Topic 6: Mixed Set (12) Flashcards

1
Q
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?
A. Allow UDP port 53
B. Allow TCP port 80
C. Allow UDP port 340
D. Allow TCP port 443
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
........ attempting to access a popular website. Which of the following will MOST likely correct the error?
A. HTTP uses UDP
B. DNS port 23 needs to be allowed
C. HTTP needs port 443 allowed
D. UDP port 53 needs to be allowed
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution?
A. Disable SSID
B. Channel bonding
C. MIMO
D. Increase the signal
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator is receiving reports from an executive that the executive’s wireless access point loses the signal frequently, even though the WAP is on the executive’s desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive’s office?
A. Turn off SSID broadcasting for the executive’s access point
B. Replace the 802.11n access point in the office with an 802.11a access point.
C. Change the channel on the access point to channel 11.
D. Turn off as many lights in the executive’s office as possible to reduce interference.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A network technician needs to install an additional access point to the company's wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point's coverage areas to overlap?
A. 1, 6, 11
B. 2, 5, 10
C. 3, 13, 23
D. 4, 8, 16
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue?
A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An 801.11g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3- 40 Which is true about the above configuration?
A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client.
B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks?
A. PPPoE authentication
B. MAC filtering
C. WPA encryption
D. Wireless channel
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following occurs when antenna gain is increased on an access point?
A. Connection speeds decrease
B. Throughput decreases
C. Cell size increases
D. Attenuation increases
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following technologies allows more than two transceivers with an access point?
A. MIMO
B. FIFO
C. 802.1x
D. WPA
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
A. WPA encryption
B. Changing wireless channels
C. MAC filtering
D. Changing wireless speed standards
E. SSID disable
A

Answer: A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?
A. Enable mixed mode
B. Disable SSID
C. Disable encryption
D. Enable `n' only mode
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue?
A. Enable wireless multimedia (WMM) for QoS
B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support?
A. PoE and QoS
B. LACP and OSPF
C. 802.1x and 802.11n
D. NAT and VTP
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
A

Answer: A

18
Q
Which of the following solutions will detect and disable a rogue access point?
A. Port scan
B. Packet sniffer
C. IPS
D. IDS
A

Answer: C

19
Q
When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?
A. ping
B. arp
C. route
D. dig
A

Answer: B

20
Q
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution?
A. Private IP Addressing
B. Wireless Access Points
C. Wide Area Networking
D. Virtual Local Area Networks
A

Answer: B

21
Q
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?
A. Disable SSID broadcast
B. Increase the signal strength
C. Move the access point
D. Change the broadcast channel
A

Answer: C

22
Q
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO).
A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables
A

Answer: A,B

23
Q
Which of the following security threats relies primarily on user deception and misinformation?
A. Rogue access points
B. DoS attacks
C. Man-in-the-middle attacks
D. Phishing
A

Answer: D

24
Q
At which of the following layers of the OSI model do packets exist?
A. Network
B. Session
C. Data link
D. Transport
A

Answer: A

25
Q
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?
A. Core switch
B. MDF
C. Ethernet router
D. IDF
A

Answer: B

26
Q
A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues?
A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs
A

Answer: B

27
Q
A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used?
A. Cable certifier
B. Toner probe
C. Cable tester
D. Protocol analyzer
A

Answer: A

28
Q
Which of the following layers of the OSI model is between the Data Link and Transport layers?
A. Application
B. Session
C. Network
D. Physical
A

Answer: C

29
Q
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the Internet. Which of the following is the MOST likely reason?
A. Incorrectly configured ACL
B. Implicit allow statement
C. SMTP requests are being denied
D. All protocols are being allowed in
A

Answer: A

30
Q
A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection?
A. Telephone
B. Parallel
C. Serial
D. CAT6
A

Answer: D

31
Q
Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?
A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler
A

Answer: A

32
Q
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the wiring back to the patch panel?
A. Butt set
B. Cable certifier
C. Toner probe
D. Snips
A

Answer: B

33
Q

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP addres on the fiber interface

A

Answer: A

34
Q
Which of the following devices is used to distribute network traffic equally over multiple links?
A. Content filter
B. DNS server
C. Load balancer
D. Proxy server
A

Answer: C

35
Q
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT
A

Answer: B

36
Q
Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use?
A. Toner probe
B. Punch down
C. Wire tester
D. Crimper
A

Answer: B

37
Q
Which of the following protocols is used for remote management of devices?
A. SNMP
B. TFTP
C. Syslog
D. SMTP
A

Answer: A

38
Q
A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?
A. net share
B. hostname
C. ipconfig
D. tracert
A

Answer: C

39
Q
Which of the following methods limits access to a network based on characteristics of the network card?
A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption
A

Answer: B

40
Q
An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?
A. T1 loopback
B. Butt set
C. Multimeter
D. Protocol analyzer
A

Answer: B