Test 1 Flashcards

1
Q

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (SELECT TWO)

A. Layer 2 Switch
B. MAC Address Filtering
C. ACLs
D. IIS Server
E. Port Scanner
F. Firewall
A

C,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following authentication solutions also provides AAA and TCP?

A. TACACS+
B. Kerberos
C. RADIUS
D. RAS

A

A. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
A. Honeynet
B. Honeypot
C. VUlnerability
D. Network based IDS
A

B. Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Protocol that uses a three way handshake to transfer information can be found within which layer of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
A

C. Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following separates broadcast domains? 
A. Port mirroring
B. Router
C. Convergence
D. Switch
A

B. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following would Kim, a technician, do to monitor traffice through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
A

A. Enable an SNMP agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following command can Lisa, a technician, use on a server to display the default router setting?
A. Ping
B. nslookup
C. route
D. arp
A

C. route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?
A. nmap
B. nbstat
C. dig
D. arp
A

C. dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following could Kim, a network technician, use to find the approsimate location of a break in a long network cable? 
A. Protocol analyzer
B. Time Domain Reflectometer
C. Toner Probe
D. Multimeter
A

B. Time Domain Reflectometer (TDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following protocols is commonly used for VoIP technology? 
A. Telnet
B. SMTP
C. SIP
D. SNMP
A

C. SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following can Jeff, a technician, modify on an 802.11n router that is not avialable as an option on an 802.11g device?
A. SSID
B. Encryption
C. Channels
D. Spectrum
A

D. Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following technologies could be implemented to improve call clarity when using VoIP technology?
A. Static IP Addressing
B. Caching engines
C. QoS
D. Port forwarding
A

C. QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
When using high bandwidth applications over multiple WAN connections, which of the following should be used? 
A Static IP Addressing
B. Half-duplex
C. PoE devices
D. Load balancing
A

D. Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution
C. Establish a theory of probable cause
D. Document findings, actions, and outcomes.

A

D. Document findings, actions, and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
A. Verify full system functionality and if applicable implement preventive measures
B. Implement the solution or escalate as necessary
C. Document findings, actions, and outcomes
D. Establish a theory of probable cause (e.g. question the obvious)

A

B. Implement the solution or escalate as necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper
A

A. TDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A switch in IDF 3 has shut down at 3 P.M. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem? 
A. Environmental monitor
B. Cable tester
C. TDR
D. Loopback plug
A

A. Environmental monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20
B. 21
C. 22
D. 23
A

C. 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
A

D. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?
A. Cable tester
B. Toner probe
C. Cable crimper
D. Punch down tool
A

B. toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following DNS records would a web browser access to determine the IP address of an internet web page?
A. CNAME
B. A
C. MX
D. PTR
A

B. A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following is used to prevent Layer 2 switching loops within a local area network? 
A. STP
B. MTU
C. EGP
D. IGP
A

A. STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A bridge handles frames at which of the following layers of the OSI model? 
A. Network
B. Session
C. Transport
D. Data Link
A

D. Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following is a method to prioritize network traffic coming from VoIP phones? 
A. PAT
B. DNS
C. SIP
D. QoS
A

D. QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Kim, a technician, is installing a switch that does not feature auto-negotiation. WHich of the following characteristics would need to be manually configured? (SELECT TWO)
A. MAC addressing
B. IP Addressing
C. Port speed
D. IPv6 addressing
E. Duplex
A

C. Port speed

E. Duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. WHich of the following tools will verify this? 
A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug
A

A. Cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the follwoing technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port mirroring
D. Spanning Tree
A

D. Spanning Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice? 
A. IS-IS
B. BGP
C. OSPF
D. RIP
A

B. BGP (border gateway protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Which of the following BEST describes a switch port? 
A. Broadcast domain
B. Distance vector
C. Link state
D. Collision domain
A

D. Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? 
A. Loopback plug
B. Butt set
C. Cable certifier
D. Toner probe
A

D. Butt set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following can jeff, a network technician, change to help limit war driving?
A. Signal strength
B. SSID
C, Frequency
D. Channel
A

A. Signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
In which of the following wireless standars is MIMO used? 
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?
A. netstat
B. route
C. nslookup
D. arp
A

C. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? 
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel
A

C. WAP SSIDs are matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which or the following is the usual number of bits for the host identifier part of an IPv6 address?
A. 16
B. 32
C. 48
C. 64
A

C. 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following is the prefix for link-local IPv6 address?
A. FE80::/10
B. FF000::/8
C. 2FFE::/16
D. FEEF:/12
A

A. FE80::/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (SELECT TWO)
A. Physical
B. Session
C. Data link
D. Network
E. Transport
A

A. Physical

C. Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server? 
A. nbstat
B. dig command
C. ipconfig
D. Protocol analyzer
A

D. Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
DNS lookups for a given host are intermittently failing. Which of the following would KIM, a technician, MOST likely use to verify this problem? 
A. arp
B. nbstat
C. traceroute
D. dig
A

D. dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost??
A. OTDR
B. Protocol analyzer
C. Toner probe
D. TDR
A

C. Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Which of the following address blocks would MOST likely be blocked from crossing a border router?
A. 8.0.0.0/8
B. 172.16.0.0/12
C. 122.0.0.0/24
D. 248.0.0.0/8
A

B. 172.16.0.0/12

42
Q
Which of the following would Jeff, a technician, MOST likely use to remotely verify port configurations of a switch?
A. Traceroute command
B. SNMP
C. nbstat command
D. dig command
A

B. SNMP monitor

43
Q
Lisa, a user, reports increased delays and timeouts when trying to reach several internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?
A. nslookup
B. route
C. nbstat
D. arp
A

A. nslookup

44
Q
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (SELECT TWO)
A. Proxy server
B. Traffic shaping
C. Caching engines
D. Load balancing
E. Quality of Service
A

B. Traffic shaping

E. Quality of Service

45
Q
Kim, a network administrator should  consult which documentation FIRST to determine the cause of recent network issues? 
A. Network map
B. Cable management
C. Change management
D. Asset management
A

C. Change management

46
Q

Lisa, a network technician, is attempting to map a FQDN to an external server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. This is a private address which cannot be seen by external users.
B. The address does not have the appropriate subnet mask assigned.
C. This is a public address which can only be seen by internal users.
D. This is a private address which can only be seen by external users.

A

A. This is a private address which cannot be seen by external users

47
Q
Zach, a network technician, is troubleshooting signal problems with certain WAP in an office consistently high ping times across the units. Such an issue is called which of the following?
A. Latency
B. Attenuation
C. Crosstalk
D. Frequency hopping
A

A. Latency

48
Q
Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen? 
A. VLAN malfunction
B. Broadcast storm
C. Quality of Service loss
D. Duplicate IP address.
A

B. Broadcast storm

49
Q
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
A. 192.168.0.255
B. 192.168.0.1
C. 192.168.0.0
D. 192.168.0.253
A

A. 192.168.0.255

50
Q
Which of the following proocols is used to securely connect to a multi-layer switch? 
A. HTTP
B. SMTP
C. SSH
D. Telnet
A

C. SSH

51
Q
Which of the following ports would have to be allowed through a firewall to allow SNMP traffice to pass on its default port? (Select TWO)
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080
A

D. 161

E. 162

52
Q
Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? 
A. Loopback
B. Protocol analyzer
C. Smart jack
D. Coupler
A

A. Loopback plug

53
Q

Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on the MAC address
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC address
D. Switches packets within the same subnet based on IP addresses

A

A. Switches packets within the same subnet based on the MAC address

54
Q
A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?
A. net share
B. hostname
C. ipconfig
D. tracert
A

C. ipconfig

55
Q
Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following tools would be used?
A. Butt set
B. Toner probe
C. Wire mapper
D. Cable certifier
A

Butt set

56
Q
An analog pots voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
A

B. Butt set

57
Q
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
A. Multimeter
B. Loopback plug
C. Cable certifier
D. CAT3 coupler
A

B. Loopback plug

58
Q
Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?
A. Reservations
B. Lease times
C. Removing IPs from the active leases
D. Configuring the DNS options
A

A. Reservations

59
Q
Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device? 
A. DNS suffixes
B. DHCP relay agent
C. Static IP addressing
D. Scope configuration
A

B. DHCP relay agent

60
Q
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the writing back to the patch panel. 
A. Butt set
B. Cable certifier
C. Toner probe
D. Snips
A

B. Cable certifier

61
Q
A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. WHich of the following tools would be used to assist Jeff in locating the CAT5e cable? 
A. Butt set
B. Punch down tool
C. Toner Probe
D. Protocol analyzer
A

C. Toner Probe

62
Q
Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? 
A. STP
B. PoE
C. CTP trunking
D. Port forwarding
A

B. PoE

63
Q

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP Address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface

A

A. IP Address on the native VLAN interface

64
Q
Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
A. Fault tolerance
B. QoS
C. Proxy Server
D. Load balancing
A

D. Load balancing

65
Q
Which of the following describe a rationale for a network with redundant paths?
A. VPN compatibility
B. Unified communications implementation
C. High availability requirement
D. QoS
A

C. High availability requirement

66
Q
Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she used?
A. OTDR
B. Multimeter
C. Punch down tool
D. Temperature monitor
A

C. Punch down tool

67
Q
Which of the following is an example of a DHCP failover mechanism?
A. APIPA
B. Inactive lease
C. Reservations
D. Active lease
A

A. APIPA

68
Q
Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?
A. WAP placement
B. PoE device
C. MAC filtering
D. Encryption type
A

A. WAP placement

69
Q
Lisa, a network technician, is trobleshooting a new wireless network that has been dropping connections. She notices another wireless network in the area. WHich of the following BEST explains the reason for the dropped connections? 
A. Latency
B. SSID mismatch
C. Interference
D. Encryption type
A

C. Interference

70
Q
Which of the following limits the number of devices that can be assigned IP addresses by DHCP? 
A. Lease
B. Reservation
C. DNS setting
D. Scope
A

D. Scope

71
Q
Which of the following has a maximum transfer rate of 54Mbps and operates at the 54GHz frequency? 
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

72
Q
Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN
A

D. VPN

73
Q
Which of the following devices is used to distribute network traffic over multiple links?
A. Content filter
B. DNS server
C. Load balancer
D. Proxy server
A

C. Load balancer

74
Q
Which of the following is used to restrict access according to user policies?
A. Content filter
B. DHCP server
C. DNS server
D. VPN concentrator
A

A. Content filter

75
Q
Which of the following is used to filter outgoing network requests? 
A. Proxy server
B. VPN concentrator
C. DHCP server
D. IIS server
A

A. Proxy server

76
Q
Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable? 
A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool
A

C. Toner probe

77
Q
Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use?
A. Toner probe
B. Punch down
C. Wire tester
D. Crimper
A

B. Punch down

78
Q
A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector?
A. Wire tester
B. Punch down 
C. Crimper
D. Multimeter
A

C. Crimper

79
Q
There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?
A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor
A

A. Protocol analyzer

80
Q

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption

A

C. Disable 802.11b and 802.11g

81
Q
Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?
A. Channel
B. WEP
C. SSID
D/ WPS
A

C. SSID

82
Q
Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach's NEXT step? 
A. Test the theory
B. Establish a plan of action
C. Establish a theory
D. Document findings
A

D. Document findings

83
Q
Which of the following network devices restricts traffic based on words, signatures, and URLS?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer
A

B. Content filter

84
Q
Which of the following network devices hides network nodes behind one public IP address?
A. Layer 3 switch
B. Content filter
C. VPN server
D. Proxy server
A

D. Proxy server

85
Q
A VPN concentrator is used for which of the following purposes?
A. MAC filter
B. Content filter
C. Secure network access
D. Connectivity troubleshooting
A

C. Secure network access

86
Q
Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0
A

A. FastEthernet 0/0

87
Q
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST missing in the configuration?
A. Post speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT
A

B. Cryptokey

88
Q
Jeff, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?
A. PoE
B. Port mirroring
C. Convergence
D. Port speed
A

B. Port mirroring

89
Q
Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow internet downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP
A

A. SNMP (Simple Network Management Protocol)

90
Q
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem? 
A. Network map
B. Environmental monitor
C. Placement map
D. Syslog
A

D. Syslog

91
Q
Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause? 
A. Encryption type
B. Channel selection
C. Antenna placement
D. Signal strength
A

B. Channel selection

92
Q
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?
A. Channel bonding
B. MIMO
C. Spatial reuse
D. 20MHz channel spacing
A

A. Channel bonding

93
Q

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled
C. The cable is not a crossover
D. The port is not trunked

A

C. The cable is not a crossover

94
Q
Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should Jeff consider for these requirements? (SELECT TWO) 
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANS
A

C. Port mirroring

E. VLANS

95
Q
Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?
A. Switch loop
B. Port bonding
C. Virtual switch
D. Port mirroring
A

A. Switch loop

96
Q
Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?
A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in he cable pairs.
A

C. Incorrect WEP key

97
Q

Zach, a user, is unable to print to a network. The cable tests good and the correct VLAN is configured on the switch. Which of the following is MOST likely the cause?
A. The printer was configured to DHCP
B. The switch was configured of trunking
C. The printer was configured for duplexing
D. The switch was configured for PoE

A

A. The printer was configured to DHCP

98
Q
Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of data? 
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP
A

A. SNMP v2 (Simple Network Management Protocol version 2)

99
Q
Which of the following network management tools can filter infomration from all data entering and leaving a specific port on the switch?
A. SNMP trap
B. Bandwidth analyzer
C. Network sniffer
D. Syslog server
A

C. Network sniffer

100
Q
Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performances. Which of the following practices allows other technicians quickly return the networks to normal speeds?
A. Change management
B. Baselines
C. Asset management
D. Cable management
A

A. Change management