Network Plus Exam Flashcards
A UTM ( unified threat management ) is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPsec ( generic routing encapsulation & internet protocol security ) tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. Which of the following steps would MOST likely correct the issue.
C. Enable stateful inspection on the UTM ( unified threat management )
A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10 Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display and the technician cannot see light emitting from the core switch, Which of the following solutions is MOST likely to resolve the problem
B. Replace the jumpers with single-mode fiber
A network technician has implemented ACL’s to limit access to cloud based storage. Which of the following security mechanisms has the technician enforced?
C. WAF ( web application firewall )
A network technician receives a call from a user in the accounting department stating that internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the IT network. Which of the following is MOST likely the cause.
A. Incorrect default gateway
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
B. PAT ( port address translation )
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID ( service set identifier ) and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements ?
A. install additional WAP’s ( wireless access points)
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the most likely cause of the failure.
B. corrupt operating system
A company has hundreds of nodes on a single subnet and has decided to implement VLAN’s. Which of the following BEST describes the benefit of this approach?
A. It segments broadcast domains in the network infrastructure.
A company has completed construction of a new datacenter and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved.
A. rack diagrams
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
A. MAC ( media access control ) address reservation
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a layer 2 access control the technician should implement ?
D. Port security
A network engineer is configuring wireless access for guest at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network.
A. Guests should log into a separate wireless network using a captive portal.
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across all three servers. Which of the following should the network team implement to fulfill the request?
D. Load balancer.
A network technician is deploying mobile phones for a company sales staff, Salespeople frequently travel nationally and internationally to meet with clients and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements ?
A. GSM ( global system for mobile communication )
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?
C. 172.16.80.1 -172.16.87.254
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?
A. site survey
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT ?
A. Test the possible solution
A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?
B. enable DHCP ( dynamic host configuration protocol ) guard to detect rogue servers.
Which of the following provides the ability to deploy consistent access point configurations from a central location ?
A. wireless controller
A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
B. ac
A network administrator configures a router with the following IP address information. Gigabit Ethernet 1 interface 10.10.01/24 and serial 0 interface 10.10.0253/30 Clients are connected to a switch on the gigabit Ethernet interface: the ISP is connected to the serial 0 interface. When the router configuration is complete and client devices are reconfigured all clients report that they are unable to connect to the internet. Which of the following is the MOST likely reason ?
C. the router was configured with an incorrect subnet mask.
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST ? ( choose 2 )
A. network scan
C. tracert.
Users are reporting internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
Which of the following security mechanisms dynamically assigns a layer 2 address and restricts traffic only to that layer 2 address.
A. sticky MAC ( media access control )