Test 8 Flashcards
- While troubleshooting a connectivity issue, a network technician successfully pinged the loopback address and external DNS server but was unable to ping the websites URL. Which of the following tools should the technician use to determine where the network issue is located?
A. Nmap B. netstat C. nslookup D. ipconfig E. tracert
C. nslookup
nslookup is a network administration command-line tool for querying the Domain Name System to obtain the mapping between domain name and IP address, or other DNS records
- A technician is helping to secure a wireless network at a home office and is looking to prevent unauthorized devices from connecting to the network. Which of the following would be BEST for the technician to do? (Choose two.)
A. Configure MAC filtering. B. Configure guest network isolation. C. Enable plug and play. D. Disable the SSID broadcast. E. Configure a captive portal. F. Disable unneeded ports.
A. Configure MAC filtering.
D. Disable the SSID broadcast.
- A network administrator has implemented file integrity monitoring on all relevant devices. This will provide the ability to detect whenever the files are:
A. reinstalled.
B. executed.
C. read.
D. written.
A. reinstalled.
- A network technician is attempting to resolve an issue for two users. The users unplugged and moved their laptops to a different cubicle to work together. The NIC LED is lit on both laptops, but the users are not able to access the network resources. Which of the following is MOST likely preventing access?
A. Port security
B. Auto-MDIX
C. BPDU guard
D. DHCP snooping
A. Port security
- A network engineer has been assigned a support ticket for a PC that will not connect to the network in a new area of the building. The engineer knows the PC should be assigned to the PC VLAN (VLAN 1101) and should have an IP in the 172.16.250.0/22 range. While talking with the hardware team, the engineer is told this is the first PC to be installed in this area. The engineer then logs into the edge switch the PC is connected to and looks at the configuration. Given the output below:
Which of the following BEST explains the reason why the PC cannot connect?
A. The VLAN interface is missing.
B. The VLAN is not allows across the trunk.
C. The PC is in the wrong VLAN.
D. The PC does not have a valid IP.
B. The VLAN is not allows across the trunk.
- Which of the following DNS record types can help limit spam?
A. SPF
B. SRV
C. A
D. MX
A. SPF
- A user reports a laptop wireless connection is working at the users desk but not in a recent building addition. A network administrator logs into the wireless controller searches for the users MAC address, and receives the following results:
Which of the following describes the reason for the issue?
A. Frequency mismatch
B. Distance limitation
C. Channel overlap
D. Wrong SSID
B. Distance limitation
- A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site?
A. Packet sniffer
B. Bandwidth tester
C. Port scanner
D. Protocol analyzer
C. Port scanner
- A network manager is reviewing recent changes after learning the network health metrics are no longer being protected. The manager discovers the ACL has been updated to the following:
Which of the following lines in the ACL points to the issue? A. Line 1 B. Line 2 C. Line 3 D. Line 4 E. Line 5
C. Line 3
SNMP uses both port 161 and port 162 for sending commands and messages. The “SNMP manager” at the head of your system sends commands down to a network device, or “SNMP agent,” using destination port 161.
- A network technician is troubleshooting a connection issue and determines the domain name resolution is not getting out past the firewall. Which of the following ports should the technician check to see if it is being blocked by the ACLs?
A. 23
B. 53
C. 110
D. 389
B. 53
- Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A. An increase in network securing using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network.
D. An improvement in network efficiency by increasing the useful packet payload.
B. A network expansion caused by an increase in the number of branch locations to the headquarters
A hub-and-spoke network, often called star network, has a central component that’s connected to multiple networks around it. The overall topology resembles a wheel, with a central hub connected to points along the edge of the wheel through multiple spokes.
- A network administrator needs to keep track of the locations of installed network equipment. Which of the following would be the BEST method to accomplish this task?
A. Tamper detection
B. Asset tags
C. Video surveillance
D. Motion detection
B. Asset tags
- Users at an office site notice the wireless network is unavailable for a short period after a brownout. Which of the following technologies is MOST cost effective to sustain network equipment during a brief power event?
A. UPS
B. Dual power supplies
C. Generator
D. Redundant circuits
A. UPS
- Given the following information:
Which of the following command-line tools would generate this output?
A. netstat
B. arp
C. dig
D. tracert
A. netstat
The network statistics ( netstat ) command is a networking tool used for troubleshooting and configuration, that can also serve as a monitoring tool for connections over the network. Both incoming and outgoing connections, routing tables, port listening, and usage statistics are common uses for this command.
- A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction?
A. Geofencing
B. WPA2-PSK
C. EAP-TLS
D. VLAN tagging
A. Geofencing