSIS modem
B. Wireless router
C. DSL modem
D. Access point
A