TEST 5 Flashcards

1
Q

A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? (Choose two.)

A. FTP
B. SMTP
C. VPN
D. SSH
E. SNMP
A

C. VPN

D. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?

A. File hash
B. File date
C. File type
D. File size

A

A. File hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)

A. tracert
B. ping
C. tcpdump
D. pathping
E. netstat
F. nslookup
G. route
A

A. tracert

D. pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?

A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF

A

A. CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the MOST likely cause of this issue?

A. DHCP exhaustion
B. Channel overlapping
C. Interference
D. Overcapacity

A

D. Overcapacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following BEST describes an exploit?

A. A router with default credentials
B. An open mail relay server
C. An SNMPv1 private community
D. A privilege escalation script

A

D. A privilege escalation script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?

A. Load balancer
B. IDS
C. Proxy server
D. Wireless controller

A

C. Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is setting up VoIP phones on a wireless network. Users report that calls are choppy and sometimes dropped. The technician has measured two characteristics using simple command-line tools that verify the problem. Which of the following characteristics did the technician measure? (Choose two.)

A. Reflection
B. Latency
C. Interference
D. Packet loss
E. Signal-to-noise ratio
F. Attenuation
A

B. Latency

D. Packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?

A. UDP port 22
B. TCP port 22
C. TCP port 25
D. UDP port 53
E. UDP port 69
A

E. UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements?

A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.

A

A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?

A. The router has a time-based ACL, applied for the network segment.
B. A light source is creating EMI interference, affecting the UTP cabling.
C. Nightly backups are consuming excessive bandwidth.
D. The user has violated the AUP, and Internet access has been restricted.

A

D. The user has violated the AUP, and Internet access has been restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to BEST meet this requirement?

A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
B. Install a BPDU guard on switchports and enable STP.
C. Create a DMZ for public servers and secure a segment for the internal network.
D. Install antivirus software and set an ACL on the servers.

A

A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?

A. iSCSI
B. Fibre Channel
C. NAS
D. InfiniBand

A

C. NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC-to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?

A. Replace SFP with a new one.
B. Fall back to the old switch.
C. Transpose the fiber pairs.
D. Replace multimode with single-mode cable.

A

C. Transpose the fiber pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?

A. UTP
B. Multimode
C. Coaxial
D. Serial

A

C. Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?

A. PVC Cat 5
B. Plenum Cat 5e
C. Plenum Cat 6a
D. PVC Cat 7

A

C. Plenum Cat 6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following physical security devices is used to detect unauthorized server room access?

A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance

A

D. Video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?

A. nmap
B. pathping
C. route
D. nslookup

A

A. nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?

A. Incident response policy
B. BYOD policy
C. DLP policy
D. Remote access policy

A

B. BYOD policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician is allocating the IP address space needed for a new remote office. This office will contain the engineering staff with six employees and the digital marketing staff with 55 employees. The technician has decided to allocate the 192.168.1.0/24 block to the remote office. The engineering staff has been allocated the 192.168.1.64/29 subnet. Using the LEAST amount of space possible, which of the following would be the last usable IP address in the engineering subnet?

A. 192.168.1.62
B. 192.168.1.63
C. 192.168.1.70
D. 192.168.1.71

A

A. 192.168.1.62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An administrator is troubleshooting a user’s intermittent wireless connectivity issue. Other users across the hallway can connect and use the wireless network properly. Upon inspection of the connection details, the administrator finds the following:
———————
SSID: Companey-WiFi
Signal: 5%
SNR: 2
———————
Which of the following is MOST likely the cause of the poor wireless connection?

A. Channel overlap
B. Overcapacity
C. Incorrect antenna type
D. Latency

A

C. Incorrect antenna type

22
Q

A VoIP system will require 23 concurrent voice channels and one signaling channel. Which of the following types of WAN service would provide the BEST connectivity to the PSTN?

A. PRI
B. BRI
C. E1/E3
D. DSL

A

A. PRI

23
Q

A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure?

A. Baseline report
B. Vulnerability report
C. Rollback plan
D. Business continuity plan

A

C. Rollback plan

24
Q

A web application is unable to authenticate customers so they can access their bills. The server administrator has tested the LDAP query but is not receiving results. Which of the following is the NEXT step the server administrator should take to correct the problem?

A. Check port 636 to see if it is being blocked.
B. Change service port 636 to port 389.
C. Restart the web server.
D. Verify the browser is using port 443.

A

A. Check port 636 to see if it is being blocked.

25
Q

Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?

A. Wireless hub
B. Wireless firewall
C. Wireless access point
D. Wireless bridge

A

C. Wireless access point

26
Q

Which of the following devices are MOST often responsible for 802.1q tagging? (Choose two.)

A. Switch
B. Router
C. IDS
D. Hub
E. IPS
F. Network tap
A

A. Switch

B. Router

27
Q

A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency.
Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)

A. 802.11ac
B. 802.11b
C. 802.11g
D. 802.11n
E. Bluetooth
F. Z-Wave
A

A. 802.11ac

D. 802.11n

28
Q

Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer a critical application?

A. SaaS
B. IaaS
C. PaaS
D. CASB

A

C. PaaS

29
Q

A content filter is set to analyze XML and JSON that users access from the Internet. At which of the following layers is this analysis taking place?

A. 1
B. 3
C. 5
D. 7
E. 6
A

E. 6

30
Q

Ann, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, she can access the Internet.
The network engineer has confirmed that Ann’s account has been set up the same as the others. There are no access lists restricting Ann’s access. Which of the following could be the issue for this lack of access?

A. Duplex/speed mismatch
B. VLAN mismatch
C. DNS server issue
D. DHCP server issue
E. Spanning tree blocked ports
A

B. VLAN mismatch

31
Q

A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport?

A. Perform a DNS lookup on the server.
B. Set up an SSH session to the desktop.
C. Reference the ARP table in the router.
D. Configure port security on the switch

A

C. Reference the ARP table in the router.

32
Q

A router is set up to utilize RIPv2 to route traffic throughout the network. Which of the following routing metrics is used to determine the path?

A. Distance
B. Bandwidth
C. Speed
D. Hop count

A

D. Hop count

33
Q

A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public IP

A

B. Virtual IP

34
Q

Which of the following can be done to implement network device hardening? (Choose two.)

A. Implement spanning tree
B. Perform VLAN hopping
C. Patch and update
D. Perform backups
E. Enable port mirroring
F. Change default admin password
A

C. Patch and update

F. Change default admin password

35
Q

A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?

A. Change the default password
B. Use a firewall in front of the device.
C. Update the firmware.
D. Upgrade the configuration.

A

C. Update the firmware.

36
Q

A technician has been alerted of incoming HTTP traffic on the LAN segment that should not contain any web servers. The technician has the IP address of the destination host and wants to determine if the socket for HTTP is open. Which of the following should the technician perform?

A. Baseline assessment
B. Packet analysis
C. Port scan
D. Patch-level assessment

A

C. Port scan

37
Q

Which of the following creates a secure remote connection at the OSI network layer?

A. L2TP
B. SSL
C. DTLS
D. IPSec

A

D. IPSec

38
Q

A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?

A. The cables have an incorrect pin-out.
B. The cables are UTP instead of STP.
C. The cables are Cat 6 instead of Cat 5.
D. The cables are not plenum rated.

A

A. The cables have an incorrect pin-out.

39
Q

A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks?

A. Install an IDS to monitor all traffic to and from the kiosks.
B. Install honeypots on the network to detect and analyze potential kiosk attacks before they occur.
C. Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks.
D. Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network.

A

D. Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network.

40
Q

While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?

A. dig
B. iptables
C. ifconfig
D. traceroute

A

A. dig

41
Q

A network administrator has had difficulty keeping track of IP address assignments on networking devices and clients recently. Which of the following is the BEST technology to aid in this scenario?

A. DNS
B. DHCP
C. IPAM
D. NTP

A

C. IPAM

42
Q

A technician is surveying a college’s network equipment rooms and connectivity. Which of the following types of documentation does the technician need to perform a detailed site survey? (Choose three.)

A. IDF/MDF documentation.
B. Cable run label documentation.
C. Network configuration documentation.
D. Performance baseline documentation.
E. Standard operating procedure documentation.
F. Change management documentation.
G. Rack diagram documentation.
A

A. IDF/MDF documentation.
C. Network configuration documentation.
G. Rack diagram documentation.

43
Q

A technician is connecting a PC to a switchport. At the wiring closet, the technician is unable to identify which cable goes from patch panel A connected to the switch to patch panel B connected to the PC. Which of the following tools should the technician use to resolve the issue?

A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR

A

C. Tone generator

44
Q

A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?

A. EAP-PEAP
B. CCMP-AES
C. WPA2-PSK
D. TKIP-RC4

A

A. EAP-PEAP

45
Q

Which of the following protocols are classified as connectionless? (Choose two.)

A. TFTP
B. FTP
C. HTTP
D. SNMP
E. SSH
F. IMAP
A

A. TFTP

D. SNMP

46
Q

Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?

A. Plug in a second spare cable at each end to double the speed.
B. Replace the switches with ones that utilize port bonding and use the spare cables.
C. Replace the switches with 10Gb switches and utilize the existing cabling.
D. Plug in a second cable and set one port to TX and one port to RX.

A

B. Replace the switches with ones that utilize port bonding and use the spare cables.

47
Q

A technician is downloading an ISO from a vendor’s website. To ensure the integrity of the download, which of the following should be verified?

A. File size
B. Vendor URL
C. File hashing
D. Encryption

A

C. File hashing

48
Q

An administrator wants to implement an additional authentication factor to the remote SSH servers. Which of the following accomplishes this goal with the principle of “something you have”?

A. Certificate
B. Pattern
C. Password
D. Fingerprint

A

A. Certificate

49
Q

A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office. Of which of the following types of IoT technologies is this an example?

A. LAN
B. WAN
C. SAN
D. PAN

A

D. PAN

50
Q

Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?

A. Private IP
B. Static IP
C. APIPA
D. Loopback
(NUM261)
A

C. APIPA