Topic 6: Mixed Set (8) Flashcards

1
Q

A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments about the rack. Which of the following is MOST likely cause of the connectivity issue and alarms?
A. The OC2 was improperly provisioned.
B. The cable was improperly crimped.
C. The bend radius of the cable has been exceeded.
D. The new OC3 cable is experiencing EMI.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A software company is meeting with a car manufactures to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer’s next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company’s mapping application suite. The software company can offer its enhanced mapping application to other car manufacturer but must pay the car manufacturer a royalty. Which of the following BEST describes this document?
A. MSA
B. SLA
C. MOU
D. SOW
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is:
A. ARP cache poisoning
B. amplified DNS attacks
C. sessions hijacking
D. creating an evil twin
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Two office buildings are connected via copper network cabling buried in the ground. During local construction, the second building suffers a permanent network outage. Which of the following are MOST likely the causes of the outage? (Select two.)
A. Crosstalk
B. Open circuit
C. Short circuit
D. Signal attenuation
E. Electromagnetic interference
A

Answer: B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A home user is configuring a wireless router and must decide which wireless standard to use. The user has many devices that require a lot of bandwidth and must be able to communicate at a far distance from the router. Which of the following wireless standards will BEST meet the home user’s requirements?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patches have just need released by a third-party vendor to resolve a major vulnerability. There are over 100 critical devices that need to be updated. Which of the following actions should be taken to ensure the patch is installed with minimal downtime?
A. Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance:
B. Download and install all patches in the production network during the next scheduled maintenance period.
C. Configure end points to automatically download and install the patches.
D. Deploy the patch in a lab environment and immediately install it in the production environment.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following will BEST fulfill the requirement?
A. Hook and loop straps
B. Ladder trays
C. Raised floor
D. Cable ties
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following functions would be used to securely monitor and actively manage external connections?
A. VPN concentrator
B. HIDS
C. Load balancer
D. Packet shaper
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
After receiving an IP lease from a DHCP server, when will a client first contact the DHCP server again to renew the lease?
A. After ¼ of the lease has expired
B. After ½ of the lease has expired.
C. After ¾ of the lease has expired
D. After the entire lease has expired
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following describes a process that can translate internal network IP addresses to external ones?
A. Change control
B. NAT
C. PAT
D. Remote terminal emulation
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A client requests that the network technician install additional hardware into multiple racks. Device placement has been properly mapped out within the racks to allow for suitable air flow. Additionally, the power has been balanced between the racks to allow for the additional equipment. Which of the following should the technician employ to follow best practices after installation of the equipment?
A. Rack security
B. Rach monitoring
C. Generator testing
D. Device labeling
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A security department notices that the ports on a FTP server are experiencing a high rate of traffic, preventing legitimate traffic from reaching the server. Which of the following would the security department implement to identify and trap new attacks?
A. Honeynet
B. IDS
C. HIPS
D. ACL
E. Firewall
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A technician is configuring an ACL and needs to allow for traffic from a server to assign IP addresses to network devices. Which of the following ports and protocols should the technician configure? (Select two.)
A. 67
B. 53
C. 161
D. DNS
E. SNMP
F. DHCP
A

Answer: A,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
When setting up a new network monitoring utility, a technician finds that some devices are not reporting correctly. Which of the following would MOST likely be required to correct the issue with an SNMP enabled monitoring utility?
A. Updating MIBS
B. Enabling port mirroring
C. Enabling jumbo frames
D. Configuring half duplex
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A new fiber optic cable run has been installed, but users connected through the new cable are immediately reporting latency problems. Which of the following should the technician check?
A. EMI/RFI
B. Connector mismatch
C. Crosstalk
D. Bend radius
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A company has separate subnets for each floor. A technician has moved a device from one floor to another and manually configured only the static IP address. The device can reach other devices on the floor in the same subnet, but it cannot reach devices on other floors. Which of the following should be configured to allow this device to work?
A. Gateway
B. SNMP
C. Port speed
D. MTU
E. Subnet mask
A

Answer: E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
An organization is upgrading the operating system on several servers and wants to keep legacy input devices. Which of the following needs to be verified before the upgrade to ensure the input devices will be supported after the upgrade?
A. Driver updates
B. Virtual terminals
C. Firmware updates
D. IP address assignments
A

Answer: A

18
Q

A technician is installing new PCs on the network. After installing the latest patches and OS updates, a user is receiving an “unsupported version” error message when accessing a webbased application. Which of the following should the technician perform to fix this issue?
A. Upgrade SNMP to SNMPv3
B. Switch from HTTP to HTTPS
C. Roll back the web browser to a previous version
D. Roll back the OS to a previous version

A

Answer: D

19
Q
A user is unable to log into the network successfully. Which of the following are steps of the troubleshooting methodology used to identify the problem?
A. Use troubleshooting tools
B. Document actions
C. Duplicate problem
D. Identify effects of resolution
E. Question users
A

Answer: B,C,E

20
Q
When introducing new devices to the network, the organization’s security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
B. Baseline
C. Forensic log
D. Vulnerability assessment
A

Answer: B

21
Q
administrator has configured EAP-TLS to support NAC on the network. The company is trying to implement which of the following standards?
A. Kerberos
B. SNMPv3
C. 802.3af
D. 802.1x
A

Answer: D

22
Q
UDP is BEST used for:
A. remote desktop connections
B. file download
C. streaming media
D. secure tunneling
A

Answer: C

23
Q

A network administrator believes that the traffic from a load balancer is only being sent to a single backend server. However, the administrator does not have administrative access to the load balancers or the backend servers. Which of the following should the administrator do to verify this suspicion?
A. Selectively disable the switch ports connected to the load balancers to determine if traffic is still flowing.
B. Enable port mirroring on the switch connected to the backend servers and analyze the traffic captured.
C. Create a port channel on the switch that includes all of the backend servers and verify the interfaces all have equal traffic.
D. Configure the switch port connected to the load balancer’s ingress port to send traffic to a collector for analysis.

A

Answer: B

24
Q
A technician is configuring mobile devices for new employees. Which of the following documents should be updated to show that the new employees are receiving these mobile devices?
A. Network diagram
B. Asset management
C. Organizational chart
D. Standard operating procedure
E. Change management
A

Answer: B

25
Q
Given the following system requirements: Automatically assigns IP addresses Only authorized workstations can be connected Notify the network administrator of potentially malicious activity Which of the following must be implemented to satisfy these conditions? (Select three.)
A. DNS
B. Content filtering
C. MAC filtering
D. NIDS
E. VPN
F. RADIUS
G. DHCP server
H. URL cache
I. Load balancer
A

Answer: C,D,G

26
Q
A company technician has set up the network so that all external protections and internal protections across the network are segregated from any malicious attacks and there are firewalls configured on both sides of the DMZ. During the configuration review of the device installation, there is evidence of unauthorized network traffic penetrating the internal network. Which of the following is either missing or incorrectly configured in the firewall settings?
A. Stateful settings
B. UTM
C. ACL
D. Implicit deny
E. Stateless settings
A

Answer: A

27
Q
Users report they are receiving an unusual amount of suspicious email from the network administrator. Which of the following is the cause of this security issue?
A. Ping of death
B. DDoS attack
C. Jamming
D. Malware
A

Answer: D

28
Q
A network technician has been asked to add a user to an administrative group on the network. Which of the following change management procedures should be followed?
A. Network configuration
B. Potential impact analysis
C. Rollback process
D. Approval process
A

Answer: D

29
Q
Which of the following is an advantage of utilizing a Layer 2 switch rather than a hub?
A. A switch avoids broadcast storms
B. A switch detects frame collisions
C. A switch increases broadcast domains
D. A switch increases collision domains
A

Answer: B

30
Q
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a backend directory service. Which of the following services could be run on the VPN concentrator to perform this authentication?
A. Kerberos
B. RADIUS
C. GRE
D. IPsec
A

Answer: B

31
Q
A network administrator at a large campus has determined that many connectivity issues reported in the residence halls are due to residents connecting the LAN side of personal routers to the campus network. Which of the following can be implemented to resolve this problem?
A. Loop protection
B. Disable the default VLAN
C. DHCP snooping
D. Disabling multicast
A

Answer: C

32
Q
In a home network, all clients are accessing the Internet via a single host.  This is an example of which of the following?
A. Point-to-multipoint
B. Peer-to-peer
C. Partial mesh
D. Hybrid
A

Answer: A

33
Q
A PC is having trouble connecting to a remote resource. Which of the following will identify the routers a packet travels through and provide real-time feedback regarding latency?
A. tracert
B. NETBIOS
C. ipconfig
D. nslookup
E. ping
A

Answer: A

34
Q
A company is building a new 10Gb Ethernet top of rack network. Which of the following media is MOST cost-effective for this implementation?
A. CAT5e
B. Multimode fiber
C. Single mode fiber
D. Fibre channel
A

Answer: B

35
Q

When setting up a virtual machine, which of the following is an advantage of a virtual NIC as compared to a hardware NIC?
A. A virtual NIC does not require a dedicated slot.
B. A virtual NIC does not have to be assigned an IP address.
C. A virtual NIC is backwards compatible to work with IPv4.
D. A virtual NIC exceeds the IP port limits.

A

Answer: A

36
Q
A company would like to offer free wireless Internet to visiting customers without compromising security on their internal network. Which of the following firewall rules should a technician configure to accomplish this?
A. Block all LAN to LAN traffic
B. Block all LAN to WLAN traffic
C. Block all WAN to LAN traffic
D. Block all WLAN to LAN traffic
A

Answer: D

37
Q

A company is moving into a larger office space. A site survey is performed, a network layout is created, and access points are placed throughout the building. Which of the following steps should the network technician take NEXT to ensure blanket wireless coverage?
A. Create a heat map and adjust access points.
B. Broadcast the SSID to connect all devices.
C. Replace all antennas with omni-directional types.
D. Configure 5GHz dual channel broadcasting.

A

Answer: B

38
Q
Which of the following would BEST mitigate the risk of social engineering?
A. Man traps
B. Business continuity planning
C. End-user training
D. Penetration testing
A

Answer: C

39
Q

Which of the following is an effect of the protocol mechanism QoS with reference to unified communication?
A. QoS ensures that unified communication video service is delivered as high definition between the unified communication endpoints.
B. QoS enables the unified communication traffic compression algorithm to conserve bandwidth across the WAN.
C. QoS ensures that real time traffic is not delayed between unified communication endpoints.
D. QoS prevents any degradation in the voice/video signal quality by tunneling the packets between the unified communication endpoints.

A

Answer: C

40
Q
A network technician is troubleshooting a WAN link that traverses a 100-foot span of RG6. The technician utilizes a Time Domain Reflectometer (TDR) to proof the cable during the troubleshooting process. The TDR returns a trace that drops off suddenly at 51 feet (15.54 meters). Which of the following is this indicative of?
A. Open
B. TX/RX reverse
C. Short
D. Crosstalk
A

Answer: A