Topic 6: Mixed Set (7) Flashcards
After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity is intermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boiler rooms of each building. Which of the following is the MOST likely reason for the connectivity issue?
A. The wrong SFPs are being used
B. There is interference from the electrical room.
C. CM1 fiber should be used instead
D. There is heat from the boiler room
Answer: A
Several users at an adjacent office building report connectivity issues after a new building was built in between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption and channels are all correct. Which of the following is MOST likely the cause of this issue? A. Device saturation B. Antenna type C. Bandwidth saturation D. Interference
Answer: D
Ann, a technician, connects a pair of switches using redundant links. When she checks the status of the links, one of them is not active, even when she changes ports. Which of the following MOST likely disabled the redundant connection to the other switch? A. Spanning tree B. IGRP routing C. SSID mismatch D. Port mirroring
Answer: A
A network administrator has determined the ingress and egress traffic of a router’s interface are not being correctly reported to the monitoring server. Which of the following can be used to determine if the router interface uses 64b vs 32b counters? A. SNMP walk B. Packet analyzer C. SYSLOG server D. Port Scanner
Answer: A
Which of the following is an example of a signaling protocol used in VoIP telephony? A. VRRP B. H 323 C. RTSP D. SIP
Answer: D
A network administrator is troubleshooting an issue with unstable wireless connections in a residence hall. Students on the first and second floors are reporting the hall’s SSID is not visible in the evenings. The network administrator has verified the wireless system is operating normally. Which of the following is the MOST likely cause for the problem reported by students?
A. Internet router maintenance is scheduled.
B. An ARP attack is underway.
C. The SSID is set to hidden.
D. A jammer is being used.
Answer: A
Which of the following is the number of bits there are in 1024 bytes? A. 512b B. 4096b C. 8000b D. 8192b
Answer: D
Policies, procedures and end-user training are effective ways to mitigate: A. zero-day attacks B. attempted DDoS attacks C. man-in-the-middle attacks D. social engineering attempts
Answer: A
When a criminal or government investigation is underway, which of the following describes the identification, recovery or exchange of electronic information relevant to that investigation? A. Data transport B. First responder C. eDiscovery D. Encryption
Answer: C
A network architect is designing a highly redundant network with a distance vector routing protocol in order to prevent routing loops, the architect has configured the routers to advertise failed routes with the addition of an infinite metric. Which of the following methods has the architect chosen? A. Spanning tree B. Split horizon C. Route poisoning D. Hold down timers
Answer: C
A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. Which of the following features should the engineer use in order to dynamically limit the number of devices in each broadcast domain? A. VLAN pooling B. Subnetting C. WPA2 D. LWAPP
Answer: D
A company is setting up a brand new datacenter and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. Which of the following should be installed to meet the requirements? A. Conduit B. Cable trays C. Patch panels D. Raised floor
Answer: C
A technician troubleshooting an area that is having difficulty connecting to a WAP. After identifying the symptoms, which of the following should the technician do NEXT? A. Document findings. B. Resolve the issue. C. Establish the probable cause. D. Implement a solution.
Answer: C
A network engineer is designing a wireless network that uses multiple access point for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point?
A. Adjacent access point should be assigned channels 1, 6, and 11 with a 20MHz channel width.
B. Adjacent access points should be assigned channels 2,6, and 10 with a 20MHz channel width.
C. Adjacent access points should be assigned channels 7 and 11 with a 40MHz channel width.
D. Adjacent access points should be assigned channels 8 and 11 with a 40MHz channel width.
Answer: A
A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. Which of the following options will help to quickly identify the switches connected to each port?
A. Configure TACACs+ on each network device.
B. Enable a discovery protocol on the network devices.
C. Configure each uplink to send LACP discovery units.
D. Enable a packet sniffer on each network device’s uplink port.
Answer: B
Explanation: “Neighbor discovery protocols are essential for network administrators and management tools to accurately construct a view of the network topology. Each manufacturer has its own supported mix of neighbor discovery protocols, loosely based on how standards-focused that vendor is and how much it wants to pay in royalties to use proprietary protocols. The two most widely used are LLDP (Link Layer Discovery Protocol), an IEEE standard, and CDP (Cisco Discovery Protocol).”
The BEST way to secure the most vulnerable attack vector for a network is to:
A. Update all antivirus definitions on workstations and servers.
B. Use biometrics and SSO for authentication.
C. Remove unneeded services running on the servers.
D. Provide end-user awareness training to office staff.
Answer: A