questions 1 - 100 Flashcards
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following
options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.
B. Add a layer 3 switch and create a VLAN.
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would
BEST handle the rerouting caused by the disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub
A. Layer 3 switch
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured? A. Leases B. Helper addresses C. Scopes D. Reservations
D. Reservations
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE). A. Default gateway B. Subnet mask C. Reservations D. TFTP server E. Lease expiration time of 1 day F. DNS servers G. Bootp
A. Default gateway
B. Subnet mask
F. DNS servers
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the
site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue
while causing internal users to route to the website using an internal address?
A. Configure NAT on the firewall
B. Implement a split horizon DNS
C. Place the server in the DMZ
D. Adjust the proper internal ACL
B. Implement a split horizon DNS
When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of
the following was MOST likely installed that required an MX record to function properly?
A. Load balancer
B. FTP server
C. Firewall DMZ
D. Mail server
D. Mail server
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic? A. BGP B. OSPF C. IS-IS D. MPLS
D. MPLS
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? A. Multilayer switch B. Access point C. Analog modem D. DOCSIS modem
C. Analog modem
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable? A. RS-232 B. 802.3 C. ATM D. Token ring
A. RS-232
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility? A. 66 block B. BNC C. F-connector D. RJ-11
B. BNC
An F-connector is used on which of the following types of cabling? A. CAT3 B. Single mode fiber C. CAT5 D. RG6
D. RG6
A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO). A. 1000Base-LR B. 1000Base-SR C. 1000Base-T D. 10GBase-LR E. 10GBase-SR F. 10GBase-T
B. 1000Base-SR
E. 10GBase-SR
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on
the network to avoid congestions. Which of the following topologies would the engineer implement?
A. Star
B. Bus
C. Ring
D. Mesh
C. Ring
A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? A. Star B. Ring C. Mesh D. Bus
A. Star
Which of the following network topologies has a central, single point of failure? A. Ring B. Star C. Hybrid D. Mesh
B. Star
Which of the following refers to a network that spans several buildings that are within walking distance of each other? A. CAN B. WAN C. PAN D. MAN
A. CAN
Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones? A. PAN B. LAN C. WLAN D. MAN
A. PAN
Which of the following describes an IPv6 address of ::1? A. Broadcast B. Loopback C. Classless D. Multicast
B. Loopback
Which of the following is an example of an IPv4 address? A. 192:168:1:55 B. 192.168.1.254 C. 00:AB:FA:B1:07:34 D. ::1
B. 192.168.1.254
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? A. 10.0.0.1 B. 127.0.0.1 C. 172.16.1.1 D. 192.168.1.1
B. 127.0.0.1
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the
following subnet masks should Joe use for this subnet?
A. /24
B. /32
C. /28
D. /29
E. /30
E. /30
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types? A. APIPA B. MAC C. Static D. Public
A. APIPA
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the
event that a WAN circuit at one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP
D. BGP
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames? A. HTTPS B. Fibre channel C. iSCSI D. MS-CHAP
C. iSCSI
Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented
to ensure the network administrator can review device error information from one central location?
A. TACACS+ server
B. Single sign-on
C. SYSLOG server
D. Wi-Fi analyzer
C. SYSLOG server
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used? A. Event log B. Syslog C. SIEM D. SNMP
C. SIEM
A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison? A. Regression test B. Speed test C. Baseline D. Statement of work
C. Baseline
It has been determined by network operations that there is a severe bottleneck on the company’s mesh topology network. The field technician has chosen to use log
management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
A. Network device power issues
B. Network device CPU issues
C. Storage area network issues
D. Delayed responses from RADIUS
B. Network device CPU issues
A network technician receives the following alert from a network device:
“High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54”
Which of the following is being monitored to trigger the alarm?
A. Speed and duplex mismatch
B. Wireless channel utilization
C. Network device CPU
D. Network device memory
E. Interface link status
E. Interface link status
The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but
queues up before sending. Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
A. Set the loopback address
B. Change the IP address
C. Change the slash notation
D. Change duplex to full
D. Change duplex to full
The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain? A. Vendor documentation B. Recent backups C. Physical IP address D. Physical network diagram
B. Recent backups
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location,
the user of the device and when the device was reassigned. Which of the following BEST describes these actions?
A. Network map
B. Asset management
C. Change management
D. Baselines
B. Asset management
A network technician is diligent about maintaining all system servers’ at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?
A. Configure an automated patching server
B. Virtualize the servers and take daily snapshots
C. Configure a honeypot for application testing
D. Configure a test lab for updates
D. Configure a test lab for updates
A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software
that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed.
Which of the following will mitigate production outages before the enhancements are deployed?
A. Implement an environment to test the enhancements.
B. Implement ACLs that only allow management access to the enhancements.
C. Deploy an IPS on the production network.
D. Move the software team’s workstations to the DMZ.
A. Implement an environment to test the enhancements.
A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform
FIRST?
A. Remove all user accounts on the server
B. Isolate the server logically on the network
C. Block all HTTP traffic to the server
D. Install the software in a test environment
D. Install the software in a test environment
Network segmentation provides which of the following benefits? A. Security through isolation B. Link aggregation C. Packet flooding through all ports D. High availability through redundancy
A. Security through isolation
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor
and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly
as possible?
A. Reformat and install the compatible drivers.
B. Reset Ann’s equipment configuration from a backup.
C. Downgrade the PC to a working patch level.
D. Restore Ann’s PC to the last known good configuration.
E. Roll back the drivers to the previous version.
E. Roll back the drivers to the previous version.
Which of the following requires the network administrator to schedule a maintenance window?
A. When a company-wide email notification must be sent.
B. A minor release upgrade of a production router.
C. When the network administrator’s laptop must be rebooted.
D. A major release upgrade of a core switch in a test lab.
B. A minor release upgrade of a production router.