Test 3 Flashcards
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen areas by the microwave. Employees have been reporting intermittent connectivity wen using the wireless network. Which of the following would BEST improve connectivity? A. Disable SSID broadcast B. Increase the signal strength C. Move the access point D. Change the broadcast channel
C. Move the access point
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim? A. Web server B. Syslog C. Network sniffer D. SNMP
C. Network sniffer
Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
B. 255.255.0.0
Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123
C. 69
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a list of host names connected to the network? A. ping B. nbstat C. arp D. msconfig
B. nbstat
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A. Multimode fiber B. CAT6a C. Single mode fiber D. Coaxial
C. Single mode fiber
Which of the following wireless technologies has the LARGEST cell size? A. 802.11a B. 802.3af C. 802.11g D. 802.11i
C. 802.11g
Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity
D. Diversity
Which of the following are available speeds when using 802.11b? (SELECT TWO) A. 1Mb/s B. 5.5 Mb/s C. 6 Mb/s D. 12 Mb/s E. 54 Mb/s
A. 1Mb/s
B. 5.5 Mb/s
RADAR avoidance technologies are built into which of the following technologies? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
A. 802.11a
Which of the following technologies can cause interference for 802.11g? A. RADAR B. 802.11a C. IrDA D. Bluetooth
D. Bluetooth
Which of the following technologies would be used in a large office area that has a lot of the 2.4GHz noise? A. 802.3af B. 802.1q C. 802.11a D. MIMO
C. 802.11a
Which of the following occurs when an antenna gain is increased on an access point? A. Connection speed decrease B. Throughput decreases C. Cell size increases D. Attenuation increases
C. Cell size increases
Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. SPA2 PSK D. WPA Personal
B. 104/128 bit WEP
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST used with remote access? A. PKI B. VPN C. MS-CHAP D. RADIUS
D. RADIUS
Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP
D. SNMP
Which of the following does SNMPv3 BEST provide over previous versions? A. Increased security B. Simplified management C. More data types D. Higher productivity
A. Increased security
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
C. PuTTY
Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this? A. History logs B. Event logs C. Syslog server D. Traffic analyzer
C. Syslog server
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem? A. TX/RX reversed B. Interference C. Cable length D. Bad connectors
A. TX/RX reversed
Users are reporting that internet performance is slow. Jeff, the technician, has determined that the internet connection is saturated. Which of the following is BEST used to detrmine the source, destination, and type of the traffic? A. Netflow B. Protocol analyzer C. Network sniffer D. SNMP
A. Netflow
Which of the following is a valid IPv6 address? A. 4056:958:E486::F8:8962 B. 1596:H593:B5D8::B859 C. 2048::9584:A6B8::0983 D. 4820::0985:489D::8761
A. 4056:958:E486::F8:8962
Which of the following OSI model layers is responsible for the transmission of bits? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
A. Layer 1
Frames ate the protocol Data Unit for which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
Lisa, a network administrator, wants to automatically sign 168.254.1.0/24 addresses to computers of the network. Which of the following will need to be configured? A. DHCP addressing B. Private addressing C.DNS addressing D. APIPA addressing
A. DHCP addressing
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution wold provide the BEST solution? A. Private IP Addressing B. Wireless Access Points C. Wide Area Networking D. Virtual Local Area Networks
B. Wireless Access Points
An oranization is considering migrating a data center to a different operating system. Which of the following could the organization use to try out the new OS before making a wide-scale deployment? A. Virtual PBXs B. Virtual Switches C. Virtual Servers D. Virtual Desktops
C. Virtual Servers
Which of the following servers would MOST likely be placed in a DMZ? A. Proxy Server B. Web Server C. Filer Server D. Intranet Server
B. Web Server
Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zach's location? A. Biometric authentication B. Single sign-on C. 802.1x access control D. Two-factor authentication
B. Single sign-on
IPSec relies on which of the following protocols? (SELECT TWO) A. ESP B. EAP C. AH D. PKI E. RDP
A. ESP
C. AH
Which of the following commands displays the routing table on a server or workstation? A. nbstat B. route C. traceroute D. nmap
B. route
A new firewall was recently installed blocking SMTP traffic. AS a result, no one has internet access. Which of the following has MOST likely occurred? A. Port security is blocking all traffic B. An IDS is blocking all traffic C. Implicit deny is blocking all traffic D. SMTP is blocking all traffic
C. Implicit deny is blocking all traffic
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (SELECT TWO) A. Allow UDP port 21 outbound B. Allow UDP port 22 outbound C. Allow UDP port 80 outbound D. Allow TCP port 21 outbound E. Allow TCP port 22 outbound F. Allow TCP port 80 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound
Lisa, an administrator, must connect o a remote UNIX server security. Which of the following would be the MOST secure connection method? A. FTP B. PPP C. Telnet D. SSH
D. SSH
How many collision domains and broadcast domains are present on a 24-port switch with no VLAN assignments?
A. 1 collision domain, 1 broadcast domain
B. 1 collision domain, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
D. 24 collision domains, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
Which of the following commands could Lisa, a network administrator, use to determine the IP address of a UNIX server? A. ifconfig B. nbstat C. ipconfig D. netstat
A. ifconfig
Users report that an internal web server is not responding. Which of the following commands could be used on the servers to confirm that the web service is running? A. nbstat B. traceroute C. nslookup D. netstat
D. netstat
Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following commands would assistKim in determining the computer name of the workstation? (SELECT TWO) A. nbstat B. net statistics C. traceroute D. netstat E. nslookup
A. nbstat
B. net statistics
When configuring a wireless access point, Zach, a network administrator. needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A. ping B. arp C. route D. dig
B. arp
After a router upgrade, Jeff, the network administrator, needs to determine if the workstations still have the correct default gateway. Which of the following commands would he use? (Select TWO) A. netstat B. ipconfig C. dig D. traceroute E. nbstat
A. netstat
B. ipconfig
Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack? A. Drop 19:21:68:10:20:00 B. Permit ::1/32 C. Permit A0:H1:B0:90:1D:6C D. Drop 192.168.10.20
A. Drop 19:21:68:10:20:00
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS? A. Kerberos B. Two factor authentication C. CHAP D. PKI
D. PKI
After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an internet web server as coming from he router's public interface IP address. Which of the following must Jeff implement to assign a different public IP from the router's public interface IP address to one of the workstations in the office? A. NAT B. PAT C. DMZ D. ACL
A. NAT
Which of the following OSI layers is responsible for encrypting HTTPS traffic? A. 3 B. 4 C. 5 D. 6
D. 6
After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause? A. Cable placement B. Crosstalk C. Bad wiring D. Cable length
D. Cable length
00:12:34:56:78 can be used in which of the following? A. WPA-PSK password B. Channel section C. WEP key D. MAC filtering
A. WPA-PSK password
Lisa, a network administrator, must be implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented? A. WEP B. TKIP C. WPA2 D. WPA Enterprise
C. WPA2
Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason? A. Bad connectors B. TX/RX reversed C. Packet loss D. Distance
D. Distance
Kim, a technician, is stalling network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following s MOST likely the cause? A. Port speed mismatch B. Faulty F-connectors C. Bad wiring D. Bad switch
C. Bad wiring
When running cable in an office building, which of the following should Zach, a technician, consider to help reduce EMI? A. Cable distance B. Cable placement C. Connector types D. PoE devices
B. Cable placement