Network Plus n10-008 Flashcards
(151 cards)
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use
2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
B. 802.11ax
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control Message Protocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol
B. Reverse Address Resolution Protocol
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
A. NetFlow analyzer
B. Bandwidth analyzer
C. Protocol analyzer
D. Spectrum analyzer
D. Spectrum analyzer
Hide Solution
A spectrum analyzer is a tool that focuses on the physical layer, which will vary based on the type of analyzer. Although vendors make these analyzers for both audio and optical signals, in most cases spectrum analyzers are used to analyze wireless or radio frequency signals. Spectrum analyzers are primarily used to identify and measure the strength of radio signals that are present in the area. They can visually display these signals by frequency on the device. These devices are used to locate sources of interference that may impact the operation of a wireless network.
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
A. Verify the session time-out configuration on the captive portal settings
B. Check for encryption protocol mismatch on the client’s wireless settings
C. Confirm that a valid passphrase is being used during the web authentication
D. Investigate for a client’s disassociation caused by an evil twin AP
A. Verify the session time-out configuration on the captive portal settings
* need to study this
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A. Evil twin
B. Tailgating
C. Piggybacking
D. Shoulder surfing
B. Tailgating
SIMULATION -
You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:
✑ The SSIDs need to be configured as CorpNet with a key of S3cr3t!
✑ The wireless signals should not interfere with each other
✑ The subnet the Access Points and switch are on should only support 30 devices maximum
✑ The Access Points should be configured to only support TKIP clients at a maximum speed
INSTRUCTONS -
Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator
MOST likely start to troubleshoot?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A. Layer 1
Research
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
A. CPU usage
B. Memory
C. Temperature
D. Bandwidth
E. Latency
F. Jitter
A. CPU usage
B. Memory
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new
DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. Install load balancers
B. Install more switches
C. Decrease the number of VLANs
D. Reduce the lease time
D. Reduce the lease time
Reducing the lease time is the best answer here. While there isn’t much additional info regarding how long it currently is, if some jabroni configured a lease time of two weeks, there will be a bunch of lingering leases that aren’t in use and could be utilized by new devices.
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
A. Spanning Tree Protocol
B. Neighbor Discovery Protocol
C. Link Aggregation Control Protocol
D. Address Resolution Protocol
B. Neighbor Discovery Protocol
Neighbor Discovery Protocol is similar to ARP but retrieves the IPV6 address. ARP retrieves IPv4.
Which of the following DNS records works as an alias to another record?
A. AAAA
B. CNAME
C. MX
D. SOA
B. CNAME
- .AAAA record is used to find the IP address of a computer connected to the internet from a name.
- .CNAME record is a type of DNS record that maps an alias name to a true or canonical domain name.
- .MX record specifies the mail server responsible for accepting email messages on behalf of a domain name.
- .SOA record is a type of resource record in the DNS containing administrative information about the zone.
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?
A. Correct the DNS server entries in the DHCP scope
B. Correct the external firewall gateway address
C. Correct the NTP server settings on the clients
D. Correct a TFTP Issue on the company’s server
A. Correct the DNS server entries in the DHCP scope
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:
✑ Device
✑ LC/LC patch cable
✑ Patch panel
✑ Cross-connect fiber cable
✑ Patch panel
✑ LC/LC patch cable
✑ Switch
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?
A. TX/RX is reversed
B. An incorrect cable was used
C. The device failed during installation
D. Attenuation is occurring
A. TX/RX is reversed
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag
C. MAC table
The MAC address table is a way to map each port to a MAC address. The technician can use the MAC table to find which MAC address is connected to which port.
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs
A. NIC teaming
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?
A. Load balancing
B. Geofencing
C. Public cloud
D. Content delivery network
E. Infrastructure as a service
D. Content delivery network
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?
A. Check the system’s IP address
B. Do a ping test against the servers
C. Reseat the cables into the back of the PC
D. Ask what changes were made
D. Ask what changes were made
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
A. CSMA/CD
B. LACP
C. PoE+
D. MDIX
MDIX (Media Dependent Interface Crossover) is used to connect ethernet ports
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner
A. IP scanner
IP scanner is to find devices connected to the network
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A. 2.4GHz
B. 5GHz
C. 6GHz
D. 900MHz
B. 5GHz
5ghz offers more channels, is used less and is faster over a small area. The question asks for “a high density network”.
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
C. Port security
Which of the following is used to track and document various types of known vulnerabilities?
A. CVE
B. Penetration testing
C. Zero-day
D. SIEM
E. Least privilege
A. CVE
CVE is the acronym for Common Vulnerabilities and Exposures
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
B. Two-factor authentication
C. Complex passwords
A network engineer performs the following tasks to increase server bandwidth:
✑ Connects two network cables from the server to a switch stack
✑ Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
B. NIC teaming
NIC teaming allows users to group two or more physical NICs into a single logical network device called a bond. Once a logical NIC is configured, the virtual machine is not aware of the underlying physical NICs.



