Topic 6: Mixed Set (4) Flashcards

1
Q
A secondary datacenter in a remote location is used by a company. The cable management and power management are handled by the datacenter staff. The building security is also handled by the datacenter staff with little oversight. Which of the following should the network administrator do to adhere to best practices?
A. Secure the patch panels.
B. Ensure power monitoring is enabled.
C. Ensure rack security.
D. Secure the UPS units.
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is BEST used to perform a one-time temporary posture assessment in a NAC environment?
A. Intrusion prevention system
B. Host-based firewall
C. Non-persistent agent
D. Antivirus
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability?
A. Load balancing
B. MPLS trunking
C. VLAN tagging
D. Multiplexing
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path?
A. Omni-direction
B. Unidirectional
C. Patch
D. Yagi
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages. Which of the following is the MOST likely cause?
A. Evil twin
B. Session hijacking
C. Distributed DoS
D. ARP cache poisoning
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU. Which of the following was MOST likely used by the technician?
A. Cable analyzer
B. Toner probe
C. OTDR
D. Loopback plug
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC’s, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet these requirements?
A. The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network
B. The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only
C. The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range
D. The administrator should install a second physical NIC onto the host, and then connect each guest machine’s NICs to a dedicated physical NIC

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
A. Tagging
B. Encapsulation
C. Tunneling
D. De-encapsulation
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a device failure?
A. Vendor documentation
B. Archives/backups
C. Proper asset tagging and labeling
D. Network Baseline
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network technician has set up a firewall and entered only three rules allowing traffic on ports 21,110, and 25 to secure the network. Users are reporting they cannot access web pages using the URLs. Which of the following can the technician do to correct the situation?
A. Add a rule to the end allowing port 80 and 53.
B. Add a rule to the end allowing port 143 and 22.
C. Add a rule to the end allowing port 137 and 66.
D. Add a rule to the end allowing port 445 and 173.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future?
A. Helpdesk training
B. Appropriate use policy
C. User awareness training
D. Personal Identifiable Information
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of the following?
A. Network diagram
B. Site survey
C. Network topology
D. PoE requirements
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network administrator is configuring one distribution and five access switches, which will be installed in a new building. Which of the following is the BEST physical location for the equipment?
A. The distribution switch in the IDF and the access switches in the MDF
B. The distribution switch in the MDF and the access switches in the IDF
C. All switches should be placed in the IDF to leave room in the MDF for servers
D. All switches should be placed in the MDF to leave room in the IDF for servers

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection. This creates which of the following conditions?
A. Short
B. Twisted pair
C. Electrostatic discharge
D. Crosstalk
E. Open
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network?
A. Wireless bridge
B. VPN concentrator
C. Default WAP
D. Wireless router
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use?
A. BPDU
B. LACP
C. Spanning tree
D. Load balancing
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following ports is used to provide secure sessions over the web by default?
A. 22
B. 25
C. 80
D. 5004
A

Answer: A

18
Q
The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be provided, which of the following media will need to utilized?
A. CAT6e
B. CAT5e
C. 802.11n
D. 802.11ac
A

Answer: A

19
Q
A network technician needs to identify active services that should be disabled on the network. Which of the following tools would BEST accomplish this?
A. Packet analyzer
B. Content filter
C. Interface monitoring tool
D. Port scanner
A

Answer: D

20
Q
An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence?
A. Chain of custody
B. Legal hold
C. Divide and conquer
D. Persistent agents
A

Answer: B

21
Q
Which of the following infrastructure implementations is used to connect various circuits between remote locations?
A. WAN
B. PAN
C. WLAN
D. LAN
A

Answer: A

22
Q
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?
A. WPA2 security key
B. SSL certificates
C. CSMA/CA
D. RADIUS
A

Answer: D

23
Q
Which of the following devices actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?
A. Honeypot
B. IPS
C. Firewall
D. IDS
A

Answer: B

24
Q
A technician is installing a media converter that connects a newly installed multimode connection to an existing CAT5e infrastructure. Which of the following media converter types should the technician use?
A. Ethernet to coaxial
B. Fiber to Ethernet
C. Fiber to coaxial
D. Multimode to single mode fiber
A

Answer: B

25
Q
A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of its interfaces. How many broadcast domains are present in this company's network?
A. 1
B. 2
C. 5
D. 16
E. 28
A

Answer: B

26
Q

A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened. Which of the following should be one FIRST to resolve the problem?
A. Ensure that port 20 is open
B. Ensure that port 161 is open
C. Flush the DNS cache on the local workstation
D. Validate the security certificate from the host

A

Answer: A

27
Q
When a switch has multiple paths to reach the root bridge, into which of the following states is the port with the LEAST desirable path placed by the spanning tree protocol?
A. Forwarding
B. Bonding
C. Blocking
D. Listening
A

Answer: C

28
Q

Which of the following describes what occurs with the ID of a specified native VLAN when traffic passes over a trunk?
A. It becomes the gateway of last resort for the switch or router.
B. it becomes the default VLAN for the untagged frames.
C. it becomes the priority ID for all the VLAN traffic across the device.
D. It becomes the default gateway for the port or ports.

A

Answer: B

29
Q
After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected. Which of the following is the MOST likely cause?
A. Attenuation
B. Bad UPS
C. Cable short
D. Misconfigured DNS
A

Answer: C

30
Q
A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cord installed. Which of the following is MOST likely the cause of the issue?
A. Distance limitations
B. Wavelength mismatch
C. Bend radius limitation
D. Dirty connectors
A

Answer: D

31
Q
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages. This is an example of which of the following network segmentation techniques?
A. Compliance implementation
B. Separate public/private newtorking
C. Honeypot implementation
D. Performance optimization
A

Answer: D

32
Q

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation?
A. Allow the contractor to reset switches to factory defaults
B. Check the cabling on all switches for improper crossover use
C. Document the changes that were made
D. Downgrade firmware and restore backup configuration

A

Answer: D

33
Q
A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?
A. Content filter
B. Firewall
C. DNS
D. DHCP
A

Answer: B

34
Q
An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install?
A. A host- based firewall
B. A network-based firewall
C. A host-based stateful firewall
D. A stateless network-based firewall.
A

Answer: D

35
Q

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue?
A. Update the HOST file with the URLs for all websites
B. Use NSLOOKUP to resolve URLs
C. Ensure ICMP messages can pass through the firewall
D. Enable port 53 on the firewall

A

Answer: D

36
Q
A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback?
A. Channel remote module
B. Fiber optic modem
C. Channel service unit
D. Digital subscriber line modem
A

Answer: C

37
Q
A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?
A. SLIP
B. SNMPv3
C. TKIP
D. SNMPv2
A

Answer: B

38
Q
A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?
A. Firmware updates
B. Changing to IPv6
C. Cloning
D. Vulnerability patching
A

Answer: A

39
Q
A home office has a dozen devices that need a class based DHCP device to assign addresses. The subnet only has one octet for the host portion of each device. Which of the following IP addresses would be assigned to the default gateway?
A. 10.0.0.1
B. 169.254.0.1
C. 192.168.0.1
D. 224.0.0.1
A

Answer: C

40
Q
A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement?
A. High availability
B. MAN network
C. Quarantine
D. Honeynet
A

Answer: C