TEST 4 Flashcards

1
Q

Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment?

A. Packet capturing
B. Port scanning
C. Log scanning
D. Baseline review

A

B. Port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician is sent to a remote office to set up a device to connect to the Internet. The company standards document requires stateful inspection. Which of the following should the technician install?

A. Router
B. Multiplayer switch
C. Firewall
D. Bridge

A

C. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is assigned to secure a basic wireless network. Which of the following authentication protocols should the technician use to perform this task? (Choose two.)

A. RDP
B. SNMP
C. WPA2
D. EAP
E. SSL
A

C. WPA2

D. EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?

A. Change management records
B. Inventory management
C. Network log files
D. Logical diagrams

A

A. Change management records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A junior network technician receives a help desk ticket from an end user who is having trouble accessing a web application that was working the previous day. After talking with the end user and gathering information about the issue, which of the following would be the most likely course of action for the technician to perform NEXT?

A. Establish a theory of probable cause.
B. Escalate the ticket to a senior technician.
C. Implement the solution.
D. Document the findings and outcomes.

A

A. Establish a theory of probable cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician at a small office upgrades the LAN switch. After the upgrade, a user reports being unable to access network resources. When the technician checks the switchport, the LED light is not lit. Which of the following should the technician check FIRST?

A. The device is using the correct cable type.
B. The switchport is functioning properly.
C. The device is connected to the switch.
D. The switch is connected to the router.

A

C. The device is connected to the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?

A. Port security
B. MAC filtering
C. Network access control
D. Captive portal

A

D. Captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task?

A. Rack diagram
B. IDF/MDF documentation
C. Network performance baseline
D. Logical and physical diagrams

A

D. Logical and physical diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following storage network technologies inherently leverages block-level storage?

A. NAS
B. SAN
C. FCoE
D. iSCSI
E. FTP
A

A. NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following networking devices operates at Layer1?

A. Router
B. Firewall
C. Hub
D. Bridge

A

C. Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A disgruntled employee decides to leak critical information about a company’s new product. The employee places keyloggers on the department’s computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?

A. Man-in-the-middle
B. Logic bomb
C. Insider threat
D. Social engineering

A

C. Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?

A. Utilize an SSH connection to the corporate server.
B. Use TFTP to transfer files to corporate resources.
C. Allow RDP through an external firewall.
D. Connect utilizing client-to-site VPN.

A

D. Connect utilizing client-to-site VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following DNS record types is an alias?

A. CNAME
B. PTR
C. NS
D. SRV

A

A. CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A recently constructed building makes use of glass and natural light. Users in the building are reporting poor cellular connectivity and speeds. Which of the following is MOST likely the cause?

A. Absorption
B. Channel overlap
C. Reflection
D. Frequency mismatch

A

C. Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network technician is working on a new switch implementation to expand the network. Which of the following is the BEST option to ensure the implementation goes according to business requirements?

A. AUP
B. NDA
C. SOP
D. SLA

A

C. SOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is utilizing SNMPv3 to monitor network statistics. Which of the following actions would occur immediately of a server’s utilization spikes above the prescribed value?

A. A trap message is sent via UDP to the monitoring workstation.
B. The SET function pushes an alert to the MIB database.
C. The object identifier is modified and reported during the next monitoring cycle.
D. A response message is sent from the agent to the manager.

A

A. A trap message is sent via UDP to the monitoring workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In which of the following scenarios should a technician use a cross-over cable to provide connectivity?

A. PC to switch
B. Switch to AP
C. Router to switch
D. Router to modem
E. PC to PC
A

E. PC to PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect?

A. Router
B. Range extender
C. VoIP endpoint
D. Access point

A

D. Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network technician is setting up a new router. Since it is exposed to the public, which of the following are the BEST steps the technician should take when setting up this device? (Choose two.)

A. Disable unnecessary services.
B. Use private IP addresses.
C. Allow remote management access.
D. Disable the console port.
E. Enable encryption.
F. Upgrade to the latest firmware.
A

A. Disable unnecessary services.

F. Upgrade to the latest firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A network technician is configuring user access to a VPN concentrator and has been advised to use a protocol that supports encryption over UDP. Which of the following protocols has the technician MOST likely configured for client use?

A. TFTP
B. DTLS
C. DNS
D. SNMP

A

B. DTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A switch has detected duplicate broadcast messages sourced from a second port. The broadcasts continue to be transmitted and duplicated until the amount of traffic causes severe performance issues. Which of the following should be configured to prevent this behavior?

A. BPDU guard
B. DHCP snooping
C. ARP protection
D. Spanning tree

A

D. Spanning tree

22
Q

A Chief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the company’s network devices. Which of the following is the MOST secure way to prevent this?

A. ACL allowing only HTTP
B. ACL allowing only Telnet
C. Out-of-band modem
D. Out-of-band console router

A

D. Out-of-band console router

23
Q

The Chief Executive Officer’s (CEO’s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?

A. Absorption
B. Reflection
C. Distance
D. Refraction
E. Attenuation
A

C. Distance

24
Q

A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be specifically configured to allow VPN traffic into the network?

A. Firewall
B. Switch
C. Router
D. Modem

A

A. Firewall

25
Q

A technician is working on a new machine that has been procured for testing and development. The machine will run a hypervisor and host several operating systems of various types so the development team can test the company’s applications in a variety of environments. The technician wants the virtual machines to be available to communicate with each other without leaving the hypervisor. Which of the following is the BEST solution to the problem?

A. The technician should connect the machine to its own separate switch.
B. The technician should add a route in each virtual machine to the default gateway.
C. The technician should configure a virtual switch.
D. The technician should set up individual routes between the machines.

A

C. The technician should configure a virtual switch.

26
Q

A technician is setting up a wireless access point in a coffee shop. The shop is not concerned with security but only wants to allow customers to have access. Which of the following configurations should the technician deploy?

A. Use a pre-shared key.
B. Set up EAP.
C. Configure RADIUS.
D. Configure MAC filtering.

A

A. Use a pre-shared key.

27
Q

A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?

A. DB-9
B. RS-232
C. DB-25
D. RJ-45

A

D. RJ-45

28
Q

Management has requested that services be available within 72 hours of a disaster. Budget is a major concern. A contract is signed with a company that has plenty of space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?

A. Cold site
B. Differential backup
C. Hot site
D. Incremental backup
E. Warm site
F. Full backup
A

A. Cold site

29
Q

A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?

A. Perform antivirus and anti-malware scans of the file.
B. Perform a hash on the file for comparison with the vendor’s hash.
C. Download the file a second time and compare the version numbers.
D. Compare the hash of the file to the previous firmware update.

A

B. Perform a hash on the file for comparison with the vendor’s hash.

30
Q

A network technician performs a wireless site survey at a company building and identifies that the cafeteria is not covered by a wireless signal. The cafeteria is located in a mediumsize, square-shaped room. Which of the following types of WAP antenna should the technician install in the center of the cafeteria to provide the BEST coverage?

A. Unidirectional
B. Parabolic
C. Omnidirectional
D. Yagi

A

C. Omnidirectional

31
Q

An entire enterprise cannot access a specific website. The network technician knows the website was accessible last week. The technician can also ping the website. Which of the following is the technician MOST likely to find upon investigation?

A. The firewall is misconfigured.
B. The network is being hit by a zero-day attack.
C. The SSL certificate is untrusted.
D. The SSL certificate has expired.

A

D. The SSL certificate has expired.

32
Q

At which of the following OSI model layers would a router operate?

A. Physical
B. Network
C. Transport
D. Data link

A

B. Network

33
Q

Which of the following are DNS record types? (Choose three.)

A. CNAME
B. NTP
C. PTR
D. LDAP
E. DHCP
F. TTL
G. SRV
H. SSH
A

A. CNAME
C. PTR
G. SRV

34
Q

Which of the following backup techniques is used to capture all the data that has changed since the last full backup?

A. Incremental
B. Replica
C. Differential
D. Snapshot

A

C. Differential

35
Q

A network administrator frequently needs to assist users with troubleshooting network hardware remotely, but the users are non-technical and unfamiliar with network devices. Which of the following would BEST help the administrator and users during hands-on troubleshooting?

A. Logical diagrams
B. MDF documentation
C. Equipment labeling
D. Standard operating procedures

A

D. Standard operating procedures

36
Q

A technician is observing brownout issues at a smaller office. At least once a week, the edge switch power cycles. Which of the following should the technician do to resolve the issue?

A. Install a new switch
B. Install a UPS
C. Replace the switch uplink cable.
D. Install a new electrical circuit.

A

B. Install a UPS

37
Q

A technician is troubleshooting a workstation’s network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician?

A. Consistent labeling
B. Change management
C. Standard work instructions
D. Inventory management
E. Network baseline
A

A. Consistent labeling

38
Q

Under which of the following layers of the OSI model do ATM cells operate?

A. Data link
B. Network
C. Session
D. Transport
E. Presentation
A

A. Data link

39
Q

A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are about 1000ft (305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the extension of the network while meeting budgetary demands?

A. Switch
B. Router
C. Media converter
D. PRP wireless

A

D. PRP wireless

40
Q

A junior network technician is working in the field and needs to connect to the company’s remote server, however, doing so will require the junior technician to use the public Internet.
Because security is a concern, which of the following is the BEST method to use?
A. Telnet
B. SSH
C. SFTP
D. VNC

A

B. SSH

41
Q

A home user has purchased a new smart TV to stream online video services. The smart TV is unable to connect to the wireless network after several attempts. After returning from vacation, the home user tries again and can connect the TV to the wireless network. However, the user notices a laptop is no longer able to connect to the network. Which of the following is the MOST likely cause?

A. The DHCP scope has been exhausted.
B. The security passcode has been changed.
C. The SSID is hidden.
D. The AP configuration was reset.

A

A. The DHCP scope has been exhausted.

42
Q

A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group. Which of the following security attacks is taking place?

A. Evil twin
B. Social engineering
C. Insider threat
D. Phishing

A

B. Social engineering

43
Q

Which of the following DNS record types allows IPv6 records to be resolved to DNS names?

A. PTR
B. A
C. AAAA
D. SRV

A

C. AAAA

44
Q

A network technician has recently installed new VoIP phones at all employee’s desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)

A. TCP 443 is allowed.
B. UDP 1720 is allowed.
C. UDP 5060 is allowed.
D. UDP 5061 is allowed.
E. TCP 8080 is allowed.
F. TCP 8181 is allowed.
A

C. UDP 5060 is allowed.

D. UDP 5061 is allowed.

45
Q

Which of the following would allow a network technician to access files on a remote system? (Choose two.)

A. FTP
B. TFTP
C. VLSM
D. SIP
E. SMTP
F. IMAP
A

A. FTP

B. TFTP

46
Q

Which of the following provides two-factor authentication?

A. Username + password
B. Smart card + PIN
C. Fingerprint + retina scan
D. Key fob + ID card

A

B. Smart card + PIN

47
Q

A technician set up a new SOHO network recently. The installed router has four Ethernet ports, however, the customer has seven devices that need wired connections. Which of the following should the technician do to BEST meet the customer’s requirements?

A. Install a six-port switch.
B. Configure port forwarding on the router.
C. Install WAPs near the devices.
D. Configure the switchports as EtherChannel ports.

A

A. Install a six-port switch.

48
Q

A technician is performing a maintenance task on a weekly basis and wants to ensure the task is properly documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?

A. Standard operating procedure
B. Work order
C. Performance baseline
D. Logical diagram
E. Change management
A

A. Standard operating procedure

49
Q

A company is allowing its employees to use their personal computers, tablets, and IoT devices while at work. However, there are rules and guidelines to which employees must adhere. Which of the following documents applies to these employees?

A. NDA
B. SOP
C. BYOD
D. SLA

A

C. BYOD

50
Q

Which of the following are characteristics of jumbo frames? (Choose two.)

A. Commonly used on SAN
B. MTU size greater than 1500
C. MTU size greater than 10000
D. Commonly used on IaaS
E. MTU size greater than 12000
(NUM212)
A

A. Commonly used on SAN

B. MTU size greater than 1500