Practice Test A Flashcards
A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on
the firewall so the new email server can relay email?
A. 23
B. 25
C. 110
D. 143
B. 25
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
C. BYOD
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: SEE IMAGE
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to connect these networks?
A. DMZ
B. PAT
C. NAT
D. VLAN
C. NAT
A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In
addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers. Which of the following represents the BEST configuration for the remote site?
A. One router connected to one 24-port switch configured with three VLANS: one for the manager’s computers and printer, one for the other computers and printer,
and one for the VoIP phones
B. Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager’s desktop computers, VoIP
phones, and printer
C. One router connected to one 12-port switch configured for the manager’s computers, phones, and printer, and one 12-port switch configured for the other
computers, VoIP phones, and printer
D. One router connected to one 24-port switch configured with two VLANS: one for the manager’s computers, VoIP phones, and printer, and one for the other
computers, VoIP phones, and printer
A. One router connected to one 24-port switch configured with three VLANS: one for the manager’s computers and printer, one for the other computers and printer,
and one for the VoIP phones
A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the
appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?
A. Tone generator
B. Multimeter
C. OTDR
D. Loopback adapter
A. Tone generator
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the
following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?
A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site
A. Use a modem to console into the router
A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician
MOST likely to consider? (Choose three.)
A. SIP
B. NTP
C. H.323
D. SMB
E. ICMP
F. RTP
G. IPSec
H. RDP
A. SIP
C. H.323
F. RTP
A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A. STP
B. RTP
C. RIP
D. NTP
E. SIP
C. RIP
A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would BEST ensure this requirement?
A. High availability
B. Snapshots
C. NIC teaming
D. Cold site
A. High availability
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
A. 0
B. 1
C. 2
D. 6
E. 12
B. 1
A network engineer wants to segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
A. Layer 2 switch
B. Layer 3 switch
C. Bridge
D. Load balancer
B. Layer 3 switch
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be
changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?
A. Power levels
B. Overcapacity
C. Distance limitations
D. Channel overlap
A. Power levels
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router
and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will
collect traffic. Which of the following should the technician install to BEST meet the goal?
A. Bridge
B. Crossover cable
C. Hub
D. Media converter
C. Hub
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
A. 10.8.0.0/16
B. 10.8.0.0/19
C. 10.8.0.0/20
D. 10.0.0.0/24
A. 10.8.0.0/16
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?
A. Change management policy
B. Remote access policy
C. Acceptable use policy
D. Memorandum of understanding
A. Change management policy
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the technician use to reveal the location of the fault?
A. OTDR
B. Light meter
C. Tone generator
D. CSU/DSU
A. OTDR
A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The
technician discovers a critical step was missed. Which of the following would allow SSH to function properly?
A. Perform file hashing
B. Generate new keys
C. Update firmware
D. Change default credentials
B. Generate new keys
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
A. DLP
B. AUP
C. NDA
D. SLA
A. DLP
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of
the following is the number of collision domain that exist?
A. 3
B. 12
C. 13
D. 14
E. 15
D. 14
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption.
Which of the following should the technician use to secure the connection?
A. SSH in tunnel mode
B. RDP set to console connection
C. EAP-PEAP
D. SFTP
A. SSH in tunnel mode
A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP
addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?
A. Bridge
B. Access point
C. Router
D. Range extender
C. Router
A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify in
the proposal?
A. IaaS
B. PaaS
C. SaaS
D. MaaS
C. SaaS
Which of the following is the correct port number for NTP?
A. 25
B. 69
C. 123
D. 161
C. 123
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
A. SIP
B. BGP
C. LACP
D. LLDP
C. LACP
A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database
server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of
this device?
A. Content filtering and network analysis
B. Load balancing and providing high availability
C. Port sniffing and protocol analysis
D. Clustering and NIC teaming
B. Load balancing and providing high availability
A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular
connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician need
to complete the installation?
A. LC to SC
B. SC to ST
C. LC to ST
D. ST to ST
E. SC to SC
C. LC to ST
A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the
network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST
likely issue with the cable?
A. The cable is a crossover cable
B. The cable is rollover cable
C. The cable has bent pins
D. The cable is a Cat 5 cable
A. The cable is a crossover cable
A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?
A. /24
B. /25
C. /30
D. /32
C. /30
A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack
to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)
A. RG-9
B. DB-9
C. RJ-11
D. DB-25
E. RJ-45
F. BNC
B. DB-9
E. RJ-45
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP
addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?
A. DHCP relay
B. DHCP exclusion
C. DHCP option
D. DHCP reservation
D. DHCP reservation
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the equipment would support?
A. Telnet
B. SSL
C. SSH
D. IPSec
A. Telnet
Which of the following protocols do MOST MITM attacks utilize?
A. ARP
B. SIP
C. FTP
D. SCP
A. ARP
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause this condition?
A. VLAN mismatch
B. Duplex/Speed mismatch
C. Duplicate IP address
D. TX/RX reverse
B. Duplex/Speed mismatch
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management
software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?
A. Changing the management software’s default credentials
B. Disabling unnecessary services from the server and management software
C. Changing the management software’s default port
D. Replacing the management software’s self-signed certificate with a valid certificate
A. Changing the management software’s default credentials
A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician
use to determine which statistics are not in the normal range?
A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs
A. Baseline review
Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services?
(Choose two.)
A. VPN concentrator
B. Proxy server
C. Wireless controller
D. RADIUS server
E. Multilayer switch
C. Wireless controller
D. RADIUS server
A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output:
Which of the following changes should be made to allow all customers to access the company’s secure website?
A. Allow any any 10.5.0.10 443
B. Allow any any 12.73.15.5 443
C. Allow 10.5.0.10 443 any any
D. Allow 10.5.0.10 any 10.5.0.10 80
C. Allow 10.5.0.10 443 any any
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
A. Routing loop
B. Routing table
C. Route redistribution
D. Dynamic routes
B. Routing table
An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
- WLAN architecture supporting speeds in excess of 150 Mbps
- Clientless remote network access
- Port-based network access control
Which of the following solution sets properly addresses all of the identified requirements?
A. 802.11a, IPSec VPN, 802.1x
B. 802.11ac, MPLS, 802.3
C. 802.11b, PPTP, 802.1x
D. 802.11g, MS-CHAP, 802.16
E. 802.11n, SSL-VPN, 802.1x
E. 802.11n, SSL-VPN, 802.1x
Which of the following is used to classify network data for the purpose of providing QoS?
A. STP
B. VLANs
C. SIP
D. DSCP
D. DSCP
A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server
should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the
following IP addressing scheme on each interface:
Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?
A. Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the web server
B. Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server
C. Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the web server
D. Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the web server
B. Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan
and fax files from their computers. Which of the following should the technician update to allow this functionality?
A. Device software
B. Printer drivers
C. Printer firmware
D. NIC drivers
C. Printer firmware
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s
computer. This type of attack is an example of:
A. ARP cache poisoning
B. IP spoofing
C. amplified DNS attack
D. evil twin
A. ARP cache poisoning
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A. penetration testing
B. vulnerability scanning
C. reconnaissance
D. social engineering
A. penetration testing
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the
primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of
the following should the CIO complete?
A. Disaster recovery plan
B. Business continuity plan
C. Service level agreement
D. First responder training
B. Business continuity plan
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)
A. Point-to-multipoint
B. Bus
C. Point-to-point
D. Mesh
E. Peer-peer
F. Ring
C. Point-to-point
D. Mesh
A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing
high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring
capabilities?
A. Remove SNMP polling and configure SNMP traps on each network device
B. Remove SNMP polling and implement snmpwalk on each network device
C. Upgrade SNMP to the latest version to mitigate vulnerabilities
D. Modify SNMP polling to poll only during business hours
A. Remove SNMP polling and configure SNMP traps on each network device