Udemy Tests Flashcards
(134 cards)
A workstation is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can communicate with the VLAN gateway and access websites on the Internet. What might cause this issue?
The port is configured as a trunk port (802.1q) instead of an access port. Therefore the workstation is unable to contact the DHCP server.
Network traffic is not re routed automatically if an interruption occurs.
Static routing. New routes must be entered manually.
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?
UTM (Unified Threat Management) Appliance
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?
Make the change, document the requester, and document all network changes.
What allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps?
MIMO (Multiple-Input / Multiple-Output) and MU-MIMO (Multi User). MIMO uses multiple antennas for transmission and reception, resulting in a higher speed than 802.11a and 802.11g networks.
This happens to data as it travels from Layer 1 to Layer 7
De-encapsulation
What is a Split DNS?
Split DNS is an implementation in which two DNS servers are used for external and internal networks. This provides a security and privacy mechanism in which internal users use the internal DNS and untrusted, external users use the external DNS. There are two sets of DNS information, and the results are given based on the source address of the requester.
Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?
802.11g utilizes the 2.4GHz frequency and can reach up to 54 Mbps
Which type of wireless network utilizes the 5GHz frequency band and reaches speeds of up to 54 Mbps?
802.11a utilizes the 5GHz band and cbs reach up to 54 Mbps
Which type of wireless network utilizes the 2.4GHz frequency and reaches speeds of up to 11 Mbps?
802.11b utilizes the 2.4GHz frequency band and can reach speeds up to 11Mbps
Which type of wireless network utilizes both 5 GHz and 2.4 GHz frequency band and reaches speeds of up to 600 Mbps (5GHz) or 108 Mbps (2.4GHz). This standard also introduced MIMO.
802.11n can use both 5 GHz and 2.4 GHz.
Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps?
802.11ac (Wi-Fi 5)
Which type of wireless network utilizes both the 5GHz and 2.4 GHz frequency band and reaches speeds of up to 9.6 Gbps?
802.11ax (Wi-Fi 6)
You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. What option should you enable to ensure the data is transferred confidentially?
authPriv - Ensures all data is sent with authentication and privacy
When connecting two nearby buildings, what type of antenna should you use?
Parabolic Antenna
The time delay between when a packet was sent and received
Latency
What is RSSI
Received Signal Strength Indacator
What command is used to create, view, or modify manual entries in the network routing tables of a computer or server.
Route
Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. What command should he enter on his workstation to resolve this connectivity issue?
nbtstat -r
This command purges and reloads the cached name table from the LMHOST file on their Windows workstation.
What is a Yagi Antenna used for
Directional transmission over long distances
What might cause signal attenuation?
Obstructions blocking the line-of-sight of antennas.
What are the troubleshooting steps
- Identify the problem
- Establish a theory
- Test the theory
- Establish a plan of action
- Implement the solution
- Verify full system functionality
- Document findings and actions
What should you use to protect IoT devices
- WPA2 security with a strong password
- Create a separate VLAN for IoT devices to segregate them from your normal network.
Which of the following must be added to a VLAN’s gateway to improve the security of the VLAN?
Access Control List