Network +: N10-006 Flashcards
A technician has verified that a recent loss of network connectivity to multiple workstations is due
to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its
physical location within the wall?
A. Cable certifier
B. Multimeter
C. Cable tester
D. Toner probe
D. Toner probe
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO). A. OSPF B. VTP trunking C. Virtual PBX D. RADIUS E. 802.1x
D. RADIUS
E. 802.1x
Which of the following network infrastructure implementations would be used to support files being
transferred between Bluetooth-enabled smartphones?
A. PAN
B. LAN
C. WLAN
D. MAN
A. PAN
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO). A. RS-232 B. 56k modem C. Bluetooth D. Codec E. SIP
D. Codec
E. SIP
Which of the following helps prevent routing loops? A. Routing table B. Default gateway C. Route summarization D. Split horizon
D. Split horizon
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? A. Multilayer switch B. Access point C. Analog modem D. DOCSIS modem
C. Analog modem
An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of data
transfers over iSCSI switches?
A. The administrator should configure the switch ports to auto-negotiate the proper Ethernet
settings.
B. The administrator should configure each vSAN participant to have its own VLAN.
C. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.
D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.
A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? A. Star B. Ring C. Mesh D. Bus
A. Star
A technician is connecting a NAS device to an Ethernet network. Which of the following
technologies will be used to encapsulate the frames?
A. HTTPS
B. Fibre channel
C. iSCSI
D. MS-CHAP
C. iSCSI
The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting
caused by the disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub
A. Layer 3 switch
A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at
one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP
D. BGP
A training class is being held in an auditorium. Hard-wired connections are required for all laptops
that will be used. The network technician must add a switch to the room through which the laptops
will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?
A. DHCP
B. Split horizon
C. CIDR
D. TRUNK
D. TRUNK
Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at different
wavelengths?
A. DWDM
B. SONET
C. ADSL
D. LACP
A. DWDM
Which of the following WAN technologies is associated with high latency? A. T1 B. Satellite C. Cable D. OCx
B. Satellite
Which of the following provides accounting, authorization, and authentication via a centralized
privileged database, as well as, challenge/response and password encryption?
A. Multifactor authentication
B. ISAKMP
C. TACACS+
D. Network access control
C. TACACS+
Which of the following is used to define how much bandwidth can be used by various protocols on the network? A. Traffic shaping B. High availability C. Load balancing D. Fault tolerance
A. Traffic shaping
Which of the following network topologies has a central, single point of failure? A. Ring B. Star C. Hybrid D. Mesh
B. Star
A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST? A. Compatibility requirements B. Environment limitations C. Cable length D. Equipment limitations
B. Environment limitations
When convergence on a routed network occurs, which of the following is true?
A. All routers are using hop count as the metric
B. All routers have the same routing table
C. All routers learn the route to all connected networks
D. All routers use route summarization
C. All routers learn the route to all connected networks
A technician has been given a list of requirements for a LAN in an older building using CAT6
cabling. Which of the following environmental conditions should be considered when deciding
whether or not to use plenum-rated cables?
A. Workstation models
B. Window placement
C. Floor composition
D. Ceiling airflow condition
D. Ceiling airflow condition
A company has a new offering to provide access to their product from a central location rather
than clients internally hosting the product on the client network. The product contains sensitive
corporate information that should not be accessible from one client to another. This is an example
of which of the following?
A. Public SaaS
B. Private SaaS
C. Hybrid IaaS
D. Community IaaS
B. Private SaaS
Which of the following refers to a network that spans several buildings that are within walking distance of each other? A. CAN B. WAN C. PAN D. MAN
A. CAN
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9
connector. Which of the following protocols was MOST likely used on this cable?
A. RS-232
B. 802.3
C. ATM
D. Token ring
A. RS-232
Which of the following describes an IPv6 address of ::1? A. Broadcast B. Loopback C. Classless D. Multicast
B. Loopback
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
A. iSCSI SAN
B. FCoE SAN
C. NAS
D. USB flash drive
C. NAS
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive
the same address. Which of the following should be configured?
A. Leases
B. Helper addresses
C. Scopes
D. Reservations
D. Reservations
Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN? A. Access switch B. UC gateway C. UC server D. Edge router
B. UC gateway
A network technician receives the following alert from a network device:
“High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54”
Which of the following is being monitored to trigger the alarm?
A. Speed and duplex mismatch
B. Wireless channel utilization
C. Network device CPU
D. Network device memory
E. Interface link status
E. Interface link status
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? A. PoE B. Port bonding C. VLAN D. Trunking
A. PoE
Which of the following protocols must be implemented in order for two switches to share VLAN information? A. VTP B. MPLS C. STP D. PPTP
A. VTP
After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP
C. SIEM
A network technician is diligent about maintaining all system servers’ at the most current service
pack level available. After performing upgrades, users experience issues with server-based
applications. Which of the following should be used to prevent issues in the future?
A. Configure an automated patching server
B. Virtualize the servers and take daily snapshots
C. Configure a honeypot for application testing
D. Configure a test lab for updates
D. Configure a test lab for updates
A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit
has caused the company’s encryption to become unsecure. Which of the following would be
required to resolve the exploit?
A. Utilize a FTP service
B. Install recommended updates
C. Send all log files through SMTP
D. Configure the firewall to block port 22
B. Install recommended updates
The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain?
A. Vendor documentation
B. Recent backups
C. Physical IP address
D. Physical network diagram
B. Recent backups
A network technician has been tasked with designing a WLAN for a small office. One of the
requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?
A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a
B. 802.11ac
A company is experiencing accessibility issues reaching services on a cloud-based system. Which
of the following monitoring tools should be used to locate possible outages?
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer
A. Network analyzer
A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to
perform an assessment on the existing wireless network. The technician has recommended an
802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?
A. MU-MIMO
B. LWAPP
C. PoE
D. MIMO
D. MIMO
It has been determined by network operations that there is a severe bottleneck on the company’s
mesh topology network. The field technician has chosen to use log management and found that
one router is making routing decisions slower than others on the network. This is an example of
which of the following?
A. Network device power issues
B. Network device CPU issues
C. Storage area network issues
D. Delayed responses from RADIUS
B. Network device CPU issues
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab
equipment connected to her PC. The technician contacts the vendor and determines there is an
incompatibility with the latest IO drivers. Which of the following should the technician perform so
that Ann can get back to work as quickly as possible?
A. Reformat and install the compatible drivers.
B. Reset Ann’s equipment configuration from a backup.
C. Downgrade the PC to a working patch level.
D. Restore Ann’s PC to the last known good configuration.
E. Roll back the drivers to the previous version.
E. Roll back the drivers to the previous version.
A system administrator has been tasked to ensure that the software team is not affecting the
production software when developing enhancements. The software that is being updated is on a
very short SDLC and enhancements must be developed rapidly. These enhancements must be
approved before being deployed. Which of the following will mitigate production outages before
the enhancements are deployed?
A. Implement an environment to test the enhancements.
B. Implement ACLs that only allow management access to the enhancements.
C. Deploy an IPS on the production network.
D. Move the software team’s workstations to the DMZ.
A. Implement an environment to test the enhancements.
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop
to the new user, the administrator documents the new location, the user of the device and when
the device was reassigned. Which of the following BEST describes these actions?
A. Network map
B. Asset management
C. Change management
D. Baselines
B. Asset management
Company policies require that all network infrastructure devices send system level information to a
centralized server. Which of the following should be implemented to ensure the network
administrator can review device error information from one central location?
A. TACACS+ server
B. Single sign-on
C. SYSLOG server
D. Wi-Fi analyzer
C. SYSLOG server
A network technician has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be
configured on each network device to provide that information in a secure manner?
A. S/MIME
B. SYSLOG
C. PGP
D. SNMPv3
D. SNMPv3
Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
A. The VoIP phone would request a new phone number from the unified communications server.
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing
calls.
D. The VoIP phone would request a different configuration from the unified communications
server.
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
A company is deploying a new wireless network and requires 800Mbps network throughput. Which
of the following is the MINIMUM configuration that would meet this need?
A. 802.11ac with 2 spatial streams and an 80MHz bandwidth
B. 802.11ac with 3 spatial streams and a 20MHz bandwidth
C. 802.11ac with 3 spatial streams and a 40MHz bandwidth
D. 802.11ac with 4 spatial streams and a 160MHz bandwidth
A. 802.11ac with 2 spatial streams and an 80MHz bandwidth
A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
A. Regression test
B. Speed test
C. Baseline
D. Statement of work
C. Baseline
When two or more links need to pass traffic as if they were one physical link, which of the following
would be used to satisfy the requirement?
A. Port mirroring
B. 802.1w
C. LACP
D. VTP
C. LACP
A VLAN with a gateway offers no security without the addition of: A. An ACL. B. 802.1w. C. A RADIUS server. D. 802.1d.
A. An ACL.
Network segmentation provides which of the following benefits? A. Security through isolation B. Link aggregation C. Packet flooding through all ports D. High availability through redundancy
A. Security through isolation
A network technician must create a wireless link between two buildings in an office park utilizing
the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal
weight as it will be mounted on the outside of the building. Which of the following antenna types is
BEST suited for this solution?
A. Yagi
B. Omni-directional
C. Parabolic
D. Patch
A. Yagi
The administrator’s network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which
of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
A. Set the loopback address
B. Change the IP address
C. Change the slash notation
D. Change duplex to full
D. Change duplex to full
An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
A. Ensure patches are deployed
B. Install an IDS on the network
C. Configure the firewall to block traffic on port 443
D. Implement a VPN for employees
A. Ensure patches are deployed
A system administrator wants to update a web-based application to the latest version. Which of
the following procedures should the system administrator perform FIRST?
A. Remove all user accounts on the server
B. Isolate the server logically on the network
C. Block all HTTP traffic to the server
D. Install the software in a test environment
D. Install the software in a test environment
Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The administrator checks and confirms that the switch can be accessed using the
console, but currently only one student can log in at a time. Which of the following should be done
to correct this issue?
A. Increase installed memory and install a larger flash module.
B. Increase the number of VLANs configured on the switch.
C. Decrease the number of VLANs configured on the switch.
D. Increase the number of virtual terminals available.
D. Increase the number of virtual terminals available.
A technician needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if
the threat is network based?
A. A cloud-based antivirus system with a heuristic and signature based engine
B. A network based firewall which blocks all inbound communication
C. A host-based firewall which allows all outbound communication
D. A HIDS to inspect both inbound and outbound network communication
C. A host-based firewall which allows all outbound communication
Which of the following physical security controls prevents an attacker from gaining access to a network closet? A. CCTVs B. Proximity readers C. Motion sensors D. IP cameras
B. Proximity readers
A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP
D. Rogue AP
A technician is setting up a computer lab. Computers on the same subnet need to communicate
with each other using peer to peer communication. Which of the following would the technician
MOST likely configure?
A. Hardware firewall
B. Proxy server
C. Software firewall
D. GRE tunneling
C. Software firewall
Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO). A. Redundancy B. Implementing acceptable use policy C. Offsite backups D. Uninterruptable power supplies E. Vulnerability scanning
A. Redundancy
C. Offsite backups
A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?
A. DWDM
B. MIMO
C. TEMPEST
D. DOCSIS
C. TEMPEST