Woensdag 601-750 Flashcards

1
Q

A network technician is configuring a wireless access point and wants to only allow company-owned devices to associate with the network. The access point uses PSKs, and a network authentication system does not exist on the network. Which of the following should the technician implement?
A.Captive portal
B.Guest network isolation
C.MAC filtering
D.Geofencing

A

Answer: C

Explanation:
C. MAC filteringTo only allow company-owned devices to associate with the wireless network when using PSKs (Pre-Shared Keys) and in the absence of a network authentication system, the network technician should implement MAC filtering. MAC filtering involves creating a whitelist of allowed MAC addresses (the unique hardware addresses of network interfaces) that are permitted to connect to the wireless network.By configuring MAC filtering on the wireless access point, only devices with MAC addresses specified in the whitelist will be allowed to associate with the network.Therefore, the correct answer is C. MAC filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Following a fire in a data center, an executive is concerned about the amount of data that must be reentered. Which of the following describes the executive’s concern?
A.RTO
B.MTBF
C.MMTR
D.RPO

A

Answer: D

Explanation:
A recovery point objective (RPO) is the maximum length of time permitted that data can be restored from, which may or may not mean data loss. It is the age of the files or data in backup storage required to resume normal operations if a computer system or network failure occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?
A.110
B.66
C.Bix
D.Krone

A

Answer: A

Explanation:
110 is used for ethernet. Bix and Krone are proprietary, and 66 block is for telephone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network engineer turned on logging to assist with troubleshooting a suspected configuration issue. Which of the following would provide the network engineer with the most informative log information?
A.FATAL
B.ERROR
C.DEBUG
D.WARN

A

Answer: C

Explanation:
DEBUG log entries contain the most detailed information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?

A.The switch is oversubscribed and cannot handle the additional throughput.
B.The printer is tying up the server with DHCP discover messages.
C.The web server’s back end was designed for only single-threaded applications.
D.The workstation was configured with a static IP that is the same as the server.

A

Answer: D

Explanation:
D. The workstation was configured with a static IP that is the same as the server.If a workstation is configured with a static IP address that is the same as the server’s IP address, it can lead to network conflicts and connectivity issues. This is known as an IP address conflict, where two devices on the same network have the same IP address.Therefore, the most likely cause of the reported issue is that the workstation and the server have conflicting IP addresses, leading to connectivity problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following OSI model layers are responsible for handling packets from the sources to the destination and checking for errors? (Choose two.)
A.Physical
B.Session
C.Data link
D.Network
E.Presentation
F.Application

A

Answer: CD

Explanation:
C. Data linkD. NetworkLayers responsible for handling packets from source to destination and checking for errors in the OSI model are:C. Data link: This layer is responsible for framing packets, error detection, and handling the access to the physical network medium. It includes the logical link control (LLC) sublayer and the media access control (MAC) sublayer.D. Network: This layer is responsible for routing packets between different networks, logical addressing, and providing services such as fragmentation and error handling. It includes IP (Internet Protocol) in the case of the TCP/IP protocol suite.Therefore, the correct answers are C. Data link and D. Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following fiber connector types is the most likely to be used on a network interface card?
A.LC
B.SC
C.ST
D.MPO

A

Answer: A

Explanation:
LC - widely used due to its small size and ease of use SC - used in Gigabit Ethernet networks, data com, and telecom applications ST - used in multimode data com (but was replaced by SC and LC)MPO - used in high-speed data center applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describe the functions of Layer 2 of the OSI model? (Choose two.)
A.Local addressing
B.Error preventing
C.Logical addressing
D.Error detecting
E.Port addressing
F.Error correcting

A

Answer: AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10GB connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?
A.Port mirroring
B.Log aggregation
C.Flow data
D.Packet capture

A

Answer: C

Explanation:
C. Flow data. Flow data, collected through flow monitoring protocols such as Net Flow, s Flow, or IPFIX, provides aggregated information about network traffic, including details on source and destination IP addresses, ports, protocols, and more. This method doesn’t capture the actual packet contents but summarizes network traffic flow. By leveraging flow data, the network administrator can gather information about the traffic patterns and bandwidth usage across the network. This method is less resource-intensive than performing packet captures and can provide valuable insights into the sources and destinations of the traffic causing the saturation on the 40Gb connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following security concepts is related to ensuring that encrypted data is not edited while in transit?
A.Zero trust
B.Integrity
C.Availability
D.Confidentiality

A

Answer: B

Explanation:
B. Integrity (GPT4)Integrity in the context of cybersecurity refers to the assurance that data is not altered or tampered with in transit. It ensures that the information sent from the source arrives at the destination exactly as it was sent, without any unauthorized modifications. This is an essential security concept for encrypted data to ensure that it remains trustworthy and unaltered during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user took a laptop on a trip and made changes to the network parameters while at the airport. The user can access all internet websites but not corporate intranet websites. Which of the following is the most likely cause of the issue?
A.Duplicate IP address
B.Duplicate SSID
C.Incorrect DNS
D.Incorrect subnet mask

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?
A.Change the email client configuration to match the MX record.
B.Reduce the TTL record prior to the MX record change.
C.Perform a DNS zone transfer prior to the MX record change.
D.Update the NS record to reflect the IP address change.

A

Answer: B

Explanation:
B. Reduce the TTL (Time To Live) record prior to the MX record change.TTL (Time To Live): TTL is a value in a DNS record that determines the amount of time it can be cached by DNS resolvers and other devices on the internet. When making changes to DNS records, reducing the TTL beforehand helps minimize the time it takes for the changes to propagate throughout the internet.MX Record Change: Changing the MX (Mail Exchange) record directs email traffic to the specified mail server. However, DNS changes take time to propagate across the internet due to caching. If the TTL is set too high, old records may be cached for an extended period, leading to email delivery issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would be best suited for use at the access layer in a three-tier architecture system?
A.Router
B.Multilayer switch
C.Layer 2 switch
D.Access point

A

Answer: B

Explanation:
B. Multilayer Switch (BEST answer)Rationale: Layer 2 switches can (and do) reside at the access layer, BUT multilayer switches are used at the access layer to efficiently manage local traffic within a network segment while also allowing for inter-VLAN routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following layers of the OSI model is responsible for end-to-end encryption?
A.Presentation
B.Application
C.Session
D.Transport

A

Answer: A

Explanation:
A. Presentation.

The Presentation layer of the OSI model is primarily responsible for formatting, encrypting, and compressing data in a way that the Application layer can understand. Encryption, as a part of data formatting, is often implemented in this layer to ensure end-to-end secure communication between applications.

While encryption can also be implemented at other layers of the OSI model, such as the Application layer (for application-specific encryption) and the Transport layer (for transport-level encryption such as SSL/TLS), the Presentation layer specifically deals with the syntax and semantics of the data to be exchanged and is where data encryption/decryption often takes place, allowing for secure communication between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is most needed?
A.Temperature sensor in the network MOF
B.Water sensor in the network MDF
C.Temperature sensor in the data center
D.Water sensor in the data center

A

Answer: B

Explanation:
Correct answer is B:Water sensor in the network MDF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)

A.Least privilege network access
B.Dynamic inventories
C.Central policy management
D.Zero-touch provisioning
E.Configuration drift prevention
F.Subnet range limits

A

Answer: AC

Explanation:
A. Least privilege network access: Implementing the principle of least privilege ensures that users and systems have only the minimum levels of access or permissions necessary to perform their functions. This helps to limit the potential impact of security breaches.C. Central policy management: Centralized policy management allows for consistent application of security policies across the entire network. This ensures that security settings are centrally configured, monitored, and enforced, reducing the likelihood of misconfigurations or oversights that could lead to security vulnerabilities.While all the options listed can contribute to overall security, the two mentioned above are particularly effective in controlling access and managing security policies, which are crucial aspects of post-breach security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is most likely to be implemented to actively mitigate intrusions on a host device?
A.HIDS
B.NIDS
C.HIPS
D.NIPS

A

Answer: C

Explanation:
Correct answer is C:HIPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?
A.NGFW
B.Proxy
C.Layer 3 switch
D.Load balancerv

A

Answer: A

Explanation:
A. NGFW (Next-Generation Firewall)

NGFW (Next-Generation Firewall): NGFWs are advanced security devices that go beyond traditional firewalls. They provide filtering and inspection capabilities at multiple OSI layers, including application-layer filtering, intrusion prevention, and advanced threat protection. NGFWs are designed to offer more sophisticated and comprehensive security features compared to traditional routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A customer lost the connection to the telephone system. The administration console is configured with multiple network interfaces and is connected to multiple switches. The network administrator troubleshoots and verifies the following:

*The support team is able to connect remotely to the administration console.
*Rebooting the switch shows solid link and activity lights even on unused ports.
*Rebooting the telephone system does not bring the system back online.
*The console is able to connect directly to individual modules successfully.

Which of the following is the most likely reason the customer lost the connection?
A.A switch failed.
B.The console software needs to be reinstalled.
C.The cables to the modules need to be replaced.
D.A module failed.

A

Answer: D

Explanation:
Correct answer is D:A module failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following ports is used for secure email?
A.25
B.110
C.143
D.587

A

Answer: D

Explanation:
D. 587Port 587 is typically used for secure email submission, specifically for sending emails securely using the SMTP (Simple Mail Transfer Protocol) with TLS (Transport Layer Security) or SSL (Secure Sockets Layer) encryption. It’s commonly used as an alternative to port 25 for secure mail submission by mail clients or applications.

16
Q

A network administrator wants to install new VoIP switches in small network closet but is concerned about the current heat level of the room. Which of the following should the administrator take into consideration before installing the new equipment?
A.The power load of the switches
B.The humidity in the room
C.The fire suppression system
D.The direction of airflow within the switches

A

Answer: A

Explanation:
A. The power load of the switches.Power Load of the Switches: VoIP switches generate heat, and the power load they impose on the electrical infrastructure can contribute to the overall heat level in the room. It’s crucial to ensure that the existing cooling system can handle the additional heat generated by the new switches. This involves evaluating the power requirements of the switches and making sure they are within the capacity of the room’s cooling system.

16
Q

Which of the following is the next step to take after successfully testing a root cause theory?
A.Determine resolution steps.
B.Duplicate the problem in a lab.
C.Present the theory for approval.
D.Implement the solution to the problem.

A

Answer: A

Explanation:
A. Determine resolution steps. Once a root cause theory has been tested and verified, the next step is to devise a plan for resolving the identified issue or problem. This involves determining the specific steps or actions necessary to implement a solution based on the validated theory. It precedes the actual implementation of the solution to address the problem effectively and prevent its recurrence.

17
Q

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?
A.Configure ACLs.
B.Implement a captive portal.
C.Enable port security.
D.Disable unnecessary services.

A

Answer: C

Explanation:
C. Enable port security.Port security is a feature available on network switches that allows the administrator to control which devices are permitted to connect to individual switch ports. It enables the switch to limit and identify the MAC addresses allowed to access the network through specific switch ports.By configuring port security, the administrator can define and restrict the number of MAC addresses allowed on a port, specify which MAC addresses are permitted to access the port, and take actions (like shutting down the port) when unauthorized devices attempt to connect. This helps to prevent unauthorized devices from gaining network access via that switch port.

18
Q

An organization has a factory automation solution that requires accurate timing between devices. Which of the following should the network administrator implement?
A.PTP
B.NTP
C.NTS
D.DoT

A

Answer: A

Explanation:
A. PTP (Precision Time Protocol).PTP is designed for precisely synchronizing the clocks of devices within a network. It provides highly accurate time distribution by synchronizing the clocks to a master clock, ensuring the devices maintain very close time alignment. This level of precision is crucial in scenarios where timing between devices needs to be synchronized, such as in factory automation solutions where events or processes are time-dependent and require exact timing for proper execution.

19
Q

A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?
A.A separate scope for the file server using a /32 subnet
B.A reservation for the server based on the MAC address
C.A static IP address within the DHCP IP range
D.A SLAAC for the server

A

Answer: B

Explanation:
B. A reservation for the server based on the MAC address.Assigning a DHCP reservation for the server based on its MAC address ensures that the file server will consistently receive the same IP address every time it connects to the network. This approach provides the advantages of DHCP (automatic assignment of IP addresses) while also guaranteeing a specific and consistent IP address for the file server, making it easy for users to access it reliably.

20
Q

Which of the following ports is a secure protocol?
A.20
B.23
C.443
D.445

A

Answer: C

Explanation:
C. 443

Port 443 is associated with the HTTPS (Hypertext Transfer Protocol Secure) protocol, which is a secure version of HTTP. HTTPS is commonly used for secure communication over a computer network, such as the internet. It encrypts the data exchanged between a user’s web browser and a web server, providing a secure and private connection.

21
Q

A network deployment engineer is deploying a new single-channel 10G optical connection. Which of the following optics should the engineer MOST likely use to satisfy this requirement?
A.QSFP
B.QSFP+
C.SFP
D.SFP+

A

Answer: D

21
Q

Users are moving back into an office that had been vacant for a while. Ten workstations are hooked up in the office, but one workstation cannot obtain a link with the switch. A network engineer checks the documentation and cable labeling, and everything is hooked up as expected. The engineer moves the connection to a different switchport. but a link still cannot be obtained. When the engineer puts a tone generator on the infrastructure cable, no tone is heard at the far end. Which of the following issues is the engineer MOST likely trying to find?
A.A bad switchport
B.A break in the cable
C.A cable short
D.Cable interference

A

Answer: B

Explanation:
B. A break in the cableGiven the scenario where moving the connection to a different switch port did not resolve the issue and no tone is heard at the far end when using a tone generator on the infrastructure cable, the engineer is most likely trying to find a break in the cable. The absence of a tone signal at the far end indicates a discontinuity or complete break in the cable, which prevents the signal from traveling the entire length of the cable. This would also explain why the workstation cannot obtain a link with the switch, as the physical pathway for the network connection is interrupted.

22
Q

Which of the following services provides the network information for the address when IPv6 is used for SLAAC addressing?
A.EUI-64
B.IPv6 unicast routing
C.Router advertisement
D.DHCPv6

A

Answer: C

Explanation:
C. Router advertisement

Router advertisement messages are used in IPv6 networks to advertise routing information, including network prefixes, to hosts. When SLAAC is used, routers send router advertisement messages periodically, informing hosts about the network’s prefix, which the hosts then use to generate their IPv6 addresses. This process allows hosts to configure their own IPv6 addresses without the need for a DHCPv6 server.

23
Q

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?
A.Increase the bandwidth allocation to the computer.
B.Install an access switch in the annex and run fiber to the distribution switch.
C.Run a Cat 7 cable from the computer to the distribution switch.
D.Enable the computer to support jumbo frames.

A

Answer: A

Explanation:
Increase the bandwidth allocation to the computer.

24
Q

An older web server on a screened subnet is serving unencrypted web traffic. The server is not capable of serving HTTPS traffic directly, but the firewall is capable of doing so. Which of the following should be done to encrypt all traffic coming into the web server from outside the network? (Choose two.)
A.A certificate should be installed on the server.
B.Incoming port 80 traffic at the firewall should be forwarded to port 443 on the server.
C.Incoming port 80 traffic at the firewall should be forwarded to port 80 on the server.
D.Incoming port 443 traffic at the firewall should be forwarded to port 80 on the server.
E.A certificate should be installed on the firewall.
F.A proxy server should be installed on the screened subnet.

A

Answer: AB

Explanation:
A.A certificate should be installed on the server.

B.Incoming port 80 traffic at the firewall should be forwarded to port 443 on the server.

25
Q

A network manager wants to set up a remote access system for the engineering staff. Access to this system will be over a public IP and secured with an ACL. Which of the following best describes this system?
A.VPN
B.Secure Shell
C.Jump server
D.API

A

Answer: A

Explanation:
C.Jump Server

Setting up a remote access system for the engineering staff that is accessible over a public IP and secured with an Access Control List (ACL) best describes a Virtual Private Network (VPN) setup. A VPN allows remote users to securely connect to the internal network over the internet by encrypting the data traffic.

26
Q

Which of the following IP transmission types encrypts all of the transmitted data?
A.ESP
B.AH
C.GRE
D.UDP
E.TCP

A

Answer: A

Explanation:
A. ESPEncapsulating Security Payload (ESP) is a part of the IPsec suite that provides confidentiality, integrity, and authenticity to the data packets it transmits. ESP encrypts the payload of the IP packet to ensure that the transmitted data is confidential and protected from unauthorized access, making it the correct choice for encrypting all of the transmitted data.

27
Q

Which of the following is a characteristic of the application layer?
A.It relies upon other layers for packet delivery.
B.It checks independently for packet loss.
C.It encrypts data in transit.
D.It performs address translation.

A

Answer: C

Explanation:
C. It encrypts data in transit.The application layer is responsible for providing network services directly to end-users or applications. One of the characteristics of the application layer is the ability to encrypt data in transit to ensure secure communication. Encryption is a process of encoding data to make it secure and confidential during transmission over the network. This is commonly seen in secure communication protocols used by applications such as HTTPS (HTTP Secure) for secure web browsing.

28
Q

An administrator is adjusting the routing policy to ensure the headquarters location can connect to a new out-of-state branch office via BGP. Which of the following types of networks is being described?
A.PAN
B.MAN
C.LAN
D.WAN

A

Answer: D

Explanation:
D. WANThe scenario describes a Wide Area Network (WAN), which connects multiple local area networks (LANs) across geographically dispersed locations, such as between a headquarters and a new out-of-state branch office. WANs typically use technologies like Border Gateway Protocol (BGP) to manage the exchange of routing and reachability information between large networks on the internet.

29
Q

Which of the following combinations of single cables and transceivers will allow a server to have 40GB of network throughput? (Choose two.)
A.SFP+
B.SFP
C.QSFP+
D.Multimode
E.Cat 6a
F.Cat 5e

A

Answer: CD

Explanation:
C.QSFP+

D.Multimode

30
Q

A global company has acquired a local company. The companies are geographically separate. The IP address ranges for the two companies are as follows:

*Global company: 10.0.0.0/16
*Local company: 10.0.0.0/24

Which of the following can the network engineer do to quickly connect the two companies?
A.Assign static routing to advertise the local company’s network
B.Assign an overlapping IP address range to both companies.
C.Assign a new IP address range to the local company.
D.Assign a NAT range to the local company.

A

Answer: C

Explanation:
C. Assign a new IP address range to the local company.Given that both companies are currently using overlapping IP address ranges, the most straightforward and effective solution to quickly connect the two companies without causing IP address conflicts would be to reassign a new, non-overlapping IP address range to the local company. This change would ensure that both companies can communicate without any IP address conflicts or the need for complex routing rules to manage the overlap.

30
Q

A network technician is troubleshooting a connectivity issue. All users within the network report that they are unable to navigate to websites on the internet; however, they can still access local network resources. The technician issues a command and receives the following results:

Pinging comptia.com [172.67.217.56] with 32 bytes of data:
Reply from 172.67.217.56: TTL expired in transit.
Reply from 172.67.217.56: TTL expired in transit.
Reply from 172.67.217.56: TTL expired in transit.
Reply from 172.67.217.56: TTL expired in transit.

Which of the following best explains the result of this command?
A.Incorrect VLAN settings
B.Upstream routing loop
C.Network collisions
D.DNS misconfiguration

A

Answer: B

Explanation:
Upstream routing loop.

30
Q

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
A.SNMP trap
B.Port mirroring
C.Syslog collection
D.API integration

A

Answer: B

Explanation:
Port mirroring (also known as SPAN - Switched Port Analyzer) is the process of forwarding a copy of network packets from one port on a network switch to another port, where the packets can be analyzed. In this scenario, the network administrator should use port mirroring to send a copy of the network traffic to the passive IDS (Intrusion Detection System) for inspection without interrupting the normal flow of traffic on the network. This allows the IDS to monitor the network traffic and detect any suspicious or malicious activity.

30
Q

Which of the following routing technologies uses a successor and a feasible successor?
A.IS-IS
B.OSPF
C.BGP
D.EIGRP

A

Answer: D

Explanation:
EIGRP (Enhanced Interior Gateway Routing Protocol) utilizes both successor and feasible successor concepts for routing:Successor: The primary path to a destination with the best metric (lowest cost). This route gets installed in the routing table and is used for forwarding traffic.Feasible Successor: A backup path considered a viable alternative if the primary route fails. It meets specific criteria (feasible distance) but doesn’t have the absolute best metric. This route is stored in the topology table and can be immediately used for traffic forwarding if the successor goes down.

30
Q

A Chief Information Officer is concerned about environmental issues in the data center at corporate headquarters. Which of the following are the most common sensors installed in a data center? (Choose two.)
A.Carbon monoxide
B.Air flow
C.Flooding
D.Humidity
E.Electrical
F.Temperature

A

Answer: BD

Explanation:
B.Air flow.

D.Humidity.

31
Q

A network administrator is preparing new switches that will be deployed to support a network extension project. The lead network engineer has already provided documentation to ensure the switches are set up properly. Which of the following did the engineer most likely provide?
A.Physical network diagram
B.Site survey reports
C.Baseline configurations
D.Logical network diagram

A

Answer: D

Explanation:
Logical network diagram.

31
Q

A company is sending a switch to a remote site to be reused. An administrator needs to move the switch and ensure no network settings persist. Which of the following databases does the administrator need to delete?
A.VLAN
B.STP
C.ARP
D.Trunking

A

Answer: C

Explanation:
C. ARP (Address Resolution Protocol)When reusing a switch at a remote site and wanting to ensure that no network settings persist, the administrator should delete the ARP (Address Resolution Protocol) cache. ARP maintains a mapping between IP addresses and MAC addresses in a table, and clearing the ARP cache helps prevent any potential conflicts or issues when connecting the switch to a new network.Options A (VLAN), B (STP), and D (Trunking) are not databases but rather configuration settings that may need attention depending on the specific requirements of the new network. Deleting VLAN configurations, spanning tree protocol settings, or trunking configurations may be necessary, but they are not referred to as databases.

31
Q

Which of the following are the most likely reasons voltage calculations are made before installing equipment? (Choose two.)
A.To ensure equipment is not damaged
B.To send reports for compliance regulations
C.To speed up the installation process
D.To ensure compatibility
E.To meet legal requirements
F.To ensure the grounding is being maintained

A

Answer: AF

Explanation:
A.To ensure equipment is not damaged.

F.To ensure the grounding is being maintained.

31
Q

A company is upgrading the network switches at its backup data center, which is geographically separated from the main data center. The company hired a contractor to physically install and cable the new switches in their cabinets. Which of the following should the network engineering team provide to ensure the job is completed accurately?
A.Rack diagram
B.IDF diagram
C.Site survey
D.Logical diagram

A

Answer: A

Explanation:
Correct answer is A:Rack diagram.

32
Q

A network administrator needs to back up the configurations of all network devices and store the configurations off-line until they are needed. Which of the following should the administrator use to back up the configurations securely?
A.SFTP
B.Syslog
C.Telnet
D.SNMP

A

Answer: A

Explanation:
Correct answer is A:SFTP.

33
Q

A network administrator is planning to implement device monitoring to enhance network visibility. The security team requires that the solution provides authentication and encryption. Which of the following meets these requirements?
A.SIEM
B.Syslog
C.NetFlow
D.SNMPv3

A

Answer: D

Explanation:
Correct answer is D:SNMPv3.

34
Q

When a user makes a VoIP phone call and finishes speaking, the user experiences a delay in hearing a response. Which of the following should the network engineer check?
A.Jitter
B.Latency
C.Bandwidth
D.CRC errors

A

Answer: A

Explanation:
Correct answer is A:Jitter.