Udemy Tests Flashcards

1
Q

A workstation is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can communicate with the VLAN gateway and access websites on the Internet. What might cause this issue?

A

The port is configured as a trunk port (802.1q) instead of an access port. Therefore the workstation is unable to contact the DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network traffic is not re routed automatically if an interruption occurs.

A

Static routing. New routes must be entered manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?

A

UTM (Unified Threat Management) Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?

A

Make the change, document the requester, and document all network changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps?

A

MIMO (Multiple-Input / Multiple-Output) and MU-MIMO (Multi User). MIMO uses multiple antennas for transmission and reception, resulting in a higher speed than 802.11a and 802.11g networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This happens to data as it travels from Layer 1 to Layer 7

A

De-encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Split DNS?

A

Split DNS is an implementation in which two DNS servers are used for external and internal networks. This provides a security and privacy mechanism in which internal users use the internal DNS and untrusted, external users use the external DNS. There are two sets of DNS information, and the results are given based on the source address of the requester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?

A

802.11g utilizes the 2.4GHz frequency and can reach up to 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of wireless network utilizes the 5GHz frequency band and reaches speeds of up to 54 Mbps?

A

802.11a utilizes the 5GHz band and cbs reach up to 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of wireless network utilizes the 2.4GHz frequency and reaches speeds of up to 11 Mbps?

A

802.11b utilizes the 2.4GHz frequency band and can reach speeds up to 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of wireless network utilizes both 5 GHz and 2.4 GHz frequency band and reaches speeds of up to 600 Mbps (5GHz) or 108 Mbps (2.4GHz). This standard also introduced MIMO.

A

802.11n can use both 5 GHz and 2.4 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps?

A

802.11ac (Wi-Fi 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of wireless network utilizes both the 5GHz and 2.4 GHz frequency band and reaches speeds of up to 9.6 Gbps?

A

802.11ax (Wi-Fi 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. What option should you enable to ensure the data is transferred confidentially?

A

authPriv - Ensures all data is sent with authentication and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When connecting two nearby buildings, what type of antenna should you use?

A

Parabolic Antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The time delay between when a packet was sent and received

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is RSSI

A

Received Signal Strength Indacator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What command is used to create, view, or modify manual entries in the network routing tables of a computer or server.

A

Route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. What command should he enter on his workstation to resolve this connectivity issue?

A

nbtstat -r

This command purges and reloads the cached name table from the LMHOST file on their Windows workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Yagi Antenna used for

A

Directional transmission over long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What might cause signal attenuation?

A

Obstructions blocking the line-of-sight of antennas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the troubleshooting steps

A
  1. Identify the problem
  2. Establish a theory
  3. Test the theory
  4. Establish a plan of action
  5. Implement the solution
  6. Verify full system functionality
  7. Document findings and actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What should you use to protect IoT devices

A
  1. WPA2 security with a strong password
  2. Create a separate VLAN for IoT devices to segregate them from your normal network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following must be added to a VLAN’s gateway to improve the security of the VLAN?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What ports does SMB use and what is it used for?

A
  • TCP 445 and TCP 139
  • Network file sharing protocol that runs on top of the NetBIOS architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your company wants to create highly available datacenters. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?

A

BGP (Border Gateway Protocol)
- Distance Vector
- If a WAN link goes down, BGP will route the traffic through another WAN link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the size of a Jumbo Frame and when should they be used?

A
  • Larger than 1500
  • The should only be used when you have a dedicated network or VLAN, and you can configure jumbo frames on all of the equipment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is AAA

A
  • AAA stands for Authentication, Authorization, and Accounting.
  • RADIUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What might cause this issue.

A
  • Shared Secret Key mismatch
  • RADIUS uses a shared key for encrypting communication. If the keys don’t match, login issues will happen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What port does SQL Server use?

A

TCP 1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What port does MySQL use?

A

TCP port 3306

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What port does SQL Net use?

A

TCP Port 1521

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You just started work as a network technician at Dion Training. You have been asked to check if DHCP snooping has been enabled on one of the network devices. What command should you enter within the command line interface?

A

show config
- show config shows the devices current configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. What was likely misconfigured and is now causing a problem?

A

The Firewall
- If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to “deny by default”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the lowest layer (bottom layer) of a bare-metal virtualization environment?

A

Physical Hardware
- A “Bare Metal” approach does not have a host OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

A

eDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Port Security / Sticky MAC

A

Port security is a security solution where the switch remembers the MAC address of a device connected to it and prevents other devices from using that port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Dion Training is trying to connect two geographically dispersed offices using a VPN connection. You have been asked to configure their networks to allow VPN traffic into the network. What device should you configure FIRST?

A

The Firewall
- The firewall is installed at the network boundary, therefore it should be configured first to allow the VPN connection and functionally create a single intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?

A
  1. Deploy the patch in a lab environment to quickly conduct testing
  2. Get approval for an emergency change
  3. Immediately implement the patch in the production environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What ports does SIP use

A

Port 5060/5061

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A disgruntled employee executes an on-path attack on the company’s network. Layer 2 traffic destined for the gateway is now being redirected to the employee’s computer. What type of attack is this an example of?

A

ARP Spoofing / Poisoning
- ARP is used to identify IP to MAC address bindings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the purpose of DNS?

A

DNS servers translate FQDN (Fully Qualified Domain Name) to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the protocol where ports open for network access only after a user has been authenticated by the organization.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What ports does SNMP use

A

Port 161/162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

IEEE Spec. that defines VLANS

A

802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

FQDN vs Hostname

A
  • Your hostname is the name of your computer
  • Your FQDN is your hostname + your domain
    ex: Mymail.somecollege.edu
  • DNS servers translate FQDNs to IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

2.4 GHz Channels selection for the least amount of interference between 3 access points (Non overlapping frequencies)

A

1 , 6 , 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the components of a Three Tier Network Architecture

A
  1. Core
    • Network Backbone
  2. Distribution
    • Provides boundary definition by implementing access lists / filters to define the policies of the network
  3. Access
    • This is where all endpoint devices will connect to each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In band VS out of band management

A

In Band refers to managing the network through itself

Out of Band is a method of remotely controlling and managing critical IT assets and network equipment using a secure connection through a secondary interface that is physically separate from the primary network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A user’s smartphone is displaying text in other languages in their web browser when accessing the company’s main website. Which of the following is the MOST likely cause of the issue?

A

An On Path Attack (Man in the Middle)
- The server sees that the IP address is coming from Russia, so it will utilize Russian language in the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?

A

Layer 2 Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is 802.3af?

A

PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is 802.3at?

A

PoE+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

It has been determined by network operations that there is a severe bottleneck on its mesh topology network. The field technician has chosen to use log management and found that one router makes routing decisions slower than the others on the network. Which of the following types of issues would you classify this as?

A

Network device CPU issues

55
Q

Stateless VS Stateful Firewall

A

A stateless firewall doesn’t store information about the current state of a connection.

A stateful firewall remembers what port was opened in the outbound request and keeps it open for the incoming reply.

56
Q

You opened your web browser and attempted to visit DionTraining.com, but you appear to have been redirected to a malicious website instead. What type of attack is being conducted?

A

DNS poisoning

57
Q

Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions?

A

Bandwidth

58
Q

Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?`

A

The technician is using a straight through cable

59
Q

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

A

TKIP

60
Q

What is an IPv6 Anycast address

A

An anycast address can be assigned to multiple devices.

A packet sent to an anycast address goes to the nearest interface that has that address

61
Q

Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company’s security analyst, verifying that the workstation’s anti-malware solution is up-to-date and the network’s firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation?

A

Zero Day Attack

62
Q

A network administrator wants to separate web servers on the network logically. Which of the following network device will need to be configured?

A

Switch

63
Q

Students at Dion Training have been reporting extreme performance degradation across the network every Friday morning. Which of the following should the network technician review FIRST to identify the root cause of the network performance issues?

A

Utilization
- Check the utilization to compare with the baseline

64
Q

You are working for a brand new startup company who recently moved into an old office building because the CEO liked the “charm” of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?

A

Is there adequate airflow / cooling

65
Q

What causes signal loss on a fiber optic network?

A

Dirty connectors

66
Q

What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?

A

802.1x
- Port Based Network Access Control
- The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.

67
Q

What happens if VLAN Tagging (802.3q) is not enabled

A

All of the VLAN traffic will be sent to the native or default VLAN, VLAN 1

68
Q

What encryption does WPA use?

A

TKIP

69
Q

What is Convergence?

A

Convergence occurs when all routers learn the route to all connected networks by sharing their routing information.

Ex: All routers “agree” on what the network topology looks like

70
Q

High VS Low gain antennas

A

High gain antennas have increased signal strength and can transmit farther

71
Q

What security feature should be enabled to configure a quality of service filter to manage the traffic flow of a Cisco router or switch and protect it against a denial-of-service attack?

A

Control Plane Policing

72
Q

A company is setting up a brand new server room and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. What should be installed to meet the requirements?

A

Raised floors
- Cable can be put under the floor

73
Q

What is an AS

A

Autonomous System

  • An autonomous system is a collection of networks in the same administrative domain
74
Q

A network architect is designing a highly redundant network with a distance vector routing protocol to prevent routing loops. The architect wants to configure the routers to advertise failed routes with the addition of an infinite metric. What should the architect configure to achieve this?

A

Route Poisoning

  • Used to prevent a router from sending packets through a route that has become invalid within a network.
  • Achieved by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable.
75
Q

Dion Training believes there may be a rogue device connected to their network. They have asked you to identify every host, server, and router currently connected to the network. What tool would allow you to identify which devices are currently connected to the network?

A

IP Scanner

76
Q

What is the most efficient CIDR subnet mask for a point to point link?

A

/30 or /31

  • since /30 provides 4 addresses, two can be used for the routers and two can be used for the subnet ID and Broadcast address
77
Q

When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge. This resulted in the copper conductors on several of the wire strands being exposed. If these exposed conductors come into contact with each other, they can form an electrical connection. What would result in this scenario?

A

A Short

78
Q

Which of the following cloud services should an organization choose in order to deliver virtual desktops to end-users over the Internet on a per-user license basis?

A

DaaS (Desktop as a Service)

79
Q

What port number does LDAPS utilize?

A

636

80
Q

A network technician must replace a faulty network interface card on Dion Training’s web server. The server currently uses a multimode fiber optic cable to connect to a switchport on a fiber-optic network switch. What type of NIC should the technician install on the server?

A

10G-Base-SR

  • “S is not single”, if the name has an S in it, that means it uses multi mode fiber
81
Q

What is an Optical Link Budget

A

An Optical Link Budget is a calculation that considers all the anticipated losses along the length of a fiber optic connection.

82
Q

A company is having a new T1 line installed. Which of the following does this connection MOST likely terminate?

A

Demarcation Point

83
Q

You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and allows access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client preventing you from connecting to the router?

A

Generate a new SSH key

84
Q

Each port in a router creates one of these

A

Broadcast domain

85
Q

Where does untagged traffic go to if it traverses a trunk port?

A

The Native VLAN

86
Q

What is 802.1q

A

VLAN Tagging + Trunks

87
Q

What is EAP

A

Extensible Authentication Protocol
- Integrates with 802.1x
- Prevents access to the network until the authentication succeeds

88
Q

Distance Vector Protocols

A
  • RIP (Routing Information Protocol)
  • EIGRP (Enhanced Interior Gateway Protocol)
  • The most important criteria is number of hops, NOT speed
89
Q

Link-State Protocols

A
  • OSPF (Open Shortest Path First)
  • The most important criteria is if the router is up or down.
  • It might take into account the speed of the link too
90
Q

Hybrid Routing Protocol

A
  • BGP (Border Gateway Protocol)
  • determines route based on paths, network policies, or configured rule sets
91
Q

Your network relies on the use of ATM cells. At which layer of the OSI model do TAM cells operate?

A

Layer 2 Data Link

92
Q

What is DAI

A

Dynamic ARP Inspection
- Allows administrators to intercept, log, and discard ARP packets with incorrect MAC to IP bindings
- Builds a map of all devices and their IP address

93
Q

What tool would you use to look at the traffic patterns of a network?

A

NetFlow Analyzer

94
Q

What is RAS

A
  • Remote Access Server
95
Q

What is PPP

A
  • Point to Point Protocol
  • A layer 2 communication protocol between two routers without any host or any other networking in between
96
Q

What is 802.3ad

A
  • Link Aggregation Control Protocol
97
Q

BSSID vs ESSID

A
  • Basic Service Set Identifier
    • Uses 1 AP per network
  • Extended Service Set Identifier
    • Can use multiple APs to broadcast a single network
98
Q

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?

A

Rollback the servers NIC Drivers

99
Q

What policy or plan would dictate how an organization would respond to a fire that left their office building unusable for the next 3 months?

A

Disaster Recovery Plan

100
Q

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. What would have provided the greatest protection against this data breach?

A

Encryption of the laptop

101
Q

The Chief Information Officer (CIO) wants to improve the security of the company’s data. What management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network?

A

Implement policies that dictate how users should handle date

102
Q

DLP

A

Data loss prevention
Systems that ensures users cannot send sensitive corporate data outside of the network

103
Q

WPS

A

Wi-Fi Protected Setup
Uses a PIN as a password for network access

104
Q

Stella, a web developer, has asked for your assistance in troubleshooting her latest website. When she attempts to connect to the web server as a user, the web browser issues a standard HTTP request to the server but continually receives a timeout response in return. You decide to capture the entire TCP handshake between her workstation and the webserver to better troubleshoot this issue. What tool would BEST allow you to capture and review the HTTP request and response between the client and the webserver?

A

Protocol Analyzer / Packet Capture
Ex: WireShark

105
Q

What network tool allows you to see what ports are opened on a target system?

A

Port Scanner

106
Q

What network issue can be prevented by configuring the split-horizon options on your network devices?

A

Routing Loops

Split horizon router advertisements is a method of preventing routing loops in distance-vector routing protocols

107
Q

As part of unified communications services, QoS must be implemented to provide support for DSCP and CoS. What OSI layer does QoS operate within?

A

Layer 2 Data-Link

108
Q

You are troubleshooting a 3 foot long fiber patch cable that you suspect is causing intermittent connectivity between two switches. What tool should you use to measure the signal as it transmits over the fiber optic cable?

A

Fiber Light Meter

109
Q

Your company wants to develop a voice solution to provide 23 simultaneous connections using VoIP. What technology would BEST provide this capability?

A

T1 Line

Provides 24 voice channels at the same time compared to POTS, which only has 1

110
Q

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. What should the technician check FIRST during troubleshooting?

A

WAP Placement

111
Q

What state is the switchport with the LEAST desirable path placed by the spanning tree protocol when a switch has multiple paths to reach the root bridge?

A

BLOCKING

112
Q

802.11b + 802.11g Channels (2.4 GHz)

A

1,6,11
Provides three non overlapping channels

113
Q

802.11n + 802.11ac Channels (5GHz)

A

1-24
Provides 24 non overlapping channels

114
Q

What is asymmetric routing?

A

Asymmetric routing is when network packets leave via one path and return via a different path

115
Q

Dion Training’s network technicians are about to upgrade a Cisco 3900-series router, but they first want to create a copy of the router’s configuration and IOS files to serve as a backup. What tool should the technicians utilize?

A

An TFTP Server

TFTP servers are commonly used to transfer images and config files to network appliances

116
Q

What is tcpdump

A

tcpdump is a command line based packet capture utility

117
Q

What policies or plans would dictate which types of websites should be added to the proxy server’s content filter within an organization?

A

AUP

118
Q

A network technician just finished configuring a new interface on a router, but the client workstations do not receive the addressing information from the new interface. What should be added or changed to allow the workstations to connect to the new interface?

A

Install an IP helper on the DHCP server

An IP Helper allows a DHCP server to lease addresses to endpoints even if they aren’t on the same broadcast domain

119
Q

An attacker has configured their machine to report itself as a switch when connected to a wired network in an attempt to exploit your enterprise network. Which of the following types of attacks is being conducted?

A

VLAN Hopping

120
Q

Routing prefixes are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR). What are these known as?

A

Autonomous System Number (ASN)

ASNs are used with BGP to control routing decisions

121
Q

You have been asked to troubleshoot Dion Training’s T1 connection that is experiencing connectivity issues. You have already verified that the network’s router is properly configured, the cable is connected properly between the router and the T1’s CSU/DSU, but the T1 remains down. You want to test the interface on the CSU/DSU to ensure it is functioning properly. Which of the following tools should you use to test this interface?

A

Loopback Adapter

122
Q

A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. What should the company do to reduce this type of action from causing network problems in the future?

A

Segment the network and deploy the patch in a test environment

123
Q

What CIDR notation would you use if you only need two IP addresses for clients

A

/30

124
Q

What is Port Mirroring used for

A

Port mirroring is a method of monitoring traffic. It sends a copy of all network traffic on one port (or an entire VLAN) to another port, where it can be analyzed

125
Q

IPv4 Loopback address

A

127.0.0.1

126
Q

Damaris is troubleshooting a WINS connectivity issue on a Windows server. She wants to find out the name of the server she is working on. What command should she utilize to display the NetBIOS name of the server?

A

hostname

127
Q

During a recent penetration test, it was discovered that your company’s wireless network could be reached from the parking lot. The Chief Security Officer has submitted a change request to your network engineering team to solve this issue because he wants to ensure that the wireless network is only accessible from within the building. Based on these requirements, what setting should be changed to ensure the wireless signal doesn’t extend beyond your building’s interior while maintaining a high level of availability to your users?

A

The APs power level for the radio transmitter

128
Q

You have been asked to create a network where visitors can access the Internet without disrupting the office’s own intranet. What type of network should you create?

A

Guest Network

129
Q

A 48-port switch on the Dion Training network just rebooted and all the clients are attempting to obtain a new DHCP address. What issue may begin to occur?

A

Broadcast Storm

The DHCP discover, offer, request, and acknowledge process occurs using broadcast messages

130
Q

What characteristic does channel bonding improve?

A

Connection Speed

Channel bonding is when two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices

131
Q

WPA2-TKIP vs WPA2-CCMP encryption, which one’s better?

A

WPA2-CCMP

132
Q

A network technician receives the following alert from a network device: “High utilization threshold exceeded on gi1/0/24: current value 88%” What is being monitored to trigger the alarm?

A

Port utilization

133
Q

After upgrading a fiber link from 1 Gbps to 10 Gbps. A network technician ran a test of the link and the link is not connecting properly. The two routers are 450 meters apart and are connected using a MMF fiber with 10GBaseLR SFP+ transceivers. The fiber runs through the electrical and boiler rooms of each building. What is MOST likely causing the connectivity issues?

A

The wrong transceivers are being used

10GBaseLR is used with single mode fiber, not multimode fiber (MMF)

134
Q
A