Topic 6: Mixed Set (8) Flashcards
A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments about the rack. Which of the following is MOST likely cause of the connectivity issue and alarms?
A. The OC2 was improperly provisioned.
B. The cable was improperly crimped.
C. The bend radius of the cable has been exceeded.
D. The new OC3 cable is experiencing EMI.
Answer: C
A software company is meeting with a car manufactures to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer’s next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company’s mapping application suite. The software company can offer its enhanced mapping application to other car manufacturer but must pay the car manufacturer a royalty. Which of the following BEST describes this document? A. MSA B. SLA C. MOU D. SOW
Answer: D
A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is: A. ARP cache poisoning B. amplified DNS attacks C. sessions hijacking D. creating an evil twin
Answer: A
Two office buildings are connected via copper network cabling buried in the ground. During local construction, the second building suffers a permanent network outage. Which of the following are MOST likely the causes of the outage? (Select two.) A. Crosstalk B. Open circuit C. Short circuit D. Signal attenuation E. Electromagnetic interference
Answer: B,C
A home user is configuring a wireless router and must decide which wireless standard to use. The user has many devices that require a lot of bandwidth and must be able to communicate at a far distance from the router. Which of the following wireless standards will BEST meet the home user’s requirements? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Answer: D
Patches have just need released by a third-party vendor to resolve a major vulnerability. There are over 100 critical devices that need to be updated. Which of the following actions should be taken to ensure the patch is installed with minimal downtime?
A. Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance:
B. Download and install all patches in the production network during the next scheduled maintenance period.
C. Configure end points to automatically download and install the patches.
D. Deploy the patch in a lab environment and immediately install it in the production environment.
Answer: D
While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following will BEST fulfill the requirement? A. Hook and loop straps B. Ladder trays C. Raised floor D. Cable ties
Answer: B
Which of the following functions would be used to securely monitor and actively manage external connections? A. VPN concentrator B. HIDS C. Load balancer D. Packet shaper
Answer: A
After receiving an IP lease from a DHCP server, when will a client first contact the DHCP server again to renew the lease? A. After ¼ of the lease has expired B. After ½ of the lease has expired. C. After ¾ of the lease has expired D. After the entire lease has expired
Answer: B
Which of the following describes a process that can translate internal network IP addresses to external ones? A. Change control B. NAT C. PAT D. Remote terminal emulation
Answer: B
A client requests that the network technician install additional hardware into multiple racks. Device placement has been properly mapped out within the racks to allow for suitable air flow. Additionally, the power has been balanced between the racks to allow for the additional equipment. Which of the following should the technician employ to follow best practices after installation of the equipment? A. Rack security B. Rach monitoring C. Generator testing D. Device labeling
Answer: A
A security department notices that the ports on a FTP server are experiencing a high rate of traffic, preventing legitimate traffic from reaching the server. Which of the following would the security department implement to identify and trap new attacks? A. Honeynet B. IDS C. HIPS D. ACL E. Firewall
Answer: B
A technician is configuring an ACL and needs to allow for traffic from a server to assign IP addresses to network devices. Which of the following ports and protocols should the technician configure? (Select two.) A. 67 B. 53 C. 161 D. DNS E. SNMP F. DHCP
Answer: A,F
When setting up a new network monitoring utility, a technician finds that some devices are not reporting correctly. Which of the following would MOST likely be required to correct the issue with an SNMP enabled monitoring utility? A. Updating MIBS B. Enabling port mirroring C. Enabling jumbo frames D. Configuring half duplex
Answer: A
A new fiber optic cable run has been installed, but users connected through the new cable are immediately reporting latency problems. Which of the following should the technician check? A. EMI/RFI B. Connector mismatch C. Crosstalk D. Bend radius
Answer: D
A company has separate subnets for each floor. A technician has moved a device from one floor to another and manually configured only the static IP address. The device can reach other devices on the floor in the same subnet, but it cannot reach devices on other floors. Which of the following should be configured to allow this device to work? A. Gateway B. SNMP C. Port speed D. MTU E. Subnet mask
Answer: E