Topic 6: Mixed Set (14) Flashcards

1
Q
Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block?
A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to the corresponding switch's SFP at the MDF. Which of the following is the MOST likely cause?
A. A crossover cable is being used.
B. DB loss is too high on all strands.
C. Only TX or RX strand is working.
D. TX and RX are reversed.
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is the correct representation of an IPv6 address?
A. ::
B. 0:0:0:0:0:0:0:0:1
C. 1:2:3:4:AB:CD:EF
D. 2001::4860:800f::
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?
A. Channel bonding
B. MIMO
C. Spartial reuse
D. 20MHz channel spacing
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?
A. Network map
B. Cable management
C. Change management
D. Asset management
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:
A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?
A. Bad connectors
B. Cross-talk
C. EMI / Interference
D. dB loss
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?
A. LLDP
B. VLAN tagging
C. QoS
D. SIP trunking
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?
A. nslookup
B. route
C. nbtstat
D. arp
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following utilities would a technician use to determine the location of lost packets on a routed network?
A. 450 ping
B. nslookup
C. route
D. tracert
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A DSL modem connects to the provider's network using which of the following authentication techniques?
A. PoE
B. MS-CHAP
C. PPPoE
D. EAP
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?
A. Loopback plugs
B. Butt set
C. Cable certifier
D. Toner probe
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
169.254.0.100 is an IP address which would MOST likely come from which of the following?
A. CIDR
B. DHCP
C. APIPA
D. DNS
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?
A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following DNS records allows for reverse lookup of a domain?
A. PTR
B. AAAA
C. A
D. MX
A

Answer: A

18
Q

Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP

A

Answer: D

19
Q
Which of the following IP addresses would be classified as private?
A. 10.100.200.0
B. 169.253.10.20
C. 172.168.5.0
D. 200.100.25.0
A

Answer: A

20
Q
A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail?
A. Network flow information
B. SNMP traps
C. Debug level syslog
D. Protocol analyzer
A

Answer: D

21
Q
Which of the following will prevent switching loops by selectively shutting down switch ports?
A. RIP
B. IGP
C. STP
D. VLAN
A

Answer: C

22
Q
When using high bandwidth applications over multiple WAN connections, which of the following should be used?
A. Static IP addressing
B. Half-duplex
C. PoE devices
D. Load balancing
A

Answer: D

23
Q
A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario?
A. Crimper
B. OTDR
C. Throughput tester
D. Punch down tool
A

Answer: D

24
Q
There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?
A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor
A

Answer: A

25
Q
Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?
A. PoE settings and VTP configuration
B. SNMP configuration only
C. IP address and SNMP configuration
D. QoS and PoE settings
A

Answer: C

26
Q
Which of the following media types can carry a standard Ethernet signal for network connectivity?
A. USB
B. PArallel
C. Serial
D. CAT6
A

Answer: D

27
Q
A Windows server has a problem after booting up. Kim, a technician, should immediately check the:
A. history logs.
B. cron logs.
C. application logs.
D. system logs.
A

Answer: D

28
Q
A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?
A. Butt set
B. Punch down tool
C. Toner probe
D. Protocol analyzer
A

Answer: C

29
Q
An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users' connection issues?
A. Limit the devices to 802.11n only.
B. Enable the SSID broadcast.
C. Enable MAC filtering.
D. Use a WEP 128-bit key.
A

Answer: B

30
Q
Which of the following protocols is used to securely connect to a multi-layer switch?
A. HTTP
B. SMTP
C. SSH
D. Telnet
A

Answer: C

31
Q
The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the:
A. hypervisor.
B. LPAR.
C. broker.
D. VDI.
A

Answer: A

32
Q

A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause?
A. A missing route on the alarm device.
B. Incorrect VLAN assignment on the router.
C. A missing route on the network routers.
D. Incorrect speed/duplex setting on the alarm device.

A

Answer: D

33
Q
A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?
A. Fiber optic
B. Wireless
C. CAT5e
D. CAT3
A

Answer: A

34
Q
A network administrator suspects an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
A. Syslog server
B. Toner probe
C. OTDR
D. Packet sniffer
A

Answer: D

35
Q
A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up?
A. Port security
B. MAC filtering
C. ACL
D. NAT
A

Answer: D

36
Q
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel
A

Answer: C

37
Q
No link lights on a switch's SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of-9. Which of the following types of cable is MOST likely being tested?
A. Fiber
B. CAT3
C. CAT5e
D. CAT6a
A

Answer: A

38
Q

An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?
A. WEP’s IV is too small.
B. WEP uses RC4 which is easily accessible and not secure.
C. WEP uses plain text.
D. WEP is not well supported.

A

Answer: A

39
Q
Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?
A. WAP placement
B. PoE devices
C. MAC filtering
D. Encryption type
A

Answer: A

40
Q
Which of the following devices can be used to offload outbound web server SSL encryption overhead?
A. NIPS
B. Proxy server
C. Content filter
D. VPN connectator
A

Answer: B