Topic 6: Mixed Set (1) Flashcards

1
Q
A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and it happens several times throughout the day. Which of the following troubleshooting methods should the technician perform FIRST?
A. Test the theory
B. Establish a plan of action
C. Gather information
D. Question the obvious
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A technician wants to configure a wireless network to identify itself to visitors by including the word “Guest” in the name. Which of the following would allow users to identify a wireless network by name?
A. ESSID broadcast
B. ARP broadcast
C. BSSID broadcast
D. DHCP broadcast
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following should a technician upgrade to if the existing wireless standard only allows for three non-overlapping channels and more non-overlapping channels are needed?
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.1q
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the device. All firewalls are turned off. The streaming device appears to function properly, but the media will not stream as requested. Which of the following TCP/IP technologies is not implemented properly?
A. Multicast
B. Broadcasts
C. Unicast
D. Anycast
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?
A. Core switch
B. MDF
C. Ethernet router
D. IDF
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?
A. Removing the AP from the classroom
B. ACL
C. Jamming
D. Firewall
E. IPS
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to allow it to interpret the new device and control it using SNMP?
A. TRAP
B. GET
C. MIB
D. WALK
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues?
A. UTP patch cables
B. Antenna
C. Power adapter
D. Security standard
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is considered a classless routing protocol?
A. IGRP
B. IS-IS
C. RIPv1
D. STP
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address. Which of the following is the MOST likely reason why the router is not receiving a DHCP address?
A. The administrator has enabled DHCP snooping on the network
B. The administrator is blocking DHCP requests that originate from access points
C. The administrator is blocking the wireless router’s MAC address using MAC filtering
D. The Administrator has implemented a feature that only allows white-listed MAC addresses

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select TWO)
A. PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
C. PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
D. PERMIT SRCIP: ANYSPORT:80 DSTIP:192.168.0.0/24 DPORT:80
E. PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?
A. MPLS
B. ESP
C. GRE
D. PPP
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause?
A. Distance limitation
B. Wavelength mismatch
C. cross-talk
D. EMI
E. Macro bend
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
An administrator needs to open the default port on the firewall for DNS. Which of the following is the correct port number the administrator needs to open?
A. 53
B. 67
C. 110
D. 3389
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate. The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following is the BEST course of action for the network administrator to take?
A. Wait until the maintenance window, and make the requested change
B. First document the potential impacts and procedures related to the change
C. Send out a notification to the company about the change
D. Make the change, noting the requester, and document all network changes

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A new network administrator is hired to replace a consultant that has been keeping the network running for several months. After a month, the network administrator is having network issues. The problems are easily resolved and appear to be changes in the server settings. The log files on the servers do not contain any error or messages related to the issues. Which of the following is a possible cause of the issues?
A. TACAS\Radius misconfiguration is causing logs to be erased
B. ICMP ping of death is resetting DHCP and DNS on the server
C. A backdoor has been installed to access the network
D. The last ACL on the router is set to Deny All

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A network technician has just run a new point-to point fiber link between two local routers, however, after the fiber has been plugged in on both ends, the interface will not come up. The technician has double-checked the interface configuration on both routers, both SFPs have been hard looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient optical power. Which of the following is the cause of the issue?
A. Wavelength mismatch
B. Duplex mismatch
C. Distance limitations
D. Wrong IP address
A

Answer: A

18
Q
Channel bonding will improve which of the following wireless characteristics?
A. Signal strength
B. Encryption strength
C. Coverage area
D. Connection speed
A

Answer: D

19
Q
Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address. Which of the following is an addressing scheme that will work in this situation?
A. Teredo tunneling
B. Private
C. APIPA
D. Classless
A

Answer: B

20
Q
While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. Which of the following servers is MOST likely down?
A. WINS server
B. Domain controller
C. DHCP server
D. DNS server
A

Answer: D

21
Q
A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an example of which of the following?
A. Dynamic DNS
B. Virtual Private networking (VPN)
C. Dynamic NAT
D. Port Forwarding
A

Answer: D

22
Q
A CSU/DSU device will connect which of the following?
A. A T1 line to a network router
B. An analog line to a network router
C. A cable modern to a wireless router
D. A local network to a VPN
A

Answer: A

23
Q
Coverage analysis for a new implementation of 802.11n WLAN involves which of the following? (Select TWO)
A. Humidity
B. Temperature
C. Heatmap
D. Building material
E. Sight lines
A

Answer: D,E

24
Q
A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue?
A. Firmware update
B. OS update
C. Vulnerability patch
D. Driver update
A

Answer: C

25
Q

An administrator would like to test out an open source based phone system prior to making an investment in hardware and phones. Which of the following should the administrator do to BEST test the software?
A. Create virtual IP phones in a lab that utilize the STP protocol
B. Deploy an open source VDI solution to create a testing lab
C. Deploy new SIP appliances and connect to it with the open source phone applications
D. Create a virtual PBX and connect to it with SIP phone applications

A

Answer: D

26
Q
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance?
A. Port scanner tool
B. Interface monitoring tool
C. Packet capture tool
D. Spectrum Analyzer tool
A

Answer: D

27
Q

A network technician needs to set up two public facing web servers and wants to ensure that if they are compromised the intruder cannot access the intranet. Which of the following security techniques should be used?
A. Place them behind honeypots
B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone

A

Answer: D

28
Q
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?
A. IPSEC
B. SHA
C. DES
D. CRC
A

Answer: A

29
Q
Which of the following allows a telecommunication company to test circuits to customers remotely?
A. VLAN
B. Toner Probe
C. RDP
D. Smart Jack
E. VPN
A

Answer: D

30
Q

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk?
A. Add an outbound ACL to the firewall
B. Change the FTP server to a more secure SFTP
C. Use the implicit deny of the firewall
D. Move the server to the DMZ of the firewall

A

Answer: D

31
Q
A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause?
A. VTP
B. Driver update
C. ESD
D. Halon particles
A

Answer: B

32
Q
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?
A. On the DMZ network
B. On the sandbox network
C. On the honeypot
D. On the quarantine network
A

Answer: D

33
Q

Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem?
A. Increase the maximum log size
B. Log into the DNS server every hour to check if the logs are full
C. Install an event management tool
D. Delete the logs when full

A

Answer: C

34
Q

A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach?
A. Create VLANs to segment the network traffic
B. Place a network sniffer on segments with new employees
C. Provide end user awareness and training for employees
D. Ensure best practices were implemented when creating new user accounts

A

Answer: C

35
Q

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: Client PC 1 has an IP address if 192.168.10.25/25 PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25 PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A. However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?
A. Link from router A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down

A

Answer: B
Explanation: PC 1 cannot connect to Server A. PC 1 and Server A are on different subnets that are connected by Router A. PC 1 can connect to Router A; therefore, there is no problem with the link or IP address configuration between PC 1 and Router A. PC 2, which is on the same subnet as Server A, can connect to Server A; therefore, Server A is up. As PC 1 can connect to Router A but cannot connect to Server A, and Server A is up; the problem must be the connection (link) between Router A and Server A.

36
Q
A network administrator wants to logically separate web function servers on the network. Which of the following network devices will need to be configured?
A. IPS
B. Switch
C. Hub
D. HIDS
A

Answer: B

37
Q

A network administrator received the following email from a user: From: user@company.com To: abuse@company.com Subject: Free smart phone Dear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain?
A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

A

Answer: A

38
Q
A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO)
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
E. 802.11n
A

Answer: A,B

39
Q
Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?
A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsibility
A

Answer: B

40
Q
Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?
A. OC12
B. POTS
C. WiMax
D. OC3
A

Answer: B