New deck Flashcards

1
Q

Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?

A. UTP
B. Coaxial
C. Fiber
D. Cat 5
E. Twinaxial

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remote location to connect rogue devices and gain access to the organization’s resources. Which of the following techniques would BEST address the concern?

A. Configure port security using MAC filtering.
B. Manually register the cameras on the switch address table.
C. Activate PoE+ on the active switchports.
D. Disable Neighbor Discovery Protocol on the switch.

A

Configure port security using MAC filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?

A. Add another AP.
B. Disable the 2.4GHz radios.
C. Enable channel bonding.
D. Upgrade to WiFi 5.

A

Disable the 2.4GHz radios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?

A. Gather information from the initial report.
B. Escalate the issue to a supervisor.
C. Implement a solution to resolve the issue.
D. Establish a theory of probable cause.

A

Establish a theory of probable cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network technician reviews an entry on the syslog server and discovers the following message from a switch:

SPANNING-TREE Port 1/1 BLOCKED –
Which of the following describes the issue?

A. A loop was discovered, and the impact was mitigated.
B. An incorrectly pinned cable was disconnected.
C. The link-local address on the port is incorrect.
D. The port was shut down, and it needs to be reactivated.

A

A loop was discovered, and the impact was mitigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?

A. iSCSI
B. FCoE
C. Three-tiered network
D. Spine and leaf
E. Top-of-rack switching

A

Spine and leaf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?

A. A syslog server
B. Change management records
C. A rack diagram
D. The security log

A

A syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users are reporting intermittent WiFi connectivity in specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Choose two.)

A. Site survey
B. EIRP
C. AP placement
D. Captive portal
E. SSID assignment
F. AP association time

A

a and f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure?

A. Automate a continuous backup and restore process of the system’s state of the active gateway.
B. Use a static assignment of the gateway IP address on the network clients.
C. Configure DHCP relay and allow clients to receive a new IP setting.
D. Configure a shared VIP and deploy VRRP on the routers.

Selected Answer: D

A

Configure a shared VIP and deploy VRRP on the routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following options represents the participating computers in a network?

A. Nodes
B. CPUs
C. Servers
D. Clients

A

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?

A. ipconfig
B. netstat
C. tracert
D. ping

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)

A. tcpdump
B. show config
C. hostname
D. show route
E. netstat
F. show ip arp

A

B. show config
show route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?

A. Secure web access to internal corporate resources.
B. Upgrade security via the use of an NFV technology.
C. Connect two datacenters across the Internet.
D. Increase VPN availability by using a SDWAN technology.

A

ecure web access to internal corporate resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot, ping the router. Which of the following is MOST likely the cause of the incident?

A. Incorrect subnet mask
B. Incorrect DNS server
C. Incorrect IP class
D. Incorrect TCP port

A

Incorrect subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is considered a physical security detection device?

A. Cameras
B. Biometric readers
C. Access control vestibules
D. Locking racks

A

Cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1
Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.
Which of the following is the MOST likely cause for the failure?

A. The network engineer is using the wrong protocol.
B. The network engineer does not have permission to configure the device.
C. SNMP has been secured with an ACL.
D. The switchport the engineer is trying to configure is down.

A

. The network engineer is using the wrong protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data

A

NetFlow aggregate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?

A. Clientless VPN
B. Virtual desktop
C. Virtual network computing
D. mGRE tunnel

A

Clientless VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?

A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps

A

Management information bases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following would be used when connecting devices that have different physical characteristics?

A. A proxy server
B. An industrial control system:
C. A load balancer
D. A media converter

A

A media converter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following BEST describes hosting several businesses on the same physical infrastructure?

A. Hybrid
B. Elasticity
C. IaaS
D. Multitenancy

A

Multitenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?

A. MTBF
B. MTTR
C. RPO
D. RTO

A

MTBF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?

A. show interface
B. show config
C. show route
D. show arp

A

show interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)

A. TIA-568-A – TIA-568-B
B. TIA-568-B – TIA-568-B
C. RJ11
D. RJ45
E. F-type

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?

A. An increase in network security using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network
D. An improvement in network efficiency by increasing the useful packet payload

Selected Answer: B

A

A network expansion caused by an increase in the number of branch locations to the headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?

A. A
B. AAAA
C. CNAME
D. PTR

A

AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?

A. The configuration of the encryption protocol
B. Interference from other devices
C. Insufficient bandwidth capacity
D. Duplicate SSIDs

A

. Interference from other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?

A. Perform a site survey.
B. Review the AP placement.
C. Monitor channel utilization.
D. Test cable attenuation.

A

Perform a site survey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the primary function of the core layer of the three-tiered model?

A. Routing
B. Repeating
C. Bridging
D. Switching

A

Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?

A. AES encryption
B. Channel to the highest frequency within the band
C. TKIP encryption protocol
D. Dynamic selection of the frequency

A

. AES encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information.
Which of the following actions should the network technician take to prevent data loss?

A. Disable the user account.
B. Lock the phone.
C. Turn off the service.
D. Execute remote wipe.

A

Execute remote wipe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue?

A. Verifying if an encryption protocol mismatch exists.
B. Verifying if a captive portal is active for the WLAN.
C. Verifying the minimum RSSI for operation in the device’s documentation.
D. Verifying EIRP power settings on the access point.

A

Verifying if a captive portal is active for the WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)

A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link.
C. The connection has duplexing configuration issues.
D. Halogen light fixtures are causing interference.
E. One of the technicians installed a loopback adapter.
F. The RSSI was not strong enough on the link.

A

A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?

A. Spanning Tree Protocol
B. Open Shortest Path First
C. Port mirroring
D. An interior gateway protocol

A

Spanning Tree Protoco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation?

A. Latency
B. Jitter
C. Speed
D. Bandwidth

A

Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?

A. Elastic computing
B. Scalable networking
C. Hybrid deployment
D. Multitenant hosting

A

Elastic computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem?

A. F-type
B. RJ45
C. LC
D. RJ11

A

F-type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?

A. Single-mode
B. Coaxial
C. Cat 6a
D. Twinaxial

A

Single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?

A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing

A

Private VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot when a network is experiencing a number of CRC errors?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern’s work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?

A. Insufficient power at the antennas
B. PoE and UTP incompatibility
C. Electromagnetic interference
D. Wrong cable pinout

A

Electromagnetic interference

34
Q

A security engineer is installing a new IDS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?

A. Install a network tap for the IDS.
B. Configure ACLs to route traffic to the IDS.
C. Install an additional NIC into the IDS.
D. Install a loopback adapter for the IDS.
E. Add an additional route on the router for the IDS.

A

Install a network tap for the IDS.

35
Q

Which of the following physical security methods is the MOST effective to prevent tailgating?

A. Biometrics in an access control vestibule
B. IP cameras with motion detection
C. Smart lockers with tamper protection
D. Badge readers plus a PIN pad

A

Biometrics in an access control vestibule

36
Q

A network engineer needs to create a subnet that has the capacity for five VLANs, with the following number of clients to be allowed on each:

Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?

A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24

A

10.0.0.0/22

37
Q

Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?

A. The switch was configured with port security.
B. Newly added machines are running into DHCP conflicts.
C. The IPS was not configured to recognize the new users.
D. Recently added users were assigned to the wrong VLAN

A

Recently added users were assigned to the wrong VLAN

38
Q

A company’s primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?

A. Diverse paths
B. Load balancing
C. Multipathing
D. Virtual Router Redundancy Protocol

A

Diverse paths

39
Q

Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:

A. an acceptable use policy.
B. a memorandum of understanding.
C. data loss prevention.
D. a non-disclosure agreement.

A

data loss prevention.

40
Q

A client utilizes mobile tablets to view high-resolution images and videos via Wi-Fi within a corporate office building. The previous administrator installed multiple high-density APs with Wi-Fi 5, providing maximum coverage, but the measured performance is still below expected levels. Which of the following would provide the BEST solution?

A. Channel bonding
B. EIRP power settings
C. Antenna polarization
D. A directional antenna

A

Channel bonding

41
Q

Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?

A. Data link
B. Network
C. Transport
D. Session

A

Data link

42
Q

A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:

A. a divide-and-conquer approach.
B. a bottom-up approach.
C. a top-to-bottom approach.
D. implementing a solution.

A

B. a bottom-up approach.

43
Q

Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices?

A. Twisted cable with a minimum Cat 5e certification
B. Multimode fiber with an SC connector
C. Twinaxial cabling using an F-type connector
D. Cable termination using TIA/EIA-568-B

A

Twisted cable with a minimum Cat 5e certification

44
Q

Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?

A. SDWAN
B. MAN
C. PAN
D. MPLS

A

SDWAN

45
Q

A network administrator installed a new data and VoIP network. Users are now experiencing poor call quality when making calls. Which of the following should the administrator do to increase VoIP performance?

A. Configure a voice VLAN.
B. Configure LACP on all VoIP phones.
C. Configure PoE on the network.
D. Configure jumbo frames on the network.

A

Configure a voice VLAN.

46
Q

A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?

A. 80.87.78.0 – 80.87.78.14
B. 80.87.78.0 – 80.87.78.110
C. 80.87.78.1 – 80.87.78.62
D. 80.87.78.1 – 80.87.78.158

A

C. 80.87.78.1 – 80.87.78.62

47
Q

A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?

A. Implement CDMA.
B. Change from omni to directional.
C. Change the SSID.
D. Change the frequency.

A

Change the frequency.

48
Q

A network administrator is investigating a network event that is causing all communication to stop. The network administrator is unable to use SSH to connect to the switch but is able to gain access using the serial console port. While monitoring port statistics, the administrator sees the following:

Which of the following is MOST likely causing the network outage?

A. Duplicate IP address
B. High collisions
C. Asynchronous route
D. Switch loop

A

High collisions

48
Q

Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Choose two.)

A. SNMPv3
B. SSH
C. Telnet
D. IPSec
E. ESP
F. Syslog

A

SNMPv3
SSH

49
Q

An administrator wants to increase the availability of a server that is connected to the office network. Which of the following allows for multiple NICs to share a single IP address and offers maximum performance while providing fault tolerance in the event of a NIC failure?

A. Multipathing
B. Spanning Tree Protocol
C. First Hop Redundancy Protocol
D. Elasticity

A

Multipathing

50
Q

A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?

A. Network performance baselines
B. VLAN assignments
C. Routing table
D. Device configuration review

A

Device configuration review

51
Q

Which of the following is a valid and cost-effective solution to connect a fiber cable into a network switch without available SFP ports?

A. Use a media converter and a UTP cable
B. Install an additional transceiver module and use GBICs
C. Change the type of connector from SC to F-type
D. Use a loopback adapter to make the connection

A

se a media converter and a UTP cable

51
Q

A network device needs to discover a server that can provide it with an IPv4 address. Which of the following does the device need to send the request to?

A. Default gateway
B. Broadcast address
C. Unicast address
D. Link local address

A

Broadcast address

52
Q

Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor’s data center?

A. DaaS
B. IaaS
C. PaaS
D. SaaS

A

iAAS

53
Q

A help desk engineer needs to configure two servers to have the same public IP addresses. Which of the following technologies should the engineer use?

A. NAT
B. VIP
C. DNS caching
D. RFC 1918
E. SDWAN

A

NAT–public IP addresses

54
Q

A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation. Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt?

A. The ARP table
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switch

A

The firewall logs

55
Q

Which of the following record types would be used to define where SIP is found?

A. SRV
B. CNAME
C. A
D. MX

A

A. SRV

SRV (Service) record is used to define the location (hostname and port number) of servers for specified services. SIP (Session Initiation Protocol) is a signaling protocol used for controlling communication sessions such as voice and video calls over IP networks. Therefore, SRV record type is used to define where SIP is found by specifying the hostname and port number of the server that provides the SIP service.

55
Q

A technician is checking network devices to look for opportunities to improve security. Which of the following tools would BEST accomplish this task?

A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner

A

Nmap

56
Q

A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?

A. Site-to-site
B. Secure Shell
C. In-band management
D. Remote desktop connection

A

Site-to-site

57
Q

An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, the administrator sees the following entries:

Which of the following firewall rules is MOST likely causing the issue?

A. Rule 1
B. Rule 2
C. Rule 3
D. Rule 4

A

Rule 2

58
Q

A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?

A. Releasing and renewing the PC’s IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache

A

Replacing the patch cable

59
Q

An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out. Which of the following terminations should the technician use when running a cable from the ISP’s port to the front desk?

A. F-type connector
B. TIA/EIA-568-B
C. LC
D. SC

A

TIA/EIA-568-B

60
Q

An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics in the switch’s CLI, the administrator discovers the uplink is at 100% utilization. However, the administrator is unsure how to identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?

A. SNMP
B. Traps
C. Syslog
D. NetFlow

A

NetFlow

61
Q

Two new network switches located in different buildings are connected together with single-mode fiber. However, no link exists between the two switches. Which of the following steps should the technician perform FIRST to troubleshoot the issue?

A. Reverse TX/RX on the fiber patch cord at one building.
B. Replace the fiber patch cords in both buildings.
C. Clean the fiber patch cord connectors in both buildings.
D. Connect the fiber patch cord to an OTDR at one building.

A

Connect the fiber patch cord to an OTDR at one building.

62
Q

Which of the following OSI model layers would allow a user to access and download files from a remote computer?

A. Session
B. Presentation
C. Network
D. Application

A

Application

63
Q

An engineer is troubleshooting poor performance on the network that occurs during work hours. Which of the following should the engineer do to improve performance?

A. Replace the patch cables.
B. Create link aggregation.
C. Create separation rules on the firewall.
D. Create subinterfaces on the existing port.

A

Create link aggregation.

64
Q

Users are reporting poor wireless performance in some areas of an industrial plant. The wireless controller is measuring a low EIRP value compared to the recommendations noted on the most recent site survey. Which of the following should be verified or replaced for the EIRP value to meet the site survey’s specifications? (Choose two.)

A. AP transmit power
B. Channel utilization
C. Signal loss
D. Update ARP tables
E. Antenna gain
F. AP association time

A

AP transmit power
Antenna gain

64
Q

A company has multiple offices around the world. The computer rooms in some office locations are too warm. Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put in place to automate temperature readings with internal resources?

A. Implement NetFlow.
B. Hire a programmer to write a script to perform the checks.
C. Utilize ping to measure the response.
D. Use SNMP with an existing collector server.

A

Use SNMP with an existing collector server.

65
Q

Which of the following architectures reduces network latency by enforcing a limit on the number of switching devices on the frame’s path between any internal hosts?

A. Spine and leaf
B. Software-defined network
C. Three-tiered
D. Collapsed core

A

Spine and leaf

66
Q

A technician is investigating an issue with connectivity at customer’s location. The technician confirms that users can access resources locally but not over the internet. The technician theorizes that the local router has failed and investigates further. The technician’s testing results show that the router is functional; however, users still are unable to reach resources on the internet. Which of the following describes what the technician should do NEXT?

A. Document the lessons learned.
B. Escalate the issue.
C. Identify the symptoms.
D. Question users for additional information.

A

Escalate the issue.

67
Q

On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator check after successfully testing the cable that was wired for TIA/EIA-568A on both ends?

A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches

A

. If MDIX is enabled on the new switch

68
Q

Which of the following devices and encapsulations are found at the data link layer? (Choose two.)

A. Session
B. Frame
C. Firewall
D. Switch
E. Packet
F. Router

A

Frame
Switch

69
Q

A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?

A. Packet capture
B. iPerf
C. SIEM log review
D. Internet speed test

A

iPerf

69
Q

An IT technician is working on a support ticket regarding an unreachable website. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?

A. ipconfig
B. tracert
C. arp
D. netstat

A

tracert

70
Q

A network technician needs to select an AP that will support at least 1.3Gbps and 5GHz only. Which of the following wireless standards must the AP support to meet the requirements?

A. B
B. AC
C. AX
D. N
E. G

A

AC

71
Q

An ISP configured an internet connection to provide 20Mbps, but actual data rates are occurring at 10Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?

A. Throughput
B. Latency
C. Bandwidth
D. Jitter

A

Throughput

72
Q

An application team is deploying a new application. The application team would like the network team to monitor network performance and create alerts if fluctuations in the round-trip time occur for that traffic. Which of the following should the network team monitor to meet this requirement?

A. Bandwidth
B. Latency
C. Loss
D. Cyclic redundancy check

A

Latency

73
Q

Which of the following default ports is MOST likely used to send availability and environmental messages about specific devices across the network?

A. 23
B. 53
C. 389
D. 514
E. 3306

A

514

sYSLOG

73
Q

A network administrator is configuring Neighbor Discovery Protocol in an IPv6 network to ensure an attacker cannot spoof link-layer addresses of network devices. Which of the following should the administrator implement?

A. MAC filtering
B. Router Advertisement Guard
C. Port security
D. DNSSEC

A

Router Advertisement Guard

74
Q

Which of the following would be increased by adding encryption to data communication across the network?

A. Availability
B. Integrity
C. Accountability
D. Confidentiality

A

Confidentiality

75
Q

A network administrator is troubleshooting a client’s device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which of the following tools would be the BEST option for the network administrator to use to further troubleshoot?

A. Tone generator
B. Multimeter
C. Optical time-domain reflectometer
D. Cable tester

A

Cable tester

76
Q

Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet?

A. Allow connections only to an internal proxy server.
B. Deploy an IDS system and place it in line with the traffic.
C. Create a screened network and move the devices to it.
D. Use a host-based network firewall on each device.

A

Allow connections only to an internal proxy server.

77
Q

A technician thinks one of the router ports is flapping. Which of the following available resources should the technician use in order to determine if the router is flapping?

A. Audit logs
B. NetFlow
C. Syslog
D. Traffic logs

A

Syslog

78
Q

Which of the following layers is where TCP/IP port numbers identify which network application is receiving the packet and where it is applied?

A. 3
B. 4
C. 5
D. 6
E. 7

A

4

79
Q

Which of the following situations would require an engineer to configure subinterfaces?

A. In a router-on-a-stick deployment with multiple VLANs
B. In order to enable inter-VLAN routing on a multilayer switch
C. When configuring VLAN trunk links between switches
D. After connecting a router that does not support 802.1Q VLAN tags

A

In a router-on-a-stick deployment with multiple VLANs

80
Q

An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?

A. STP
B. 802.1Q
C. Duplex
D. LACP

A

LACP

81
Q

A customer cannot reach a web application on a local server. The network consultant suspects that the server is not accepting the HTTPS connection. Which of the following commands should the consultant run on the server to determine what is occurring?

A. route
B. arp
C. nmap
D. netstat

A

netstat

82
Q

A technician monitors a switch interface and notices it is not forwarding frames on a trunked port. However, the cable and interfaces are in working order. Which of the following is MOST likely the cause of the issue?

A. STP policy
B. Flow control
C. 802.1Q configuration
D. Frame size

A

802.1Q configuration

82
Q

A network administrator is configuring a static DSL connection on the perimeter router to use a backup route to the fiber connection using OSPF routing. The administrator notices all traffic is going over the DSL connection and both links are working. Which of the following should the administrator do to adjust the routing settings for the fiber connection to be used by the router?

A. Add the DSL connection to the neighbor table for OSPF protocol
B. Change the routing protocol to EIGRP for the fiber connection
C. Increase the administrative distance of the DSL connection
D. Create a separate VLAN for the DSL connection

A

Increase the administrative distance of the DSL connection

82
Q

A wireless network technician is receiving reports from some users who are unable to see both of the corporate SSIDs on their mobile devices. A site survey was recently commissioned, and the results verified acceptable RSSI from both APs in all user areas. The APs support modern wireless standards and are all broadcasting their SSIDs. The following table shows some of the current AP settings:

Which of the following changes would result in all of the user devices being capable of seeing both corporate SSIDs?

A. Implementing the WPA2 Enterprise authentication standard
B. Implementing omnidirectional antennas for both APs
C. Configuring the highest power settings for both APs
D. Configuring both APs to use the 802.11ac wireless standard

A

Configuring both APs to use the 802.11ac wireless standard

83
Q

A bank installed a new smart TV to stream online video services, but the smart TV was not able to connect to the branch Wi-Fi. The next day, a technician was able to connect the TV to the Wi-Fi, but a bank laptop lost network access at the same time. Which of the following is the MOST likely cause?

A. DHCP scope exhaustion
B. AP configuration reset
C. Hidden SSID
D. Channel overlap

A

. DHCP scope exhaustion

84
Q

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the MOST likely reason the users cannot connect to the network?

A. Mixed UTP and STP cables are being used.
B. The patch cables are not plenum rated.
C. The cable distance is exceeded.
D. An incorrect pinout on the patch cable is being used.

A

An incorrect pinout on the patch cable is being used.