questions 101-200 Flashcards

1
Q
Which of the following helps prevent routing loops?
A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon
A

D. Split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the
following should be checked?
A. Server host file
B. Subnet mask
C. Local hosts file
D. Duplex settings
A

C. Local hosts file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following WAN technologies is associated with high latency?
A. T1
B. Satellite
C. Cable
D. OCx
A

B. Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a
technician begin troubleshooting?
A. Transport layer
B. Physical layer
C. Network layer
D. Session layer
A

B. Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network engineer is dispatched to an employee office to troubleshoot an issue with the employee’s laptop. The employee is unable to connect to local and remote
resources. The network engineer flips the laptop’s wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 7

A

A. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers
does the problem reside? (Select TWO).
A. Layer 2
B. Layer 3
C. Layer 5
D. Transport layer
E. Data link
F. Physical layer
A

A. Layer 2

E. Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen
and are unable to communicate with other computers in the same lab. The network administrator looks at the following output:
SRC MACSRC IPDST MACDST IP
00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of
the OSI model is the problem occurring?
A. Network
B. Application
C. Data link
D. Transport

A

A. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?
A. CSMA/CD
B. OSPF
C. DOCSIS
D. BGP
A

A. CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
A. Firewall
B. Router
C. 802.11 AP
D. Switch
A

C. 802.11 AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that
would be able to operate at a higher frequency than their phones. Which of following standards should be used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.1x

A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following
standards is implemented on the network?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
A

C. 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video
streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?
A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a

A

B. 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet
this need?
A. 802.11ac with 2 spatial streams and an 80MHz bandwidth
B. 802.11ac with 3 spatial streams and a 20MHz bandwidth
C. 802.11ac with 3 spatial streams and a 40MHz bandwidth
D. 802.11ac with 4 spatial streams and a 160MHz bandwidth

A

A. 802.11ac with 2 spatial streams and an 80MHz bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to
establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect?
A. Confirm the new host is using 10GBaseSR due to the manufacturing environment
B. Confirm the new host is compatible with 10BaseT Ethernet
C. Confirm the existing 10Base2 equipment is using the proper frame type
D. Confirm that CSMA/CD is disabled on the Ethernet network

A

B. Confirm the new host is compatible with 10BaseT Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is
usually called which of the following?
A. SOP
B. BEP
C. AUP
D. SLA
A

C. AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the:
A. MLA.
B. SLA.
C. SOW.
D. MOU.
A

B. SLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A customer has engaged a company to improve the availability of all of the customer’s services and applications, enabling the customer to minimize downtime to a
few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?
A. MLA
B. MOU
C. SOW
D. SLA

A

C. SOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted?
A. HCL
B. MSDS
C. SLA
D. HVAC
A

B. MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the
server room and result in suffocation. Which of the following systems are they MOST likely discussing?
A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups

A

A. Fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?
A. 110 block
B. MDF
C. DSU
D. CSU
A

B. MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following PDUs is used by a connectionless protocol?
A. Frames
B. Segments
C. Streams
D. Datagram
A

D. Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP
server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).
A. 20
B. 21
C. 22
D. 23
E. 67
F. 68
G. 69
A

A. 20

B. 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt
to the server is made, the process errors out. Which of the following is a cause of the error?
A. Only FTP can be used to copy configurations from switches
B. Anonymous users were not used to log into the TFTP server
C. An incorrect password was used and the account is now locked
D. Port 69 is blocked on a router between the network segments

A

D. Port 69 is blocked on a router between the network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following
default ports needs to be opened?
A. 445
B. 3389
C. 5004
D. 5060
A

B. 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Build a T-658A Connection

wire order

A

Green/White, Green, Orange/White, Blue, Blue/White, Orange, Brown/White, Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Build a T-658B Connection

wire order

A

Orange/White,Orange, Green/White, Blue, Blue/White, Green, Brown/White, Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email?
A. CNAME
B. MX
C. PTR
D. A
A

B. MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks. what caused the extreme downtime for the server. In regards to the manager’s inquiry, which of the following did the administrator forget to do FIRST?
A. Submit a change request
B. Schedule a maintenance window
C. Provide notification of change to users
D. Document the changes

A

A. Submit a change request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A network administrator noticed that when one computer goes down, all the other computers in the office will not work. Which of the following topologies is in use?
A. Star
B. Ring
C. Hybrid
D. Bus
E. Mesh
A

D. Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future?
A. Helpdesk training
B. Appropriate use policy
C. User awareness training
D. Personal Identifiable Information
A

C. User awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF. In order to comply with the SLA which
requires that 10Gb speeds be provided, which of the following media will need to utilized?
A. CAT6e
B. CAT5e
C. 802.11n
D. 802.11ac

A

A. CAT6e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to
ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used
but not when FQDN is used. Which of the following servers is MOST likely down?
A. WINS server
B. Domain controller
C. DHCP server
D. DNS server

A

D. DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
An area to which access is controlled by retina scan is protected by which of the following security measure types?
A. Two-factor authentication
B. Biometric
C. Cipher locks
D. Optical reader
E. Proximity reader
A

B. Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Which of the following ports should be allowed to provide access to certain VoIP applications?
A. 110
B. 139
C. 1720
D. 5060
A

D. 5060

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which of the following should be used to ensure a specific device always receives the same IP address?
A. IP helper
B. Reservation
C. Address lease
D. DHCP scope
E. DHCP relay
A

B. Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?
A. WPA2 security key
B. SSL certificates
C. CSMA/CA
D. RADIUS
A

D. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk’s
wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk?
A. Firewall
B. Web filtering
C. MAC filtering
D. Host-based antivirus

A

C. MAC filtering

38
Q
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
A. Tagging
B. Encapsulation
C. Tunneling
D. De-encapsulation
A

D. De-encapsulation

39
Q

A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On
which of the following devices will the technician implement the loopback?
A. Channel remote module
B. Fiber optic modem
C. Channel service unit
D. Digital subscriber line modem

A

C. Channel service unit

40
Q
Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following?
A. Network handle
B. Autonomous system number
C. Route aggregation
D. Top level domain
A

B. Autonomous system number

41
Q
QoS operates at which of the following OSI model layers? (Select TWO)
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 5
E. Layer 7
A

B. Layer 2

C. Layer 3

42
Q

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to
replace it. Which of the following would be the MOST helpful in regaining connectivity?
A. VLAN configuration
B. Network diagram
C. Configuration backup
D. Router image

A

C. Configuration backup

43
Q

Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from
the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem?
A. Increase the maximum log size
B. Log into the DNS server every hour to check if the logs are full
C. Install an event management tool
D. Delete the logs when full

A

C. Install an event management tool

44
Q
Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO)
A. OSPF
B. RIPv2
C. 802.1q
D. Spanning tree
E. 802.1d
F. QoS
A

D. Spanning tree

E. 802.1d

45
Q

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all
other buildings’ connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity
issues?
A. UTP patch cables
B. Antenna
C. Power adapter
D. Security standard

A

B. Antenna

46
Q

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS
servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue?
A. Update the HOST file with the URLs for all websites
B. Use NSLOOKUP to resolve URLs
C. Ensure ICMP messages can pass through the firewall
D. Enable port 53 on the firewall

A

D. Enable port 53 on the firewall

47
Q

The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to
specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better
chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these
goals?
A. Stateful firewall
B. Premise-based IDS
C. Host-based IDS
D. Cloud-based anti-malware

A

A. Stateful firewall

48
Q

A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a
LAN jack, but was unable to obtain an IP address automatically. Which of the following is the cause of the problem?
A. DNS
B. Wrong TCP port
C. Split horizon
D. DHCP scope

A

D. DHCP scope

49
Q

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should
not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers?
A. Block all LAN to LAN traffic
B. Block all LAN to WAN traffic
C. Block all WAN to LAN traffic
D. Block all WLAN to WAN traffic

A

C. Block all WAN to LAN traffic

50
Q

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that
CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue?
A. Add a honeypot to reduce traffic to the server
B. Update the Ethernet drivers to use 802.3
C. Add additional network cards to the server
D. Disable CSMA/CD on the network

A

C. Add additional network cards to the server

51
Q
A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a
device failure?
A. Vendor documentation
B. Archives/backups
C. Proper asset tagging and labeling
D. Network Baseline
A

B. Archives/backups

52
Q

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following:
1)Client PC 1 has an IP address if 192.168.10.25/25
2)PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A
3)Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25
4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?
A. Link from touter A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down

A

B. Link from router A to server A is down

53
Q
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?
A. Core switch
B. MDF
C. Ethernet router
D. IDF
A

B. MDF

54
Q
A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the
technician implement?
A. High availability
B. MAN network
C. Quarantine
D. Honeynet
A

C. Quarantine

55
Q

Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?

A. OC12
B. POTS
C. WiMax
D. OC3

A

B. POTS

56
Q

A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near
the connector. Which of the following is the issue?
A. Cross-talk
B. 568A/568B mismatch
C. Tx/Rx reverse
D. Split pairs

A

A. Cross-talk

57
Q
Which of the following can be issued from the command line to find the layer 3 hops to a remote destination?
A. traceroute
B. nslookup
C. ping
D. netstat
A

A. traceroute

58
Q

A administrator’s network has OSPF for the internal routing protocol and has two interfaces that continue to flap. The administrator reviews the following output:
Fast ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Full duplex, 100Mb/s, 100Base Tx/Fx
Received 1052993 broadcasts
1258 input errors
983881 packet output, 768588 bytes
1747 output errors, 0 collisions, 423 resets
Which of the following problems would cause the interface flap?
A. Wrong IP address
B. Loopback not set
C. Bad wire
D. Incorrect encapsulation
E. Duplex mismatch

A

E. Duplex mismatch

59
Q
Which of the following allows a telecommunication company to test circuits to customers remotely?
A. VLAN
B. Toner Probe
C. RDP
D. Smart Jack
E. VPN
A

D. Smart Jack

60
Q
A single mode fiber is no longer providing network connectivity to a remote site. Which of the following would be used to identify the location of the break?
A. MT-RJ
B. OTDR
C. Media converter
D. Cable certifier
A

B. OTDR

61
Q
Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root
cause of the problem?
A. Baseline
B. Bottleneck
C. Utilization
D. Link status
A

C. Utilization

62
Q

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion
worsens and collisions increase. Which of the following is the BEST action to alleviate the situation?
A. Allow the contractor to reset switches to factory defaults
B. Check the cabling on all switches for improper crossover use
C. Document the changes that were made
D. Downgrade firmware and restore backup configuration

A

D. Downgrade firmware and restore backup configuration

63
Q

An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and
retain email traffic and other correspondence?
A. Chain of custody
B. Legal hold
C. Divide and conquer
D. Persistent agents

A

B. Legal hold

64
Q
In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following
documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)
A. Memorandum of understanding
B. Data classification document
C. Service level agreement
D. Interconnection security agreement
E. Consent to monitor
F. Acceptable use policy
A

A. Memorandum of understanding

F. Acceptable use policy

65
Q

The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which of the following is a management control that should be
implemented to ensure employees are using encryption to transmit sensitive information?
A. Policies
B. VPN
C. HTTPS
D. Standards

A

A. Policies

66
Q
A client reports that half of the office is unable to access a shared resource. Which of the following should be used to troubleshoot the issue?
A. Data backups
B. Network diagrams
C. Baseline information
D. Vendor documentation
A

B. Network diagrams

67
Q

An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV’s with interconnected gaming systems in
the office. Which of the following did the administrator set up?
A. CAN
B. MAN
C. WAN
D. LAN

A

A. CAN

68
Q
Channel bonding will improve which of the following wireless characteristics?
A. Signal strength
B. Encryption strength
C. Coverage area
D. Connection speed
A

D. Connection speed

69
Q

Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following
should the technician implement to avoid potential occurrences from happening in the future?
A. Block all ICMP request
B. Update all antivirus software
C. Remove all suspected users from the network
D. Upgrade firmware on all network cards

A

A. Block all ICMP request

70
Q

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be
functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO)

A. Presentation
B. Transport
C. Session
D. Data link
E. Application
F. Physical
A

D. Data link

F. Physical

71
Q

A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken?
A. Document the findings, actions, and outcomes
B. Duplicate the problem if possible
C. Verify system functionality
D. Make an archival backup

A

C. Verify system functionality

72
Q

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC’s, one that connects
to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the
following should the administrator do to meet these requirements?
A. The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT
to the corporate network
B. The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only
C. The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an
unused range
D. The administrator should install a second physical NIC onto the host, and then connect each guest machine’s NICs to a dedicated physical NIC

A

C. The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an
unused range

73
Q

A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will
broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management
that must be addressed. Which of the following solutions should the technician design into the new network?
A. Place each department in a separate VLAN
B. Add a router and create a segment for all the monitoring host stations
C. Increase the number of switches on the network to reduce broadcasts
D. Increase the collision domain to compensate for the added broadcasts

A

A. Place each department in a separate VLAN

74
Q

A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees
was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network
administrator have done previously to minimize the possibility of a network breach?
A. Create VLANs to segment the network traffic
B. Place a network sniffer on segments with new employees
C. Provide end user awareness and training for employees
D. Ensure best practices were implemented when creating new user accounts

A

C. Provide end user awareness and training for employees

75
Q
A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform
NEXT to resolve the issue?
A. Test a theory to determine the cause
B. Escalate to a senior technician
C. Identify the symptoms
D. Establish a theory of probable cause
E. Establish a plan of action
A

D. Establish a theory of probable cause

76
Q
Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or
earthquake?
A. UPS and battery backups
B. Fire suppression systems
C. Building generator
D. Hot sites or cold sites
E. NAS and tape backups
A

D. Hot sites or cold sites

77
Q

A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All
routers and switches should be configured to accept SSH connections from which of the following network segments?
A. The internal network since it is private
B. The admin private network allowing only admin access
C. The DMZ only allowing access from the segment with the servers
D. The internet connection to allow admin access from anywhere

A

B. The admin private network allowing only admin access

78
Q
A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the
website and find the user browsing it?
A. An SNMP GET
B. A top listener tool
C. An intrusion detection system
D. A packet sniffer
A

D. A packet sniffer

79
Q

A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to
access the network. This describes which of the following attacks?
A. Social engineering
B. Spoofing
C. Zero-day attack
D. VLAN hopping

A

A. Social engineering

80
Q
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for
review?
A. Hybrid
B. Public
C. Community
D. Private
A

A. Hybrid

81
Q
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block
this traffic?
A. Intrusion detection system
B. Application aware firewall
C. Stateful packet inspection
D. Stateless packet inspection
A

C. Stateful packet inspection

82
Q

The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the
NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use?
A. BPDU
B. LACP
C. Spanning tree
D. Load balancing

A

B. LACP

83
Q

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with
full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking
devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network?
A. Use SNMPv1 for all configurations involving the router
B. Ensure the password is 10 characters, containing letter and numbers
C. Copy all configurations to routers using TFTP for secuirty
D. Only allow administrators to access routers using port 22

A

D. Only allow administrators to access routers using port 22

84
Q
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The
technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the
following is the MOST likely cause?
A. Distance limitation
B. Wavelength mismatch
C. cross-talk
D. EMI
E. Macro bend
A

B. Wavelength mismatch

85
Q

A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires
the use of 5 GHz band wireless transmissions? (Select TWO)
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
E. 802.11n

A

A. 802.11a

B. 802.11ac

86
Q

Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates
were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back?

A. The browser on the server
B. The server’s NIC drivers
C. The server’s IP address
D. The antivirus updates

A

B. The server’s NIC drivers

87
Q

A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the
number of WAPs needed, it is important to reference which of the following?
A. Network diagram
B. Site survey
C. Network topology
D. PoE requirements

A

B. Site survey

88
Q
Which of the following default ports is associated with protocols that are connectionless?
A. 80
B. 443
C. 2427
D. 3389
A

C. 2427

89
Q

A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be
the BEST example of two-factor authentication?
A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password

A

B. Password and key fob

90
Q

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC’s that do not have wireless
capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the
following network devices should a network technician use to connect all the devices to the wireless network?
A. Wireless bridge
B. VPN concentrator
C. Default WAP
D. Wireless router

A

D. Wireless router

91
Q
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?
A. IPSEC
B. SHA
C. DES
D. CRC
A

A. IPSEC