Topic 6: Mixed Set (15) Flashcards

1
Q
A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector?
A. Wire tester
B. Punch down
C. Crimper
D. Multimeter
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: 1) Client PC 1 has an IP address if 192.168.10.25/25 2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A 3) Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25 4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?
A. Link from touter A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.

A

Answer: B
Explanation: We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic. To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a ‘Layer 3’ switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake?
A. Packet analyzer
B. Port analyzer
C. SNMP traps
D. Spectrum analyzer
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client’s computer is receiving an IP address conflict error message. All computers are configured with static IP addresses, but no one else is reporting an issue. The IT department is unaware of any newly added devices on the network. Which of the following should be the NEXT step to identify the device causing the conflict?
A. Disconnect the user’s computer from the network and ping the IP address from the switch to get its MAC address.
B. Disconnect the other user’s PCs and reconnect them one at a time while monitoring the affected PC until the source of the conflict is determined.
C. Configure the affected user’s PC with a new static IP address and verify it has network connectivity.
D. Check the affected computer’s firewall logs for unusual inbound activity in the NetBIOS and HTTP

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?
A. air flow and cooling
B. UPS capability
C. circuit labeling
D. power redundancy
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Select TWO).
A. Enable SSID broadcasting to identify the guest network.
B. Configure visitor devices to use static IP addresses.
C. Enable two-factor authentication on visitor devices.
D. Configure the access point to use WPA2-AES encryption.
E. Ensure the access point is not running in mixed mode.

A

Answer: A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A. Time division multiplexing
B. Analog circuit switching
C. CSMA/CD
D. Time division spread spectrum
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Select TWO).
A. network scan
B. banner grab
C. tracert
D. DHCP server check
E. Brute-force attack
A

Answer: A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer is designing a network for a new branch office. Computers in multiple VLANs will be required to connect to a local SAN. The interconnection between the VLANs and the SAN requires the best possible performance and the lowest possible latency. Additionally, there will be multiple wireless devices in the branch offices. Management has requested that wireless access be optimized for range and availability. Which of the following equipment options should the engineer provision to satisfy these requirements?
A. Use a Layer 3 switch to connect the multiple VLANs and the SAN. Use multiple 2.4GHz access points, operating on different channels, to provide a connection for wireless devices.
B. Use a managed Layer 2 switch to connect the multiple VLANs and the SAN. Use multiple 5GHz access points, operating on a single channel, to provide a connection for wireless devices.
C. Use a bridge to connect the multiple VLANs and the SAN. Use multiple 5GHz access points, operating on different channels, to provide a connection for wireless devices.
D. Use a router to connect the multiple VLANs and the SUN. Use a single 2.4GHz access point, operating on multiple channels, to provide a connection for wireless devices.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A unified communication system has a requirement to eliminate POTS-dependent equipment. Which of the following MUST be specifically addressed in the proposed solution?
A. FAX integration
B. UC gateway vendor
C. COS implementation
D. Telepresence
E. UC server configuration
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A network administrator is configuring a wireless network for a small office. The office has many devices that require 2.4GHz for connectivity. To avoid overlapping channel space, which of the following 2.4GHz channels should be used? (Select THREE).
A. 1
B. 3
C. 5
D. 6
E. 7
F. 11
A

Answer: A,D,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
All users have lost Internet connectivity but can still reach internal applications. The technician can ping the router. A faulty T1 connection has been ruled out by the LEC. Which of the following should the technician do to resolve this issue?
A. replace the CSU/DSU
B. replace the smart jack
C. restart DNS services
D. restart DHCP services
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Following the installation of a new SAN switch, users are experiencing latency in application response time. A network engineer installed the switch with a new configuration. Which of the following is MOST likely causing the issue?
A. Jumbo frames were not enabled.
B. SDN was not enabled.
C. WWN was not enabled.
D. Trunking was not enabled.
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A client needs a cloud solution that allows quick provisioning of additional servers to host custom applications, as well as the installation of server Oss and virtual networking devices. Which of the following is the BEST type of cloud system based on the client’s requirements?
A. IaaS
B. PaaS
C. SaaS
D. MaaS
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following should be used to prioritize specific types of inbound and outbound traffic for the network?
A. HIPS
B. IDS
C. Packet shaper
D. Content filter
A

Answer: C

18
Q

All accounting department users have lost connectivity. A technician verifies users are all connected through IDF3, and then verifies connectivity from IDF3 to the MDF. When physically checking the IDF3 switch, the technician sees all the activity lights on the switch are permanently lit and not flashing. Which of the following troubleshooting steps should the technician do NEXT?
A. Reboot the switch.
B. Check all the cables with a cable tester.
C. Verify the media converter is powered on.
D. Ensure all the patch cables are type 568B.

A

Answer: A

19
Q

A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?
A. Allow the firewall to accept inbound traffic to ports 25,67,179 and 3389.
B. Allow the firewall to accept inbound traffic to ports 80,110,143, and 443.
C. Set the firewall to operate in transparent mode.
D. Allow the firewall to accept inbound traffic to ports 21,53,69, and 123.

A

Answer: A

20
Q

A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reports as closed. Which of the following BEST explains this response?
A. The ports belong to an active system and are denying requests.
B. The ports are associated with deprecated services.
C. The ports do not belong to a live system.
D. The ports replied with a SYN/ACK response.

A

Answer: C

21
Q
Which of the following solutions is the MOST useful in helping a business verify that its firewalls have been properly patched?
A. ICMP monitoring
B. Vulnerability scanning
C. SNMP monitoring
D. Port scanning
A

Answer: D

22
Q
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
A. iSCSI
B. Fibre Channel
C. NAS
D. DAS
A

Answer: C

23
Q
A network technician receives a call from a user stating that a newly installed fiber link connecting two office buildings will not come up. The fiber installer is onsite and has certified the fiber link meets the user’s requirements. The network technician arrives onsite, consoles into the switches, and confirms the switch configuration is correct. The network technician then performs a physical inspection of both the fiber patch cabling and transceivers, and confirms they are correctly matched. Which of the following MOST likely the cause of this issue?
A. dB loss
B. Tx/Rx reversed
C. Wavelength
D. Attenuation
A

Answer: B

24
Q

Joe, a user, contacts the help desk because he is unable to access the company’s web portal to access his webmail. The technician is unable to connect remotely to Joe’s computer and asks Joe to run the command ARP –a. Joe reports the output is: No ARP entries found. Which of the following is the MOST likely cause of the problem?
A. Joe has been assigned an incorrect IP address and should request another.
B. Joe is not connected to the network and should connect a network cable.
C. Joe has incorrect DNS settings and needs to correct them in the control panel.
D. Joe is using an unauthorized anonymous proxy and needs to disconnect it.

A

Answer: B

25
Q
A network technician is creating a network that uses Ethernet over a physical bus topology. RG-58 is required for cabling. Which of the following standards would the networking equipment need to support?
A. 10BaseT
B. 10Base2
C. 10GBaseT
D. 100BaseFX
A

Answer: B

26
Q

A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night, the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?
A. Light sensors are interfering with the network.
B. EMI from the lights is interfering with the network cables.
C. Network wiring is run perpendicular to electrical conduit.
D. temperature changes are causing attenuation in copper cabling.

A

Answer: B

27
Q

A technician is designing a small business network with a single router, one distribution switch, and three access switches. The company wants to install a packet-sniffing workstation to monitor all outbound network traffic. Which of the following is the BEST way to accomplish this?
A. Install a hub on the main uplink from the switches to the router for the monitoring workstation.
B. Install the monitoring workstation on the switch closest to the router with port mirroring enabled.
C. Enable STP on all the switches and install the monitoring workstation on any port.
D. Enable a subinterface on the router port connecting the switches for the monitoring workstation.

A

Answer: B

28
Q
Datacenter operations are under scrutiny. The largest cost is electrical, likely due to continual fan and AC functioning associated with aging server equipment. Which of the following tools should the network team install to monitor the costs related to in-house datacenter operations?
A. Humidity monitoring
B. Temperature monitoring
C. UPS monitoring
D. Network hardware monitoring
A

Answer: B

29
Q
A network technician is installing a router in a 42U two-post rack. The technician is responsible for ensuring the ISP hand-off device takes the top position and the router takes the next position. Both devices take up approximately 2Us each. In which of the following “U” positions will the router MOST likely be located on the two-post rack?
A. 35U
B. 37U
C. 40U
D. 42U
A

Answer: B

30
Q
Which of the following protocols is used to provide high-level routing decisions between external routers?
A. RIPv2
B. BGP
C. IS-IS
D. RIP
A

Answer: B

31
Q

After an upgrade of network equipment and applications, users are no longer able to access the Internet. Internal resources, such as file servers and databases, are accessible to the users. Which of the following is the MOST likely cause?
A. The firewall is blocking outbound port 80 traffic.
B. The web server was placed in the network’s DMZ.
C. The NetBIOS ports were left open on the firewall.
D. The user PCs and the web server are both using IPv6.

A

Answer: A

32
Q

Which of the following factors must be accounted for when installing a Wi-Fi repeater in an office environment to ensure uninterrupted connectivity to users as they move between physical locations within the wireless footprint? (Select TWO).
A. The WiFi repeater should be physically placed in proximity to a WiFi router to provide at least 20% signal overlap.
B. The WiFi repeater should be physically placed in proximity to a WiFi router to provide no signal overlap.
C. The WiFi repeater should be configured with the same SSID and frequency channels as the WiFi router.
D. The WiFi repeater should be configured with the same SSID as the WiFi router but use a different frequency channel.
E. The WiFi repeater should be configured with a unique SSID and frequency channel.

A

Answer: A

33
Q
A network technician is setting up a new office space to accommodate up to 15 desktops, five servers, and two printers, which will all be hardwired. The technician must procure a managed switch that supports all devices while accounting for 10% growth. Which of the following switches would accommodate the demand?
A. 8-port managed switch
B. 16-port managed switch
C. 24-port managed switch
D. 48-port managed switch
A

Answer: D

34
Q
A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser. Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the firewall’s WAN port? (Select TWO).
A. Permit 192. 168.1.143 25
B. Permit 192. 168.1.143 80
C. Permit 192. 168.1.143 110
D. Permit 192. 168.1.143 143
E. Permit 192. 168.1.143 443
F. Permit 192. 168.1.143 587
A

Answer: E,F

35
Q

A network security engineer is installing a new firewall to protect a single server that requires isolation from the majority of network resources. The server will require secure network access. Which of the following hardening steps should the engineer perform on the new firewall?
A. Drop inbound and outbound traffic on ports 20,21,23, and 53. Allow inbound and outbound SSH traffic. Block outbound traffic on port 80.
B. Block all ephemeral port numbers and UDP traffic at the firewall. Explicitly allow SSH traffic. Remove implicit deny statements for ports 53 and lower.
C. Explicitly allow traffic on ports 22 and 443. Explicitly deny all other traffic at the firewall internal and external interfaces.
D. Ensure the firewall OS is the latest version with all patches applied. Block traffic not seen in audit logs after a 48-hour test.

A

Answer: C

36
Q
Due to heavy regulation, a hospital hires a consultant to update its network. The hospital has multiple departments with varying levels of sensitive information. The consultant reviews the infrastructure and notices the hospital is running on a flat network. Which of the following is the BEST reason for the consultant to recommend implementing VLANs?
A. security
B. compliance
C. performance
D. compatibility
A

Answer: A

37
Q
A network technician is troubleshooting poor performance on a 2.4GHz wireless network. Utilizing a WiFi scanner, the technician determines channels 1,2,3, and 6 are used in the area. To optimize performance which of the following channels should the technician set on the access point to be away from the majority of the interference in this area?
A. 1
B. 4
C. 5
D. 10
E. 11
A

Answer: E

38
Q
The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1,5Mbps. Which of the following policies is being agreed to in the SLA?
A. session hijacking
B. blocking
C. throttling
D. data usage limits
E. bandwidth quotas
A

Answer: C

39
Q
Which of the following topologies provides for hosts that are both requestors and providers?
A. peer-to-peer
B. full mesh
C. star
D. client-server
A

Answer: A

40
Q
A user is experiencing issues with home WiFi cutting out sporadically on a work laptop. The user has tried replacing the WiFi access point but is still experiencing issues even when sitting next to the access point. Which of the following is the NEXT step the user should take to resolve the issues?
A. Install an updated network driver.
B. Install OS patches.
C. Install a BIOS update.
D. Change the frequency of the WiFi.
A

Answer: D