Topic 6: Mixed Set (5) Flashcards
A technician has completed a survey of a wireless network and documented signal strengths. This document is known as which of the following? A. LogicalNetwork map B. Heat map C. Network baseline D. Bandwidth survey
Answer: B
A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT? A. Secure the area B. Initiate Data collection C. Create the forensics report D. Verify the chain of custody
Answer: A
Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back? A. The browser on the server B. The server's NIC drivers C. The server's IP address D. The antivirus updates
Answer: B
A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause? A. DoS B. Reflective DNS C. Man-in-the-middle D. ARP poisoning
Answer: C
A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office. Which of the following should be created? A. Guest network B. VLAN network C. Security network D. DMZ network
Answer: A
A network administrator has configured a new 100Mbs WAN circuit, but speed testing shows poor performance when downloading large files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the downloads speeds over time. The administrator checks the router interface and sees the following: Router01#show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000A.00BB.CC11 Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding Which of the following is MOST likely to resolve the issue?
A. Shutdown and then re-enable this interface
B. Reset the statistics counter for this interface
C. Remove default 802.1q tag and set to server VLAN
D. Apply egress port rate-shaping
Answer: C
A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the missing update or patch. Which of the following solutions would work BEST to present this data? A. Security policy B. Penetration scan C. Virus scan D. Vulnerability scanner
Answer: D
A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel. The technician has cabled this port to be used with which of the following? A. 10baseT B. POTS C. 568B D. 568A
Answer: B
Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following? A. Network handle B. Autonomous system number C. Route aggregation D. Top level domain
Answer: B
A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire. Which of the following is the best choice for the fire suppression system? A. Portable extinguishers B. Wet Pipe C. Clean Gas D. Dry Pipe
Answer: C
An offsite backup company involved in an investigation is not recycling outdated tapes. This is MOST likely due to: A. the process of eDiscovery B. a chain of custody breach C. a data transport request D. the notice of a legal hold
Answer: D
A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg % Processor Time =10% Avg Pages/Second = 0 Avg Disk Queue Length = 3 Based on the results, which of the following is causing a bottleneck? A. Hard drive B. Memory C. Processor D. NIC
Answer: A
A company needs to implement stronger authentication, by adding an authentication factor to their wireless system, which currently only supports WPA with pre-shared keys. The backend authentication system supports EAP and TTLS. Which of the following should the network administrator implement?
A. PKI with user authentication
B. 802.1x using EAP with MSCHAPv2
C. WPA2 with a complex shared key
D. MAC address filtering with IP filtering.
Answer: B
Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives "Destination Unreachable". Which of the following issues could this be? A. Denial of service attack B. Misconfigured DNS settings C. Misconfigured Split Horizon D. RADIUS authentication errors
Answer: C
Which of the following is a logical host on the network where unauthorized users believe they are on the production network? A. Virtual server B. VLAN C. Honeypot D. Virtual Terminal
Answer: C
A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the following is the MOST common connector that will be used on the switch to connect the media converter? A. FDDI B. Fiber coupler C. MT-RJ D. ST
Answer: D