Topic 6: Mixed Set (15) Flashcards
A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector? A. Wire tester B. Punch down C. Crimper D. Multimeter
Answer: C
Which of the following methods for network performance optimization is used to distribute traffic among similar devices? A. Fault tolerance B. QoS C. Proxy server D. Load balancing
Answer: D
A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: 1) Client PC 1 has an IP address if 192.168.10.25/25 2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A 3) Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25 4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?
A. Link from touter A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down
Answer: A
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.
Answer: B
Explanation: We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic. To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a ‘Layer 3’ switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake? A. Packet analyzer B. Port analyzer C. SNMP traps D. Spectrum analyzer
Answer: A
A client’s computer is receiving an IP address conflict error message. All computers are configured with static IP addresses, but no one else is reporting an issue. The IT department is unaware of any newly added devices on the network. Which of the following should be the NEXT step to identify the device causing the conflict?
A. Disconnect the user’s computer from the network and ping the IP address from the switch to get its MAC address.
B. Disconnect the other user’s PCs and reconnect them one at a time while monitoring the affected PC until the source of the conflict is determined.
C. Configure the affected user’s PC with a new static IP address and verify it has network connectivity.
D. Check the affected computer’s firewall logs for unusual inbound activity in the NetBIOS and HTTP
Answer: C
A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate? A. air flow and cooling B. UPS capability C. circuit labeling D. power redundancy
Answer: A
A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Select TWO).
A. Enable SSID broadcasting to identify the guest network.
B. Configure visitor devices to use static IP addresses.
C. Enable two-factor authentication on visitor devices.
D. Configure the access point to use WPA2-AES encryption.
E. Ensure the access point is not running in mixed mode.
Answer: A,B
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies? A. Time division multiplexing B. Analog circuit switching C. CSMA/CD D. Time division spread spectrum
Answer: A
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Select TWO). A. network scan B. banner grab C. tracert D. DHCP server check E. Brute-force attack
Answer: A,C
A network engineer is designing a network for a new branch office. Computers in multiple VLANs will be required to connect to a local SAN. The interconnection between the VLANs and the SAN requires the best possible performance and the lowest possible latency. Additionally, there will be multiple wireless devices in the branch offices. Management has requested that wireless access be optimized for range and availability. Which of the following equipment options should the engineer provision to satisfy these requirements?
A. Use a Layer 3 switch to connect the multiple VLANs and the SAN. Use multiple 2.4GHz access points, operating on different channels, to provide a connection for wireless devices.
B. Use a managed Layer 2 switch to connect the multiple VLANs and the SAN. Use multiple 5GHz access points, operating on a single channel, to provide a connection for wireless devices.
C. Use a bridge to connect the multiple VLANs and the SAN. Use multiple 5GHz access points, operating on different channels, to provide a connection for wireless devices.
D. Use a router to connect the multiple VLANs and the SUN. Use a single 2.4GHz access point, operating on multiple channels, to provide a connection for wireless devices.
Answer: A
A unified communication system has a requirement to eliminate POTS-dependent equipment. Which of the following MUST be specifically addressed in the proposed solution? A. FAX integration B. UC gateway vendor C. COS implementation D. Telepresence E. UC server configuration
Answer: A
A network administrator is configuring a wireless network for a small office. The office has many devices that require 2.4GHz for connectivity. To avoid overlapping channel space, which of the following 2.4GHz channels should be used? (Select THREE). A. 1 B. 3 C. 5 D. 6 E. 7 F. 11
Answer: A,D,F
All users have lost Internet connectivity but can still reach internal applications. The technician can ping the router. A faulty T1 connection has been ruled out by the LEC. Which of the following should the technician do to resolve this issue? A. replace the CSU/DSU B. replace the smart jack C. restart DNS services D. restart DHCP services
Answer: C
Following the installation of a new SAN switch, users are experiencing latency in application response time. A network engineer installed the switch with a new configuration. Which of the following is MOST likely causing the issue? A. Jumbo frames were not enabled. B. SDN was not enabled. C. WWN was not enabled. D. Trunking was not enabled.
Answer: A
A client needs a cloud solution that allows quick provisioning of additional servers to host custom applications, as well as the installation of server Oss and virtual networking devices. Which of the following is the BEST type of cloud system based on the client’s requirements? A. IaaS B. PaaS C. SaaS D. MaaS
Answer: B