New deck Flashcards
Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?
A. UTP
B. Coaxial
C. Fiber
D. Cat 5
E. Twinaxial
Coaxial
A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remote location to connect rogue devices and gain access to the organization’s resources. Which of the following techniques would BEST address the concern?
A. Configure port security using MAC filtering.
B. Manually register the cameras on the switch address table.
C. Activate PoE+ on the active switchports.
D. Disable Neighbor Discovery Protocol on the switch.
Configure port security using MAC filtering.
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
A. Add another AP.
B. Disable the 2.4GHz radios.
C. Enable channel bonding.
D. Upgrade to WiFi 5.
Disable the 2.4GHz radios.
A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?
A. Gather information from the initial report.
B. Escalate the issue to a supervisor.
C. Implement a solution to resolve the issue.
D. Establish a theory of probable cause.
Establish a theory of probable cause.
A network technician reviews an entry on the syslog server and discovers the following message from a switch:
SPANNING-TREE Port 1/1 BLOCKED –
Which of the following describes the issue?
A. A loop was discovered, and the impact was mitigated.
B. An incorrectly pinned cable was disconnected.
C. The link-local address on the port is incorrect.
D. The port was shut down, and it needs to be reactivated.
A loop was discovered, and the impact was mitigated.
Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?
A. iSCSI
B. FCoE
C. Three-tiered network
D. Spine and leaf
E. Top-of-rack switching
Spine and leaf
A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?
A. A syslog server
B. Change management records
C. A rack diagram
D. The security log
A syslog server
Users are reporting intermittent WiFi connectivity in specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Choose two.)
A. Site survey
B. EIRP
C. AP placement
D. Captive portal
E. SSID assignment
F. AP association time
a and f
A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure?
A. Automate a continuous backup and restore process of the system’s state of the active gateway.
B. Use a static assignment of the gateway IP address on the network clients.
C. Configure DHCP relay and allow clients to receive a new IP setting.
D. Configure a shared VIP and deploy VRRP on the routers.
Selected Answer: D
Configure a shared VIP and deploy VRRP on the routers.
Which of the following options represents the participating computers in a network?
A. Nodes
B. CPUs
C. Servers
D. Clients
Clients
A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?
A. ipconfig
B. netstat
C. tracert
D. ping
tracert
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)
A. tcpdump
B. show config
C. hostname
D. show route
E. netstat
F. show ip arp
B. show config
show route
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources.
B. Upgrade security via the use of an NFV technology.
C. Connect two datacenters across the Internet.
D. Increase VPN availability by using a SDWAN technology.
ecure web access to internal corporate resources.
A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot, ping the router. Which of the following is MOST likely the cause of the incident?
A. Incorrect subnet mask
B. Incorrect DNS server
C. Incorrect IP class
D. Incorrect TCP port
Incorrect subnet mask
Which of the following is considered a physical security detection device?
A. Cameras
B. Biometric readers
C. Access control vestibules
D. Locking racks
Cameras
A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1
Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.
Which of the following is the MOST likely cause for the failure?
A. The network engineer is using the wrong protocol.
B. The network engineer does not have permission to configure the device.
C. SNMP has been secured with an ACL.
D. The switchport the engineer is trying to configure is down.
. The network engineer is using the wrong protocol.
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data
NetFlow aggregate data
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?
A. Clientless VPN
B. Virtual desktop
C. Virtual network computing
D. mGRE tunnel
Clientless VPN
An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?
A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps
Management information bases
Which of the following would be used when connecting devices that have different physical characteristics?
A. A proxy server
B. An industrial control system:
C. A load balancer
D. A media converter
A media converter
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
A. Hybrid
B. Elasticity
C. IaaS
D. Multitenancy
Multitenancy
A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?
A. MTBF
B. MTTR
C. RPO
D. RTO
MTBF
A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?
A. show interface
B. show config
C. show route
D. show arp
show interface
Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)
A. TIA-568-A – TIA-568-B
B. TIA-568-B – TIA-568-B
C. RJ11
D. RJ45
E. F-type
BD
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A. An increase in network security using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network
D. An improvement in network efficiency by increasing the useful packet payload
Selected Answer: B
A network expansion caused by an increase in the number of branch locations to the headquarters
A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?
A. A
B. AAAA
C. CNAME
D. PTR
AAAA
A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?
A. The configuration of the encryption protocol
B. Interference from other devices
C. Insufficient bandwidth capacity
D. Duplicate SSIDs
. Interference from other devices
A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
A. Perform a site survey.
B. Review the AP placement.
C. Monitor channel utilization.
D. Test cable attenuation.
Perform a site survey.
Which of the following is the primary function of the core layer of the three-tiered model?
A. Routing
B. Repeating
C. Bridging
D. Switching
Switching
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
A. AES encryption
B. Channel to the highest frequency within the band
C. TKIP encryption protocol
D. Dynamic selection of the frequency
. AES encryption
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information.
Which of the following actions should the network technician take to prevent data loss?
A. Disable the user account.
B. Lock the phone.
C. Turn off the service.
D. Execute remote wipe.
Execute remote wipe.
A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue?
A. Verifying if an encryption protocol mismatch exists.
B. Verifying if a captive portal is active for the WLAN.
C. Verifying the minimum RSSI for operation in the device’s documentation.
D. Verifying EIRP power settings on the access point.
Verifying if a captive portal is active for the WLAN
Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)
A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link.
C. The connection has duplexing configuration issues.
D. Halogen light fixtures are causing interference.
E. One of the technicians installed a loopback adapter.
F. The RSSI was not strong enough on the link.
A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link.
An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?
A. Spanning Tree Protocol
B. Open Shortest Path First
C. Port mirroring
D. An interior gateway protocol
Spanning Tree Protoco
A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation?
A. Latency
B. Jitter
C. Speed
D. Bandwidth
Speed
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
A. Elastic computing
B. Scalable networking
C. Hybrid deployment
D. Multitenant hosting
Elastic computing
Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem?
A. F-type
B. RJ45
C. LC
D. RJ11
F-type
A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?
A. Single-mode
B. Coaxial
C. Cat 6a
D. Twinaxial
Single-mode
An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?
A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing
Private VLANs
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot when a network is experiencing a number of CRC errors?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Layer 2