Topic 2: Network Installation & Configuration Flashcards
Which of the following standards can operate at either 20MHz or 40MHz channel spacing? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Answer: D
Explanation:
The 2.4 GHz ISM band is fairly congested. With 802.11n, there is the option to double the bandwidth per channel to 40 MHz which results in slightly more than double the data rate. However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band, which in many areas may prove to be infeasible. The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacent channel spaced ±20 MHz away. The primary channel is used for communications with clients incapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean of
the primary and secondary channels.
A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
A. The proxy server is set incorrectly.
B. The Ethernet cable is pinched.
C. The network gateway is set incorrectly.
D. The IP address is set incorrectly.
Answer: C
Explanation:
When user is able to ping everything in its own subnet that means that all the hosts are reachable however when you are not able to ping anything outside of this subnet then please check if the device is sending traffic to the correct host who should forward it to the further devices.
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice? A. Wide Area Network B. NAT C. Virtual PBX D. Virtual LAN
Answer: C
Explanation:
Virtual PBX, a business phone system providing call routing, follow-me calling, voice-mail, faxmail, and ACD queues with no customer installed equipment.
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO). A. Proxy server B. Traffic shaping C. Caching engines D. Load balancing E. Quality of service
Answer: B,E
Explanation:
Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate. QoS (Quality of Service) is a major issue in VOIP implementations. The issue is how to guarantee that packet traffic for a voice or other media connection will not be delayed or dropped due interference from other lower priority traffic.
Things to consider are:
Latency: Delay for packet delivery
Jitter: Variations in delay of packet delivery
Packet loss: Too much traffic in the network causes the network to drop packets
Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems? A. Firewalls B. VLANs C. Channels D. Antenna types
Answer: C
Explanation:
Protocol requires 16.25 to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other.
Channels 1, 6, and 11 are the most common channels to choose, and most routers will use one of them as the default channel—but the general idea is to be as far away from everybody else as you can.
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Answer: B Explanation: The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.) Hypothetical speed Range(indoors) Range(outdoors) 11 Mbits/s 50 m 200 m 5.5 Mbits/s 75 m 300 m 2 Mbits/s 100 m 400 m 1 Mbit/s 150 m 500 m
A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? A. STP B. PoE C. VTP trunking D. Port forwarding
Answer: B
Explanation:
Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem? A. Incorrect service set identifier B. Low signal strength or interference C. Incorrect encryption scheme D. Incorrect IP address or subnet mask
Answer: B
Explanation:
This generally happens when the signals are weak in any particular area and any movement can make you lose connectivity to the internet. In his case you can try to increase the radio power so that the signal strength can be increased.
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO). A. Routing table B. Next hop C. Port mirroring D. Port monitoring E. VLANs
Answer: C,E
Explanation:
Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion detection system, passive probe or real user monitoring (RUM) technology that is used to support application performance management (APM).
In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or VLAN.
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause? A. VLAN tag mismatch B. Wrong subnet mask C. Smurf attack D. Faulty routing rule
Answer: D
Explanation:
This happens when the DNS server is able to resolve the URL but there can be a conflicting route pointing to somewhere else rather than to the correct device who is responsible for routing traffic to the internet.
During a disaster recovery test, several billing representatives need to be temporarily setup to take
payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.
Answer: D
Explanation:
WPA2 is a security technology commonly used on Wi-Fi wireless networks. WPA2 (Wireless Protected Access 2) replaced the original WPA technology on all certified Wi-Fi hardware since 2006 and is based on the IEEE 802.11i technology standard for data encryption.
Which of the following wiring distribution types, often found in company closets, is used to connect
wiring from individual offices to the main LAN cabling?
A. MDF
B. 66 block
C. IDF
D. Patch panel
Answer: D
Explanation:
A patch panel, patch bay, patch field or jack field is a number of circuits, usually of the same or similar type, which appear on jacks for monitoring, interconnecting, and testing circuits in a convenient, flexible manner.
Which of the following is the difference between 802.11b and 802.11g? A. Distance B. Frequency C. Speed D. Transmission power
Answer: C
Explanation:
802.11b has a maximum speed of 11Mbps whereas 802.11g has a speed of 54Mbps.
Which of the following connectors is usable in SFP modules? A. ST B. LC C. LX D. SX
Answer: B
Explanation:
LC connector is used in SFP modules.
A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem? A. Incompatible network card B. Channel overlap C. Latency D. WEP encryption
Answer: B
Explanation:
To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs.
A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer’s wireless network to improve connectivity to the wireless network?
A. Change the SSID to match other wireless networks for increased throughput.
B. Change the encryption type to a different mechanism to avoid interference.
C. Change the channel to a different channel than the other wireless networks.
D. Change the WAP to a different manufacturer than the other wireless networks.
Answer: C
Explanation:
To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. You can use any other channel instead of the one that you are using.
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP? A. NetBIOS name filtering B. IP address filtering C. MAC address filtering D. Computer name filtering
Answer: C
Explanation:
MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
A. Create a MAC filter containing the current users.
B. Turn off SSID broadcast.
C. Change the encryption type to AES 256-bit for current users.
D. Reduce the signal strength to 0 percent.
Answer: A
Explanation:
MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? A. WAP placement B. TX/RX channel C. Signal strength D. Transmission power
Answer: A
Explanation:
Before going ahead with the deployment, the first thing that need to be check is where you are going to place your wireless router so that you can have internet connectivity from every location that you need.
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO). A. SNMP B. Network sniffer C. Syslog D. System log E. History log
Answer: A,C
Explanation:
Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Syslog is a standard for computer message logging. It permits separation of the software that
generates messages from the system that stores them and the software that reports and analyzes them.
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement? A. EAP-PEAP B. MAC ACL C. EAP-TTLS D. MS-CHAPv2
Answer: C
Explanation:
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. EAP is an authentication framework providing for the transport and usage of keying material and parameters generated by EAP methods.
A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem? A. Low PoE wattage B. Opposing antenna polarizations C. Short distance between antennas D. WPA 2 encryption
Answer: B
Explanation:
The polarization of an antenna is the orientation of the electric field (E-plane) of the radio wave with respect to the Earth’s surface and is determined by the physical structure of the antenna and by its orientation. It has nothing in common with antenna directionality terms: “horizontal”, “vertical”, and “circular”. Thus, a simple straight wire antenna will have one polarization when mounted vertically, and a different polarization when mounted horizontally.
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
Answer: C
Explanation:
PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet and rlogin.
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation? A. Environmental monitor B. Multimeter C. Toner probe D. Protocol analyzer
Answer: D
Explanation:
A “Protocol analyzer” is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel.
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause? A. Port speed mismatch B. Faulty F-connectors C. Bad wiring D. Bad switch
Answer: C
Explanation:
Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause.
After a new user moves furniture into a cubicle, the computer does not connect to the network any
longer. Which of the following would be the MOST likely reason? (Select TWO).
A. Bad Ethernet switch port
B. TX/RX reversed
C. Bad connectors
D. Bad patch cable
E. Mismatched MTU
Answer: C,D
Explanation:
It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement.
Which of the following performance benefits would multiple domain controllers BEST provide? A. Fault tolerance B. Caching engine C. Proxy server D. Quality of service
Answer: A
Explanation:
Fault-tolerant design is a design that enables a system to continue its intended operation, possibly at a reduced level, rather than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in response time in the event of some partial failure
After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?
A. The new user is downloading large files.
B. The router failed, flooding the network with beacons.
C. The new user’s IP address is a duplicate.
D. A switching loop was created.
Answer: D
Explanation:
A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network.
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet? A. ISDN B. Cable modem C. DSL D. Dial-up networking
Answer: C
Explanation:
Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network.
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
A. Encryption set to Open in all Buildings
B. Encryption set to Open in Building B
C. Encryption set to WEP in Building B
D. Channel set to 11 in Building B
Answer: B
Explanation:
Because the building B is in the middle, the wireless access router will have reachability to the building A and C. Now, the only thing that we need to do is to open the Wireless access on B for the guest users for the WAP in B so that the users coming to building A and C can get access to internet using the open connection.
Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?
Building ABuilding BBuilding C
Channel: 1Channel: 6Channel: 11
Encryption: WPA2Encryption: OpenEncryption: WPA2
SSID. CorpSSID. GuestSSID. Sales
A. Change Channel in Building B to 7
B. Change Encryption in Building B to match A and C
C. Change Channel in Building C to 1
D. Change SSID in Building C to match Building A
Answer: D
Explanation:
The configuration difference between users in building A and C is that they have same encryption however the SSID is different so the user has to manually authenticate and connect to the network whenever he will move between buildings. If the SSID’s are same then he will not have to authenticate himself again and he will get automatic connectivity.
A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).
A. That there is strong encryption enabled and configured on the access point.
B. The user’s home network has a correctly completed WHOIS entry.
C. The access point is broadcasting the SSID based upon manufacturer’s standards.
D. There are no conflicts of channels in use by neighboring wireless networks.
E. There are redundant internal DNS names set in the access point’s settings.
F. That the access point’s MAC address is properly set in its configuration settings.
Answer: A,D
Explanation:
Strong encryption is required to keep the user’s internet safe and secure so as to avoid misuse of the internet connection and to ensure that channel conflicts are not there so that the signals do not compete with each other and user start to face intermittent connection.
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a: A. man-in-the-middle attack B. rogue access point C. evil twin D. packet sniffer
Answer: B
Explanation:
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack.
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST? A. VLAN settings B. History logs C. Patch cable D. Port security
Answer: C
Explanation:
A patch cable or patch cord or patch lead is an electrical or optical cable used to connect (“patchin”) one electronic or optical device to another for signal routing.
Which of the following can be used to limit wireless network access to a single computer? A. Configure PPP B. Packet sniffing C. MAC address filtering D. Omni-directional antennas
Answer: C
Explanation:
Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your wireless network. You can either permit or prevent specific wireless computers and devices access to your wireless network.
A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions? A. A VPN concentrator B. A switch C. A router D. A firewall
Answer: C
Explanation:
A router is a device which is capable of performing entire task required by the business owner.
A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?
A. Run the dig command on the workstation.
B. Run the nslookup command on the workstation.
C. Run the ipconfig command on the workstation.
D. Run the ifconfig command on the workstation.
Answer: D
Explanation:
The “ifconfig” command allows the linux/unix operating system to setup network interfaces and allow the user to view information about the configured network interfaces.
Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?
A. Alter the domain account login policies to reflect the most common application rule sets.
B. Ensure that the user accounts are properly configured in domain services.
C. Implement a software solution that facilitates single sign-on authentication.
D. Increase the time between mandatory password changes by a factor of three.
Answer: C
Explanation:
A single signon permits a user to enter one name and password in order to access multiple applications
A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take? A. Document findings B. Identify the problem C. Escalate the problem D. Establish a plan of action
Answer: C
Explanation:
It is better to escalate the problem if you are not aware of the situation as it saves downtime and keeps customer happy.
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power? A. 96W B. 168W C. 240W D. 369.6W
Answer: B
Explanation:
The switch supports 168W to power all the phones at full power.
Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?
A. Decrease signal strength on the antenna
B. Change the wireless channel on the WAP
C. Change the device placement to further obfuscate the signal
D. Set up encryption on the WAP and clients
Answer: D
Explanation:
The encryption will help the clients and server to uniquely identify themselves in an interfering environment
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing? A. 802.1q B. Collision avoidance C. Port mirroring D. STP
Answer: A
Explanation:
Encapsulation is the term associated with 802.1q which is enabled by default on many devices.
A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT?
A. Ask the users for more information, such as which applications were not functioning.
B. Power-cycle the switch that the users share to clear out cached DNS records.
C. Escalate the issue to the network administrator to have their domain credentials reset.
D. Close and document the service call, as there was no actual issue affecting the users.
Answer: A
Explanation:
Because the system was up and running when the technician reached there, he can ask for applications that were not working or can ask for more information so that he can isolate the problem. Power cycling will not help because the system is already up and recycling can wipe out logs. Escalation will also not help because the system is now up and running. Closing the call will be unfair because the same instance can occur again.
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?
A. Power-cycle the computers and switches to re-establish the network connection.
B. Re-run the network cabling through the ceiling alongside the lights to prevent interference.
C. Test the wiring in the network jacks for faults using a cable verifier.
D. Re-run the network cabling so that they are 12 inches or more away from the electrical lines.
Answer: D
Explanation:
The electric cables create electric field around them and can interrupt in internet connectivity as well. It is quite possible that this is the cause which is creating the connectivity issue.
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this? A. MPLS B. Caching engines C. QoS D. Load balancing
Answer: C
Explanation:
QoS is the service where you can prioritize traffic running over one protocol as compared to the other. It is very similar to the term where you are opening a VIP queue for allowing that traffic to pass.
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability? A. Wrong encryption type B. SSID mismatch C. Signal bounce D. Incorrect channel
Answer: C
Explanation:
Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open.
Which of the following protocols is MOST commonly associated with VoIP? A. LDAP B. HTTPS C. SIP D. SCP
Answer: C
Explanation:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host? A. nslookup B. ping C. traceroute D. route
Answer: C
Explanation:
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection.
Which of the following is needed when using WPA2-Enterprise wireless encryption? A. TFTP B. RADIUS C. LDAP D. IPSec
Answer: B
Explanation:
The WPA2 standard supports two different authentication mechanisms: one using standard RADIUS servers and the other with a shared key, similar to how WEP works.
A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex? A. Transmission speed B. Frequency C. Auto-negotiate D. Distance
Answer: C
Explanation:
Autonegotiation is an Ethernet procedure by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. In this process, the connected devices first share their capabilities regarding these parameters and then choose the highest performance transmission mode they both support.
The DHCP server leases IP addresses 10.162.233.158 to WBAC11 for a period of 14 days. At which of the following times would WBAC11 send an initial request to the DHCP server to renew the IP address lease? A. Day 4 B. Day 6 C. Day 8 D. Day 10
Answer: C
A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs? A. Mirroring B. Trunking C. Authenticating D. Bonding
Answer: B
A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause? A. SSID mismatch B. Incorrect WPA key C. Signal bounce D. Antenna placement
Answer: A
A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause? A. Incorrect VLAN B. MTU mismatch C. Hijacked HOSTS file D. Missing routes
Answer: A
A consultant is installing new WAPs for an office using wall mounts. Which of the following is the BEST location for the new boxes for signal strength and coverage?
A. Above the suspended ceiling with antennas positioned upward.
B. Close to the floor level to allow the signal to traverse the floor laterally.
C. Close to the suspended ceiling, but not above.
D. Above the suspended ceiling with antennas positioned downward.
Answer: C