Topic 6: Mixed Set (13) Flashcards

1
Q
Which of the following protocols is used to allow multiple hosts to share a common IP address?
A. HTTPS
B. ARP
C. CARP
D. NAT
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine a connection problem within a subnet?
A. Wire mapper
B. Protocol analyzer
C. Cable tester
D. SYSLOG server
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is the prefix for a link-local IPv6 address?
A. FE80::/10
B. FF00::/8
C. 2FFE::/16
D. FEEF:/12
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following could be used to estimate RTT across a router?
A. Dig
B. Traceroute
C. Arp
D. Uptime
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following does the IP address 169.254.222.10 indicate?
A. No DHCP server connectivity
B. The DNS server is unavailable
C. Firewall issue
D. Duplicate IP addresses are found
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?
A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet.
B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet.
C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace.
D. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?
A. Routing loop
B. MTU black hole
C. Framing errors
D. SYN flood
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?
A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following separates broadcast domains?
A. Port mirroring
B. Router
C. Convergence
D. Switch
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A national cable company providing TV, telephone, and Internet service to home users over its IP network, has been tracking a large increase of network bandwidth due to P2P file sharing. Which of the following should the company deploy to ensure excellent TV and telephone service?
A. QoS
B. Load balancing
C. High availability
D. Fiber optics
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?
A. Project management
B. Quality of service
C. Configuration management
D. Bandwidth shaping
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following technologies could be implemented to improve call clarity when using VoIP technology?
A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network?
A. Disable the SSID
B. WPA encryption
C. VLAN implementation
D. WEP encryption
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following needs to be configured on a switch to use a packet sniffer?
A. Port trunking
B. Port mirroring
C. Tagged VLAN
D. Untagged VLAN
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
A. Wire tap
B. Network sniffer
C. Load balancing appliance
D. NIPS
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?
A. Butt set
B. Toner probe
C. Wire mapper
D. Cable certifier
A

Answer: A

18
Q
An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?
A. Router
B. Forward proxy
C. Load balancer
D. Firewall
A

Answer: C

19
Q
Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?
A. Connectionless
B. Stateful
C. Full Duplex
D. Quality of Service
A

Answer: A

20
Q
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?
A. ipconfig
B. ping
C. route
D. nbstat
A

Answer: B

21
Q

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?
A. The arp table of the new customer’s router.
B. The route table of the next-hop router.
C. The route table of the new customer’s router.
D. The arp table of a network user.

A

Answer: C

22
Q

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution.
C. Establish a theory of probable cause.
D. Document findings, actions, and outcomes.

A

Answer: D

23
Q
A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used?
A. Protocol analyzer
B. Crimper
C. Cable tester
D. Punch down tool
A

Answer: C

24
Q
A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs?
A. IPSec
B. SSL
C. ISAKMP
D. SNMP
A

Answer: D

25
Q
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?
A. Signal strength
B. SSID enable
C. Encryption
D. Password hardening
A

Answer: A

26
Q
Which of the following should be implemented in a networked environment carrying teleconferencing packets?
A. L2TP
B. SSH
C. QoS
D. SNMP
A

Answer: C

27
Q
Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?
A. OTDR
B. Multimeter
C. Punch down tool
D. Temperature monitor
A

Answer: C

28
Q
A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for the HIGHEST level of security?
A. WPA2
B. WPA
C. WEP64
D. WEP128
A

Answer: A

29
Q
A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic?
A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop
A

Answer: D

30
Q
A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?
A. VPN
B. Throughput tester
C. Firewall
D. OC3
A

Answer: C

31
Q
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?
A. Network map
B. Environmental monitor
C. Placement map
D. Syslog
A

Answer: D

32
Q
Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).
A. Telnet
B. FTP
C. SNMP
D. SSH
E. RDP
A

Answer: A,D

33
Q

A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?
A. Call the wireless provider and ask for a T3 circuit.
B. Move the wireless router to a better location where line of sight is obtained.
C. Reinstall the operating system to the PC to ensure the newest patches are installed.
D. Install a hub to ensure there is a clear path for the cables to run.

A

Answer: B

34
Q
Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?
A. Frequency interference
B. Low signal strength
C. Standard mismatch
D. Incorrect channel
A

Answer: A

35
Q
Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?
A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs
A

Answer: C

36
Q
A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP
A

Answer: D

37
Q
Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO).
A. MAC addressing
B. IP addressing
C. Port speed
D. IPv6 addressing
E. Duplex
A

Answer: C,E

38
Q

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked.

A

Answer: C

39
Q
Which of the following technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree
A

Answer: D

40
Q

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?
A. Check for switching loops between core and distribution switches.
B. Check whether an incorrect VLAN has been assigned to the new distribution switch.
C. Check for inconsistent or missing routes between the core and distribution switches.
D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.

A

Answer: A