Topic 6: Mixed Set (3) Flashcards
A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue? A. Test a theory to determine the cause B. Escalate to a senior technician C. Identify the symptoms D. Establish a theory of probable cause E. Establish a plan of action
Answer: D
Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following should the technician implement to avoid potential occurrences from happening in the future?
A. Block all ICMP request
B. Update all antivirus software
C. Remove all suspected users from the network
D. Upgrade firmware on all network cards
Answer: A
A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. Which of the following solutions should the technician design into the new network?
A. Place each department in a separate VLAN
B. Add a router and create a segment for all the monitoring host stations
C. Increase the number of switches on the network to reduce broadcasts
D. Increase the collision domain to compensate for the added broadcasts
Answer: A
A network technician determines that two dynamically assigned workstations have duplicate IP addresses. Which of the following commands should the technician use to correct this problem?
A. ipconfig /all
B. ipconfig /dhcp
C. ipconfig /release then ipconfig /renew
D. ipconfig /renew
Answer: C
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks? A. Social engineering B. Spoofing C. Zero-day attack D. VLAN hopping
Answer: A
The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals? A. Stateful firewall B. Premise-based IDS C. Host-based IDS D. Cloud-based anti-malware
Answer: A
A network administrator set up a network computer lab and discovered connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. Which of the following should the administrator perform FIRST?
A. Check if there are link lights on the ports
B. Check the ports on the switch for full duplex
C. Check to see if port security is enabled
D. Check to see if the uplink interface is configured correctly.
Answer: A
Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following? A. Multiplexing B. Zero-day attack C. Smurfing D. Bluejacking
Answer: D
Which of the following ports should be allowed to provide access to certain VoIP applications? A. 110 B. 139 C. 1720 D. 5060
Answer: D
A user receives a new computer and now is unable to connect to a database using ODBC. Other users on the network are able to connect successfully. A technician is able to successfully ping the database server but still is unable to connect. Which of the following is the issue? A. Missing IP routes on router B. Wrong default gateway address C. Software firewall is blocking ports D. Failing network interface card
Answer: C
A client is concerned with theft of equipment from the datacenter. Which of the following would provide the highest level of physical security for the client? A. Cipher lock B. Proximity reader C. Magnetic key swipe D. Man trap E. CCTV
Answer: D
A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. Additionally, warehouse workers must be able to scan and concurrently upload large images of items to a central server. Which of the following technologies is BEST suited in this facility? (Select TWO). A. 802.11ac B. P2P C. Bluetooth D. IR E. RFID F. NFC
Answer: A,E
Which of the following transmission methods is used for network utilizing the 802.3 standard? A. MAC B. Synchronous C. DSSS D. Broadband E. Baseband
Answer: A
A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk? A. Firewall B. Web filtering C. MAC filtering D. Host-based antivirus
Answer: C
OFDM, QAM and QPSK are all examples of which of the following wireless technologies? A. Frequency B. Modulation C. RF interference D. Spectrum
Answer: B
A client reports that half of the office is unable to access a shared resource. Which of the following should be used to troubleshoot the issue? A. Data backups B. Network diagrams C. Baseline information D. Vendor documentation
Answer: B