Test 8 Flashcards

1
Q
  1. While troubleshooting a connectivity issue, a network technician successfully pinged the loopback address and external DNS server but was unable to ping the websites URL. Which of the following tools should the technician use to determine where the network issue is located?
A. Nmap
B. netstat
C. nslookup
D. ipconfig
E. tracert
A

C. nslookup

nslookup is a network administration command-line tool for querying the Domain Name System to obtain the mapping between domain name and IP address, or other DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A technician is helping to secure a wireless network at a home office and is looking to prevent unauthorized devices from connecting to the network. Which of the following would be BEST for the technician to do? (Choose two.)
A. Configure MAC filtering.
B. Configure guest network isolation.
C. Enable plug and play.
D. Disable the SSID broadcast.
E. Configure a captive portal.
F. Disable unneeded ports.
A

A. Configure MAC filtering.

D. Disable the SSID broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A network administrator has implemented file integrity monitoring on all relevant devices. This will provide the ability to detect whenever the files are:

A. reinstalled.
B. executed.
C. read.
D. written.

A

A. reinstalled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A network technician is attempting to resolve an issue for two users. The users unplugged and moved their laptops to a different cubicle to work together. The NIC LED is lit on both laptops, but the users are not able to access the network resources. Which of the following is MOST likely preventing access?

A. Port security
B. Auto-MDIX
C. BPDU guard
D. DHCP snooping

A

A. Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A network engineer has been assigned a support ticket for a PC that will not connect to the network in a new area of the building. The engineer knows the PC should be assigned to the PC VLAN (VLAN 1101) and should have an IP in the 172.16.250.0/22 range. While talking with the hardware team, the engineer is told this is the first PC to be installed in this area. The engineer then logs into the edge switch the PC is connected to and looks at the configuration. Given the output below:

Which of the following BEST explains the reason why the PC cannot connect?

A. The VLAN interface is missing.
B. The VLAN is not allows across the trunk.
C. The PC is in the wrong VLAN.
D. The PC does not have a valid IP.

A

B. The VLAN is not allows across the trunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following DNS record types can help limit spam?

A. SPF
B. SRV
C. A
D. MX

A

A. SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A user reports a laptop wireless connection is working at the users desk but not in a recent building addition. A network administrator logs into the wireless controller searches for the users MAC address, and receives the following results:

Which of the following describes the reason for the issue?

A. Frequency mismatch
B. Distance limitation
C. Channel overlap
D. Wrong SSID

A

B. Distance limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site?

A. Packet sniffer
B. Bandwidth tester
C. Port scanner
D. Protocol analyzer

A

C. Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A network manager is reviewing recent changes after learning the network health metrics are no longer being protected. The manager discovers the ACL has been updated to the following:
Which of the following lines in the ACL points to the issue?
A. Line 1
B. Line 2
C. Line 3
D. Line 4
E. Line 5
A

C. Line 3

SNMP uses both port 161 and port 162 for sending commands and messages. The “SNMP manager” at the head of your system sends commands down to a network device, or “SNMP agent,” using destination port 161.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A network technician is troubleshooting a connection issue and determines the domain name resolution is not getting out past the firewall. Which of the following ports should the technician check to see if it is being blocked by the ACLs?

A. 23
B. 53
C. 110
D. 389

A

B. 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?

A. An increase in network securing using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network.
D. An improvement in network efficiency by increasing the useful packet payload.

A

B. A network expansion caused by an increase in the number of branch locations to the headquarters

A hub-and-spoke network, often called star network, has a central component that’s connected to multiple networks around it. The overall topology resembles a wheel, with a central hub connected to points along the edge of the wheel through multiple spokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A network administrator needs to keep track of the locations of installed network equipment. Which of the following would be the BEST method to accomplish this task?

A. Tamper detection
B. Asset tags
C. Video surveillance
D. Motion detection

A

B. Asset tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Users at an office site notice the wireless network is unavailable for a short period after a brownout. Which of the following technologies is MOST cost effective to sustain network equipment during a brief power event?

A. UPS
B. Dual power supplies
C. Generator
D. Redundant circuits

A

A. UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Given the following information:

Which of the following command-line tools would generate this output?

A. netstat
B. arp
C. dig
D. tracert

A

A. netstat

The network statistics ( netstat ) command is a networking tool used for troubleshooting and configuration, that can also serve as a monitoring tool for connections over the network. Both incoming and outgoing connections, routing tables, port listening, and usage statistics are common uses for this command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction?

A. Geofencing
B. WPA2-PSK
C. EAP-TLS
D. VLAN tagging

A

A. Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians.
    The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site?

A. Enable an IPSec tunnel.
B. Enable RDP access to the firewall.
C. Enable port 80 access.
D. Enable Telnet access to the firewall.

A

B. Enable RDP access to the firewall.

17
Q
  1. Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

A. BYOD
B. NDA
C. SLA
D. AUP

A

A. BYOD

18
Q
  1. A technician needs to manage a Linux-based system from the GUI remotely. Which of the following technologies should the technician deploy?

A. RDP
B. SSH
C. VNC
D. Telnet

A

C. VNC

19
Q
  1. A network technician has established an internal HTTP connection from a browser to the web server to access an organizations intranet services. In which of the following layers of the OSI model is the HTTP protocol found?

A. Session
B. Data link
C. Network
D. Application

A

D. Application

20
Q
  1. A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?

A. nslookup
B. netstat -a
C. ipconfig /a
D. arp -a

A

B. netstat -a

21
Q
  1. An administrator recently implemented new SOHO routers for a companys teleworking employees. Before deploying the routers, the administrator changed the default credentials and disabled unnecessary services. Within a few days of deployment, hackers gained access to the routers. Which of the following is the
    MOST important thing the administrator forgot to do?

A. Disable unused physical router ports.
B. Generate new encryption keys.
C. Upgrade the router firmware.
D. Create a database of file hashes on the router.

A

A. Disable unused physical router ports.

22
Q
  1. Which of the following technologies can be implemented on network devices to increase throughput in network storage systems?

A. Trunking
B. Frame Relay
C. Jumbo frames
D. InfiniBand

A

C. Jumbo frames

23
Q
  1. A network administrator migrated the data for the corporate email service from one provider to another. All DNS records were successfully changed and verified. However, many hours later, users are still receiving new emails on the old providers server. Which of the following should the administrator perform NEXT to troubleshoot the issue?

A. Add a secondary MX server to the DNS records.
B. Remove old SPF records from the DNS host.
C. Create a DMARC record that includes the old server.
D. Check the TTL value on the MX records.

A

A. Add a secondary MX server to the DNS records.

24
Q
  1. A network administrator needs to extend an organizations network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

A. 10BASE-T
B. 100BASE-T
C. 1000BASE-LX
D. 1000BASE-SX

A

C. 1000BASE-LX

1000BASE-LX…this version of Gigabit Ethernet is intended for use with long-wavelength transmissions (1270–1355 nm) over long cable runs of fiber optic cabling. 1000BASE-LX can run over both single mode fiber and multimode fiber with a distance of up to 5 km

25
Q
  1. A technician has started a major network project to upgrade to a higher throughput standard. The technician will need to install new patch panels and breakout boxes to support this infrastructure. Which of the following layers of the OSI model is the technician addressing at this stage of the upgrade?

A. Physical
B. Transport
C. Network
D. Data link

A

A. Physical

26
Q
  1. Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?

A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs

A

A. NIC teaming

27
Q
  1. A network technician needs to install network devices in a new building. The building will be a part of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building?

A. Firewall
B. Switch
C. Modem
D. IDS

A

B. Switch