Test 6 Flashcards

1
Q
  1. A web server administrator has changed the domain registrars A record for the companys website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?

A. The NAT has not been configured to point to an internal resource.
B. An egress firewall rule is blocking access to the web server.
C. The IDS has determined it is a rogue web server.
D. The corporate DNS server has not been updated.

A

D. The corporate DNS server has not been updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

A. Multicast
B. Spanning tree
C. ICMP
D. SNMP

A

A. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?
A. Switching loop
B. ARP cache poisoning
C. Improperly tagged ports
D. Wrong VLAN assignment
E. Duplicate IP addresses
A

A. Switching loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

A. Allow communication through ifconfig.
B. Use netstat to open necessary ports.
C. Add access rules in iptables.
D. Employ arp to configure a new route.

A

C. Add access rules in iptables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A network administrator notices a wireless network with the SSID HOME-33BC-5G that has a high signal strength and open authentication. When the administrator connects to the SSID, corporate servers can be accessed. Which of the following has the network administrator discovered?
A. Evil twin
B. Man in the middle
C. Spoofing
D. Rogue AP
E. Wardriving
A

D. Rogue AP

“A rogue access point is specifically an AP inside a network not administered by the network owner, giving it unwanted access to network.

An evil twin is a copy of a legitimate access point not necessarily giving it access to a specific network or even to internet.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?
A. International export controls policy
B. Remote access policy
C. Privileged user agreement
D. Data loss policy
E. Service-level agreement
A

B. Remote access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A network technician is working on a new wireless project. The network manager has a primary requirement of achieving speeds of at least 1 Gbps when connected. Which of the following standards would be appropriate for the technician to implement?

A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11n

A

B. 802.11ac

  1. 11a 5 GHz 54 Mbit/s
  2. 11b 2.4 GHz 11 Mbit/s
  3. 11g 2.4 GHz 54 Mbit/s
  4. 11n 5 GHz and/or 2.4 GHz 600 Mbit/s
  5. 11ac 5 GHz ~6.8 Gbit/s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A company needs to implement a fault-tolerant server configuration after the failure of its database server. The company decides to implement load-balancing redundant servers. Which of the following should be used for file storage for the servers?

A. IDE
B. Cloud storage
C. SAN
D. iSCSI

A

C. SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate the router?

A. Diagram symbols
B. Rack diagram
C. Logical diagram
D. Port locations

A

B. Rack diagram

assuming the router is located in the mdf, rack diagram is the appropriate answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

A. Configure MIMO.
B. Remove the channel overlap.
C. Add another AP.
D. Adjust the security type.

A

C. Add another AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

A. Run a port scanner on each name server to ensure TCP port 53 is open and listening.
B. Run tracert from a desktop client to query each name server and see what answers are sent back from each server.
C. Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
D. Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

A

C. Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

“Both servers respond to queries made at the console.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?
A. Router
B. Layer 3 switch
C. Proxy server
D. Firewall
E. Intrusion detection system
A

D. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A companys Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

A. Additional PIN
B. Security questions
C. RSA token
D. Access control lists

A

C. RSA token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST question to ask to determine the scope of the issue?

A. What has been changed on the web server since the previous day?
B. Is the application online for the end user to access?
C. Does the user have access to the application?
D. Is this a system-wide issue or just a certain userג€™s issue?

A

A. What has been changed on the web server since the previous day?

the Correct answer is A
Identify the problem
• Information gathering, identify symptoms,
question users, Check Change management documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

A. RJ11
B. LC
C. BNC
D. F-type

A

B. LC

assuming the tech used the appropriate cables. Any copper cables would be subject to EMI. So it has to be fiber. LC (local connector) is a fiber connector type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?

A. PCI compliance
B. Database health check
C. Penetration test
D. Network baseline

A

C. Penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. An end-user at an Internet cafe tries to visit an online retailers website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitors page still loads. Which of the following BEST describes what is occurring?

A. Cross-site scripting
B. Session hijacking
C. Man in the middle
D. DNS poisoning

A

D. DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several
    SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?

A. DNS poisoning attack
B. Evil twin on the company network
C. ARP poisoning attack
D. Misconfigured VLAN on the local switch

A

C. ARP poisoning attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?

A. IDS
B. IPS
C. Layer 7 firewall
D. RADIUS server

A

A. IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

A. Man in the middle
B. A brute-force attack
C. A hash comparison
D. Rainbow tables

A

D. Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. A network technician is supporting a library system that wants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?

A. IR
B. Bluetooth
C. PAN
D. RFID

A

D. RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. A switch vendor recently released a patch to fix a critical vulnerability found in its switch OS. Which of the following should a network administrator do NEXT according to best practices?

A. Test the patch in a test environment.
B. Put the patch into production immediately.
C. Put the patch into production with a rollback plan.
D. Choose a single production switch and pilot the patch.
E. Put the patch into production at the next maintenance window.

A

A. Test the patch in a test environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Which of the following services describes a distribution model in which applications are hosted by a service provider and made available to users?

A. PaaS
B. SaaS
C. IaaS
D. MaaS

A

B. SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?

A. Verify user credentials.
B. Generate new keys and certificates.
C. Disable unnecessary services.
D. Hash files that will be stored.

A

C. Disable unnecessary services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. A companys receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

A. Implement WPA2-PSK.
B. Implement a captive portal.
C. Implement certificate-based 802.1X.
D. Implement MAC filtering.

A

B. Implement a captive portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. A consulting company was hired to project and deploy a new datacenter in a different city. This new facility must have the same components installed as the current datacenter to be ready to take over all the network services as soon as the primary site becomes unavailable. Which of the following describes what will be deployed in the new location?
A. Cold site
B. Hot site
C. Warm site
D. Off-site backup
E. Infrastructure as a service
A

B. Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

A. 10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.
B. 127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.
C. 172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.
D. 192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

A

B. 127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. A company is redesigning its office to remove the divider walls between desks and create an open collaboration area. All network cables are run through the divider walls, and a new wireless network will be installed. Which of the following sets of documents will need to be revised based on the new configuration?

A. Standard operating procedures and rack diagrams.
B. Inventory management forms and MDF inventory forms
C. Work instructions and performance baselines
D. Physical network layout and port locations

A

D. Physical network layout and port locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. Given the table below:

Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?

A. 192.168.5.1
B. 192.168.11.0
C. 192.168.11.255
D. 192.168.255.255

A

C. 192.168.11.255

Answer is correct bcz it will broadcast to C and D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. A senior technician is reconfiguring the companys firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?

A. The technician should put the junior teams lab in a VLAN and the phone system in the DMZ.
B. The technician should put the junior teams lab in a DMZ and the phone system in a VLAN.
C. The technician should put the junior teams lab in the LAN and the phone system in the WAN.
D. The technician should put the junior teams lab in the WAN and the phone system in a WLAN

A

B. The technician should put the junior teams lab in a DMZ and the phone system in a VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?

A. Punchdown tool
B. Crimper
C. OTDR
D. Loopback adapter

A

A. Punchdown tool

You need the need to physically punch-down the cable for conductivity. “demarcation ‘ is the key word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Which of the following properties should be configured to extend logical network separation on an uplink interface to a second switch?

A. 802.1Q trunking
B. Multiple untagged ports
C. Port mirroring
D. Management VLAN

A

A. 802.1Q trunking

Logical network separation is also known a VLAN, and 802.1Q is the IEEE standard that enables trunking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. A new datacenter is being created, and management is trying to control access to that area. Which of the following are the BEST choices for providing access to the new datacenter? (Choose two.)
A. Captive portal
B. Wireless IP camera
C. Biometrics
D. Key fob
E. Private key infrastructure
F. Access control list
A

C. Biometrics

D. Key fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. A network technician is capturing packets on the network and notices a UDP packet stream from a phone to the PBX system. The payload of the packet shows the phone downloaded the file cm7910-sccp-load-2995.xml. Which of the following protocols was MOST likely used to download this file?

A. SIP
B. TFTP
C. SSL
D. ICMP

A

B. TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. A server administrator is building an email server. To protect the corporate/internal network from external users, the email server should be placed:

A. on the intranet.
B. in a subnet isolated from the internal network.
C. on the company LAN segment.
D. in the DMZ.

A

D. in the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the companys network? (Choose three.)
A. 67
B. 68
C. 161
D. 636
E. 1720
F. 5060
G. 5061
A

E. 1720
F. 5060
G. 5061

Port 1720 is used by the H.323 teleconferencing protocol (most commonly encountered in Microsoft NetMeeting) during call setup negotiation.

Ports 5060 and 5061, both on TCP and UDP, are associated to the Session Initiation Protocol (SIP) by IANA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?

A. SFTP
B. SSH
C. SNMPv1
D. LDAPS

A

B. SSH

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?

A. Layer 2
B. Layer 3
C. Layer 6
D. Layer 7

A

D. Layer 7

it’s application becuase you can (See) ..GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. A network device compares a computed value of its major software components against a stored value. While the network device is loading, the device halts and alerts the administrator that the values are different. Which of the following is the name of the value in use, and what does this process provide? (Choose two.)
A. A snapshot
B. A hash
C. A password service
D. A key
E. Provides authentication
F. Provides integrity
G. Provides confidentiality
H. Provides availability
A

B. A hash

F. Provides integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. A flood disables the equipment in a companys server room. When implementing the disaster recovery plan, all operations are immediately transitioned to another location with momentary downtime. This is an example of a:

A. warm site.
B. cold site.
C. snapshot.
D. hot site.

A

D. hot site.

Per Mike Meyer’s book: Warm site should only take a day or 2 to bring online whereas a Hot Site should only take a few hours to bring online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. A network administrator is reviewing security logs and notes a strange IP address logging into the management console of a switch. The administrator verifies the switch is not using default credentials. Which of the following steps should the administrator take NEXT?

A. Implement restrictions via ACL.
B. Update firmware to the current version.
C. Disable unnecessary services.
D. Check the hash of the running firmware.

A

A. Implement restrictions via ACL.

42
Q
  1. Management asks a network technician to install a new connection between two main locations. Management requests that the connection be the fastest possible for data replication. Which of the following would be the MOST appropriate type?

A. PRI
B. ADSL
C. T3/E3
D. ISDN

A

C. T3/E3

T3/E3 Network Module provides high-speed WAN access for the Cisco routers

43
Q
  1. A user in the finance department can access the department printer and file server yet is unable to print to the marketing departments printer. A technician runs ipconfig and sees the following output:

IPv4 Address. . . . . . . . . . . : 192.168.0.101
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

The technician has verified the users PC is in the proper VLAN and sees an UP/UP status on the switchport. Which of the following is MOST likely causing the issue?

A. The userגs IP is the broadcast address.
B. The two printers share the same IP address.
C. There is an incorrect default gateway on the users PC.
D. The ARP table on the switch has not been cleared.

A

C. There is an incorrect default gateway on the users PC.

The Default Gateway is wrong. The correct Default Gateway would be 192.168.0.0 due to the /24 mask. The host cant Print to to a printer in the Department (which i guess is a different subnet). But due to the fact that the host cant send to the right default gateway he cant reach the other subnet

44
Q
  1. A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the technician configure?

A. ac
B. b
C. g
D. n

A

D. n

ac is only 5ghz, n is both 5ghz and 2.4ghz

45
Q
  1. To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

A. WPA2-Personal
B. WPA2-Enterprise
C. WPA
D. WEP

A

B. WPA2-Enterprise

46
Q
  1. A network technician is investigating a device that has been reported as responding slowly. Which of the following should the technician check FIRST?

A. Power status
B. Traffic analysis
C. Logical diagram
D. Utilization

A

D. Utilization

47
Q
  1. A network engineer utilizes a box of Cat5e cable in a datacenter for use between 10Gbps switches in a single rack. After the engineer finishes the installation, switch administrators notice random speed drops and intermittent connection issues. Which of the following is this an example of?

A. Incorrect cable type
B. Attenuation
C. Incorrect pinout
D. Bad ports

A

A. Incorrect cable type

Cat5e can support network operating speeds of 10 Mbps, 100 Mbps or 1000 Mbps.

48
Q
  1. A document outlining the types of actions allowed on the corporate network would be BEST defined as an:

A. AUP.
B. NDA.
C. MOU.
D. MOA.

A

A. AUP

Acceptable Use Policy

In Acceptable Use Policy, School Policy, Teachers
What is an Acceptable Use Policy?
what is an Acceptable Use PolicyAn Acceptable Use Policy (AUP) is an important document which governs students’ use of the internet at school and covers a wide range of issues surrounding the rights, responsibilities and privileges – as well as sanctions – connected with computer use.

49
Q
  1. Which of the following may state: “Employees may not browse social media websites from company-owned computers?”

A. AUP
B. BYOD
C. NDA
D. SLA

A

A. AUP

Acceptable Use Policy

In Acceptable Use Policy, School Policy, Teachers
What is an Acceptable Use Policy?
what is an Acceptable Use PolicyAn Acceptable Use Policy (AUP) is an important document which governs students’ use of the internet at school and covers a wide range of issues surrounding the rights, responsibilities and privileges – as well as sanctions – connected with computer use.

50
Q
  1. A technician is performing a site survey in an area of a university where both faculty and students are reporting poor performance of their wireless connections.
    The technician gathers the following data in the problem area:

Which of the following would MOST likely resolve the issue?

A. There are too many wireless clients. Increase the number of APs to handle the traffic load.
B. The SNR is not at an acceptable level. Change the channel on the APs.
C. The signal strength is too low. Replace the equipment with devices that have better radio antennas.
D. The channel numbers on some APs are invalid. Switch AP2 and AP3 to use channel 1.
E. The type of antenna is inappropriate for the environment. Switch to 13dBi Yagi antennas.

A

B. The SNR is not at an acceptable level. Change the channel on the APs.

51
Q
  1. A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?

A. Remote desktop gateway
B. Transport mode IPSec
C. SSH tunneling
D. TLS VPN

A

D. TLS VPN

SSL/TLS VPN products protect application traffic streams from remote users to an SSL/TLS gateway. In other words, IPsec VPNs connect hosts or networks to a protected private network, while SSL/TLS VPNs securely connect a user’s application session to services inside a protected network.

52
Q
  1. A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks. A technician installs software on one of the web servers to allow communication to the companys file server, but it is unable to connect to it. Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?

A. The lab environments IDS is blocking the network traffic. The technician can whitelist the new application in the IDS.
B. The lab environment is located in the DMZ, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the administrator.
C. The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch.
D. The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back. The technician can submit a request for upgraded equipment to management.

A

B. The lab environment is located in the DMZ, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the administrator.

53
Q
  1. An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization, and auditing?

A. MS-CHAP
B. RADIUS
C. LDAPS
D. RSTP

A

B. RADIUS

RADIUS is primarily used for authentication.

54
Q
  1. A network administrator has set up a corporate network at a branch office. Users are able to log into the wireless network with their network credentials after they accept the company root certificate. Which of the following is the wireless network MOST likely using?

A. WPA2 Enterprise with PSK
B. WPA2 Personal with PEAP
C. WPA2 Enterprise with Kerberos
D. WPA2 Personal with LEAP

A

C. WPA2 Enterprise with Kerberos

55
Q
  1. Ann, a network technician, set up a new server and enabled the host-based firewall. She attempts to connect to the server from several different workstations using RDP but is not successful. Which of the following ports on the firewall should she verify is open?

A. 22
B. 389
C. 443
D. 3389

A

D. 3389

56
Q
  1. A network administrator is setting up a wireless network with poor security for a computer science class to hack. Which of the following security methods would be MOST easily circumvented?

A. MAC filtering
B. WPA
C. WPA2
D. Shared key

A

D. Shared key

57
Q
  1. Given the table below:

Which of the following describes the output?

A. Error rate
B. Network baseline
C. Traffic analysis
D. Port scan

A

D. Port scan

58
Q
  1. Which of the following are reasons for enabling jumbo frames? (Choose two.)
A. To increase payload size
B. To increase bandwidth
C. To provide additional SANs storage capacity
D. To implement larger SQL queries
E. To reduce CPU overhead
A

A. To increase payload size
B. To increase bandwidth

Jumbo frames increase bandwidth since each frame carries more data per frame header, as there is more data per frame than a normal frame.
Wikipedia said: “Jumbo frames have the potential to reduce overheads and CPU cycles”.

59
Q
  1. A technician set up a small network, which is not connected to the company LAN, for several employees to play a peer-to-peer networking game during breaks.
    The users know how to set up the software, but they do not know anything about networking. The technician has wired the network but has not configured any networking information and does not want the employees to have access outside the network. Which of the following should be used to apply addressing to the network?

A. NAT
B. VLSM
C. APIPA
D. CIDR

A

C. APIPA

APIPA allows you to communicate with people within the LAN but can not communicate outside the LAN.

60
Q
  1. A network manager has received reports that some employees have been using the companyג€™s WiFi to log onto their social media accounts from their personal devices. The network manager is looking for a solution to prevent this type of activity. The Chief Information Officer (CIO) wants to continue using a pre-shared key and add an additional layer of security to allow only authorized users to authenticate to the WiFi. Which of the following solutions would address this request?
    (Choose two.)
A. Port security
B. MAC filtering
C. Geofencing
D. 802.1X
E. Proxy server
F. SSO
A

B. MAC filtering
E. Proxy server

1) The network manager is looking for a solution to prevent this type of activity (user logging to social media account using company network)
Solution: proxy server

2) CIO wants additional layer of security to allow only the authorized user to login to wireless network .
Answer : MAC address filtering.

61
Q
  1. A network administrator discovered a rogue access point was sending a signal from inside the corporate headquarters. Which of the following would prevent the access point from providing access to the companys internal network?

A. Disabling unnecessary services
B. Placing unused ports in a separate VLAN
C. Enabling BPDU guard
D. Configuring a geofence at the corporate boundary

A

B. Placing unused ports in a separate VLAN

62
Q
  1. A network technician is reviewing network logs and notices about 30,000 different hosts have been trying to hit the company employees database server for the past week. However, none of the hosts are known to the network. Which of the following is MOST likely occurring within the network?

A. ARP poisoning
B. Brute forcing
C. SQL injection
D. Distributed DoS

A

D. Distributed DoS

63
Q
  1. To which of the following does a BYOD policy pertain?

A. Confidentiality of company information
B. Employment of ex-staff by a companys competitors
C. Use of company assets and resources
D. Use of personal equipment on the company network

A

D. Use of personal equipment on the company network

64
Q
  1. A network technician is preparing for an upcoming department expansion project and is reviewing the standard on private IP addressing. Which of the following IP addresses fall into these address ranges? (Choose two.)
A. 172.30.11.11
B. 172.32.33.33
C. 172.33.44.44
D. 192.168.200.201
E. 192.169.3.125
A

A. 172.30.11.11
D. 192.168.200.201

  1. 0.0.0/8 IP addresses: 10.0.0.0 – 10.255.255.255
  2. 16.0.0/12 IP addresses: 172.16.0.0 – 172.31.255.255
  3. 168.0.0/16 IP addresses: 192.168.0.0 – 192.168.255.255
65
Q
  1. A network engineer is adding a switch uplink to an existing IDF. Upon inspection, the engineer finds that there are only two strands of single-mode fiber in the IDF, and both strands are in use. Which of the following solutions should the engineer use to provide an additional switch uplink without installing new fiber optic cabling?

A. Install bidirectional transceivers.
B. Install SFP+ transceivers.
C. Install media converters.
D. Install duplex transceivers.

A

A. Install bidirectional transceivers.

66
Q
  1. Which of the following DHCP settings defines the range of dynamic IP addresses?

A. Exclusions
B. Pool
C. Reservations
D. Scope options

A

B. Pool

67
Q
  1. A technician has designed a LAN with redundant switches. Which of the following should be configured to ensure network availability?

A. VLAN
B. Scope options
C. Spanning tree
D. Flood guard

A

C. Spanning tree

68
Q
  1. Which of the following devices acts as a multiport repeater at the physical layer of the OSI model?

A. Switch
B. Bridge
C. Hub
D. Transceiver

A

C. Hub

69
Q
  1. A network technician is installing a network printer in a factory setting. The connection from the switch contains an LC connector, yet the printer only supports an RJ45 connector. Which of the following should the technician use?

A. Range extender
B. Media converter
C. Multilayer switch
D. Load balancer

A

B. Media converter

70
Q
  1. A network technician is investigating why a user cannot print to the network printer. The technician wants to determine if anything has changed. Which of the following actions would be the BEST example of this troubleshooting step?

A. Attempt to log in from another computer with the users credentials.
B. Log into the switch and reconfigure the printer port.
C. Review the maintenance logs from the night before.
D. Reinstall print drivers on the users machine.

A

C. Review the maintenance logs from the night before.

71
Q
  1. Which of the following can be used to enable and translate the communication between legacy non-IP phone systems with solutions for voice communications that can run over the Internet?
A. Media converter
B. RTP
C. ISDN service
D. VoIP gateway
E. SIP trunk
A

D. VoIP gateway

A VoIP gateway is a hardware device that converts telephony traffic into packets of data for transmission over the internet. A VoIP gateway is different from an ATA because an ATA (also called a VoIP box) converts one phone at a time; some of the largest VoIP gateways can support up to 256 calls at a time.

72
Q
  1. A host has an IP address of 172.28.57.144 and is on the 172.28.57.128 subnet. Which of the following is a correct subnet mask of the host?

A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.240
D. 255.255.255.248

A

B. 255.255.255.192

because we know the subnet is 128. all you have to do is add 64 to find the subnet mask

73
Q
  1. Which of the following relies on metrics such as total number of connections or CPU/RAM usage to help maintain performance and availability?

A. Round robin
B. Distributed file system
C. NIC teaming
D. Load balancing

A

D. Load balancing

74
Q
  1. A network technician is running copper cable from a core switch to a network closet that is approximately 574ft (175m) away. Which of the following should the technician use to accomplish this?

A. Bridge
B. Hub
C. Patch panel
D. Load balancer

A

A. Bridge

A bridge is a type of computer network device that provides interconnection with other bridge networks that use the same protocol. Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them.

75
Q
  1. Joe, an employee, wants to copy text from a message on his corporate email account to a new message on his personal email account. However, the copy and paste functions of the clipboard are grayed out and unavailable. Which of the following policies would be responsible for this behavior?

A. Remote access policy
B. Licensing policy
C. BYOD policy
D. DLP policy

A

D. DLP policy

DLP applies to data loss & data confidentiality

76
Q
  1. A network administrator has been experiencing slow performance and file errors when attempting to utilize server utilities. The administrator needs to ensure the system files on the server have not been modified. Which of the following should be used to ensure the server files have not been compromised?

A. Performance baseline
B. File hash
C. Iptables
D. tcpdump

A

B. File hash

77
Q
  1. A network technician is helping to install 50 Cat6a drops from users computers into an IDF. Which of the following is the termination point at the IDF?

A. A breakout box
B. A 66 block
C. A 110 block
D. A patch panel

A

D. A patch panel

It’s absolutely patch panel. Usually 110 blocks are used for old telecommunication systems and 66 blocks are even older versions of those.
Since these are RJ-45 connections to a Cat6a, it’s likely we would be terminating at a Patch Panel.

78
Q
  1. Which of the following would MOST likely provide continuous power during a short brownout?
A. Uninterruptible power supply
B. Hot site
C. Cold site
D. Generator
E. Redundant power supplies
A

A. Uninterruptible power supply

79
Q
  1. A network analyzer captures traffic from a host that is sending 802.1q traffic to a Layer 3 switch. Which of the following attacks is occurring?

A. MITM
B. VLAN hopping
C. ARP poisoning
D. Spoofing

A

B. VLAN hopping

802.1q = vlan

80
Q
  1. A network administrator needs to install a new 6U switch in the third-floor IDF. Which of the following should the administrator consult to make sure space is available?

A. Network baseline documentation
B. Rack diagram
C. Inventory management documentation
D. Logical diagram

A

B. Rack diagram

81
Q
  1. A network technician needs to install new network cables. The technician will be running the cables in the air return space above the drop ceiling. Which of the following cable types should be installed?

A. Plenum
B. Coaxial
C. Shielded twisted pair
D. Fiber optic

A

A. Plenum

“The technician will be running the cables in the air return space above the drop ceiling”
Whenever you see anything about cables being ran in the ceiling, it’s going to be plenum cabling, which is ethernet with a special coating. NOT fiber otic.

82
Q
  1. Which of the following can be used to provide connectivity to a network storage server without the need for dedicated switches and cabling? (Choose two.)
A. Fibre Channel
B. FCoE
C. InfiniBand
D. iSCSI
E. SATA
A

B. FCoE

D. iSCSI

83
Q
  1. A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method of authentication. Which of the following should be configured to provide connectivity and minimal security to the new network? (Choose two.)
A. Pre-shared key
B. Open authentication
C. PEAP
D. MAC filtering
E. EAP-FAST
F. EAP-TLS
A

A. Pre-shared key

D. MAC filtering

84
Q
  1. A new employee is unable to access any network resources. All other users are able to access the network at 100Mbps. No IP address, subnet mask, or default gateway is displayed on the new employee’s workstation. The network administrator reterminates all connectors using the correct standard. Upon further investigation, the network administrator also notices the following:
    Wire map results from the user patch cable to the patch cable connecting to the switch:
    ✑ Pins 5 and 7 are short.
    ✑ The distance is 200ft (61m).
    Additional observations on the switch:
    ✑ The VLAN is set correctly.
    ✑ The port is not disabled.
    ✑ The duplex/speed settings are correct.
    ✑ Port LEDs are off for that port.
    ✑ The port is set to untagged.
    Which of the following is the MOST likely reason the new employee is having network issues?
A. Bad switchport
B. Incorrect pinout
C. Open/short
D. VLAN mismatch
E. Distance limitation
A

A. Bad switchport

The administrator reterminated all the connectors using the correct standard, so the only choice it could possibly be is a bad switchport

85
Q
  1. Which of the following would MOST likely contain information about credential reuse?

A. Acceptable use policy
B. Password policy
C. Non-disclosure agreement
D. Remote access policy

A

B. Password policy

Password policies apply to your credentials nearly just as much as your passwords.

86
Q
  1. An ARP request is broadcasted and sends the following request:
    “Who is 192.168.1.200? Tell 192.168.1.55”
    At which of the following layers of the OSI model does this request operate?

A. Application
B. Data link
C. Transport
D. Network E: Session

A

B. Data link

ARP happens at layer 2, where switches operate
Two types of Data Link layer devices are commonly used on networks: bridges and switches. A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the bridge and can forward packets accordingly.

87
Q
  1. A network technician needs to replace a failed hard drive on a server at the companys large, remote datacenter. Which of the following types of documentation should be reviewed to locate this server easily?

A. Logical diagrams
B. Rack diagrams
C. Change management
D. Standard operating procedures

A

B. Rack diagrams

88
Q
  1. A VoIP device is not getting power at a new users desk. The technician tests the components with a PoE injector at the switch and resolves the issue. Which of the following is the MOST likely cause of the issue?
A. VLAN mismatch
B. Bad switchport
C. TX/RX reverse
D. Latency
E. Damaged cable
A

E. Damaged cable

89
Q
  1. A network manager is drafting a document that outlines what employees can and cannot do when using personal tablets that are connected to the network. Which of the following is the manager drafting?

A. An AUP policy
B. A BYOD policy
C. A DLP policy
D. An NDA policy

A

B. A BYOD policy

90
Q
  1. A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?

A. Network configuration
B. Change management documentation
C. Work instructions
D. Performance baseline

A

C. Work instructions

91
Q
  1. A user is reporting poor network performance. A network technician starts by looking at port statistics on that users connected switchport. The technician notices there is a high level of collisions on the port. Which of the following is the MOST likely cause?

A. The port or users NIC is set to auto-MDIX.
B. The port and/or users NIC is set to half-duplex.
C. The port and/or users NIC is set to the wrong MTU.
D. The port and users NIC are set to different speeds.

A

B. The port and/or users NIC is set to half-duplex.

92
Q
  1. Which of the following is a purpose of a syslog server?

A. Aggregates switch logs for easier review and correlation
B. Polls SNMP-enabled server logs for current status
C. Distributes logging applications to monitoring servers
D. Purges switch logs when they reach capacity

A

A. Aggregates switch logs for easier review and correlation

syslog servers are meant to store network device logs for review and analyzation. This includes repeaters, hubs, switches, routers, etc.

93
Q
  1. Which of the following devices will intelligently attempt to relieve the network of an assumed threat after sampling a packet stream?

A. IDS
B. Content filter
C. Firewall
D. IPS

A

D. IPS

94
Q
  1. The lack of which of the following components might make a virtual router less efficient than a physical router?

A. ASIC
B. Hardware MAC
C. Jumbo frame
D. MPLS

A

A. ASIC

ASIC is a chip that can be programmed for a multitude of tasks, which virtual routers do not have.

95
Q
  1. A company has a DNS record for the following address: products.companyXYZ.com. The company would like to add another record, sales.companyXYZ.com, which continually points to the same IP address as products.companyXYZ.com. Which of the following DNS record types would BEST accomplish this?
A. MX
B. CNAME
C. SRV
D. A
E. AAAA
F. PTR
A

B. CNAME

96
Q
  1. A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away in the mesh network.
    Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

A. Add more access points to the mesh network.
B. Increase transmit power levels on the access points.
C. Physically connect more access points.
D. Change the antenna type on the WAPs.

A

C. Physically connect more access points.

Some Mesh APs are just wireless repeaters… so wireless AP VS Wired AP

97
Q
  1. A network administrator needs to access a remote site and log into the site switch using secure methods. The administrator first has to gain access to the server
    GUI. Which of the following access control methods will be used?

A. RDP
B. VPN
C. Telnet
D. SSH

A

A. RDP

The administrator “first” has to gain access to the server
GUI

98
Q
  1. A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

A. Allow RDP connections through the firewall.
B. Install VNC clients on the sales representatives machines.
C. Create an SSL VPN for remote access to the network.
D. Place all servers in the publicly available DMZ.

A

C. Create an SSL VPN for remote access to the network.

99
Q
  1. A network administrator is attempting to limit the installation of malware on company workstations. The administrator wants to remove root access from the user accounts. Which of the following is this an example of?

A. Changing default credentials
B. Limiting spoofing
C. Role separation
D. Port security

A

C. Role separation

100
Q
  1. Which of the following represents where the ISPs WAN connection is handed off to the local network?

A. Demilitarized zone
B. Intermediate distribution frame
C. Extranet
D. Demarcation point

A

D. Demarcation point