Topic 6: Mixed Set (2) Flashcards
A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices. Which of the following will allow SNMP monitoring of the devices? A. SSH B. MIMO C. SYSLOG D. MIBS
Answer: D
A home user is pairing a bluetooth gaming controller with the game console. Which of the following is implemented between the console and the controller? A. LAN B. PAN C. WAN D. MAN
Answer: B
A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken?
A. Document the findings, actions, and outcomes
B. Duplicate the problem if possible
C. Verify system functionality
D. Make an archival backup
Answer: C
A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers? A. Block all LAN to LAN traffic B. Block all LAN to WAN traffic C. Block all WAN to LAN traffic D. Block all WLAN to WAN traffic
Answer: C
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? A. Hybrid B. Public C. Community D. Private
Answer: A
A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email? A. CNAME B. MX C. PTR D. A
Answer: B
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices? A. Anycast B. Unicast C. CoS D. QoS E. Multicast
Answer: E
When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likely experiencing which of the following attacks? A. Bluejacking B. ARP cache poisoning C. Phishing D. DoS
Answer: D
A technician has attempted to optimize the network but some segments are still reporting poor performance. Which of the following issues should the technician look at? A. Switch incorrectly set to full duplex B. Conflicting IP addresses C. Packet bottlenecks D. IP address scope depletion
Answer: C
A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email? A. CNAME B. MX C. PTR D. A
Answer: B
Joe, a technician, terminates ends on a new copper cable for use between two legacy switches. When Joe connects the two switches together using the cable, they fail to establish a connection. Which of the following is MOST likely the issue?
A. The cable has exceeded bend radius limitations.
B. The cable is a straight through.
C. The cable is a cross over.
D. The cable has RJ-11 connectors instead of RJ-45.
Answer: B
A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments?
A. The internal network since it is private
B. The admin private network allowing only admin access
C. The DMZ only allowing access from the segment with the servers
D. The internet connection to allow admin access from anywhere
Answer: B
An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office. Which of the following did the administrator set up? A. CAN B. MAN C. WAN D. LAN
Answer: A
A technician is being tasked to centralize the management of the switches and segment the switches by broadcast domains. The company is currently all on VLAN1 using a single private IP address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. Which of the following options would work BEST to accomplish these requirements?
A. Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with native VLAN 100
B. Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with native VLAN 100
C. Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100
D. Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100
Answer: D
In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO) A. Memorandum of understanding B. Data classification document C. Service level agreement D. Interconnection security agreement E. Consent to monitor F. Acceptable use policy
Answer: A,F
A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable? A. Wavelength mismatch B. Distance limitations C. Connector mismatch D. Attenuation/Db loss:
Answer: C