TEST 5 Flashcards
A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? (Choose two.)
A. FTP B. SMTP C. VPN D. SSH E. SNMP
C. VPN
D. SSH
A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?
A. File hash
B. File date
C. File type
D. File size
A. File hash
A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)
A. tracert B. ping C. tcpdump D. pathping E. netstat F. nslookup G. route
A. tracert
D. pathping
Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?
A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF
A. CSMA/CD
A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the MOST likely cause of this issue?
A. DHCP exhaustion
B. Channel overlapping
C. Interference
D. Overcapacity
D. Overcapacity
Which of the following BEST describes an exploit?
A. A router with default credentials
B. An open mail relay server
C. An SNMPv1 private community
D. A privilege escalation script
D. A privilege escalation script
A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?
A. Load balancer
B. IDS
C. Proxy server
D. Wireless controller
C. Proxy server
A technician is setting up VoIP phones on a wireless network. Users report that calls are choppy and sometimes dropped. The technician has measured two characteristics using simple command-line tools that verify the problem. Which of the following characteristics did the technician measure? (Choose two.)
A. Reflection B. Latency C. Interference D. Packet loss E. Signal-to-noise ratio F. Attenuation
B. Latency
D. Packet loss
Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?
A. UDP port 22 B. TCP port 22 C. TCP port 25 D. UDP port 53 E. UDP port 69
E. UDP port 69
A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements?
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?
A. The router has a time-based ACL, applied for the network segment.
B. A light source is creating EMI interference, affecting the UTP cabling.
C. Nightly backups are consuming excessive bandwidth.
D. The user has violated the AUP, and Internet access has been restricted.
D. The user has violated the AUP, and Internet access has been restricted.
A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to BEST meet this requirement?
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
B. Install a BPDU guard on switchports and enable STP.
C. Create a DMZ for public servers and secure a segment for the internal network.
D. Install antivirus software and set an ACL on the servers.
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?
A. iSCSI
B. Fibre Channel
C. NAS
D. InfiniBand
C. NAS
A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC-to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?
A. Replace SFP with a new one.
B. Fall back to the old switch.
C. Transpose the fiber pairs.
D. Replace multimode with single-mode cable.
C. Transpose the fiber pairs.
A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?
A. UTP
B. Multimode
C. Coaxial
D. Serial
C. Coaxial
A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?
A. PVC Cat 5
B. Plenum Cat 5e
C. Plenum Cat 6a
D. PVC Cat 7
C. Plenum Cat 6a
Which of the following physical security devices is used to detect unauthorized server room access?
A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance
D. Video surveillance
A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?
A. nmap
B. pathping
C. route
D. nslookup
A. nmap
Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?
A. Incident response policy
B. BYOD policy
C. DLP policy
D. Remote access policy
B. BYOD policy
A technician is allocating the IP address space needed for a new remote office. This office will contain the engineering staff with six employees and the digital marketing staff with 55 employees. The technician has decided to allocate the 192.168.1.0/24 block to the remote office. The engineering staff has been allocated the 192.168.1.64/29 subnet. Using the LEAST amount of space possible, which of the following would be the last usable IP address in the engineering subnet?
A. 192.168.1.62
B. 192.168.1.63
C. 192.168.1.70
D. 192.168.1.71
A. 192.168.1.62