• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Which of the following WAN technologies would have the HIGHEST latency?


A. Satellite


​B. Cable​


C. DSL


D. Frame-relay

A. Satellite

A tax accounting firm has decided to allow some employees to work from home during the tax season. Which of the following should be the MOST important criteria when planning the home office networks?


A. Amount of memory on each workstation​


B. A secure VPN connection to the main office​


C. The distance between each home office and the main office


D. The Internet Service Provider bandwidth capability

B. A secure VPN connection to the main office

Which of the following network appliances allows an IT department to restrict which websites are allowed to be accessed from the company network?


A. Proxy server​


B. Load balancer​


C. VPN concentrator


D. Virtual PBX

A. Proxy server

A user is unable to access the network when the network printer is on. This is MOST likely due to which of the following?


A. Duplicate IP address​


B. Compatibility mismatch​


C. Duplex mismatch


D. Equipment limitations

A. Duplicate IP address

Which of the following describes a process that can translate internal network IP addresses to external ones?


A. Change control


​B. NAT​


C. PAT


D. Remote terminal emulation

B. NAT

Which of the following threats would MOST likely be addressed in a company-wide security training class?


A. VLAN hopping​


B. Evil twin​


C. Social engineering


D. Man-in-the-middle

C. Social engineering

A user is unable to access any Internet resources. A helpdesk technician determines there is no Internet connectivity issue. The technician compares the IP address information for both the user’s computer and the technician’s computer.


User’s computer


IP address: 192.168.100.45


Subnet mask: 255.255.255.0


Gateway: 192.168.100.1


DNS: 192.168.10.1




Technician’s computer


IP address: 192.168.100.76


Subnet mask: 255.255.255.0


Gateway: 192.168.100.1


DNS: 192.168.100.1




Which of the following is the reason the user is unable to reach any websites?


A. Subnet mask​


B. Gateway


​C. Name resolution


D. IP address

C. Name resolution

Which of the following topologies uses various connections to increase redundancy?


A. Ring​


B. Star


​C. Mesh


D. Bus

C. Mesh

A technician is configuring mobile devices for new employees. Which of the following documents should be updated to show that the new employees are receiving these mobile devices?


A. Network diagram


​B. Asset management


​C. Organizational chart


D. Standard operating procedure


E. Change management

B. Asset management

Which of the following tools would a technician use to secure a CAT5e cable to a 110 block?


A. Wire strippers​


B. Snips​


C. Crimpers


D. Punch down

D. Punch down

A home user reports that a speed test website shows the following information:


Download speed: 33.3Mbps


Upload speed: 10.2Mbps


Which of the following is the correct interpretation of these results?​


A. The home PC downloaded 33.3 MB of data to the website and uploaded 10.2 MB of data from the website.​


B. The website upload bandwidth is saturated, and it does not match the download speed.​


C. The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.


D. The website is downloading data to its server at 33.3 Mbps and uploading data from its server at 10.2 Mbps.

​C. The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.

A network administrator recently installed a web proxy server at a customer’s site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue?


A. Update the DNS server with the proxy server information.


​B. Implement a split horizon DNS server.​


C. Reboot the web proxy and then reboot the DNS server.


D. Put the proxy server on the other side of the demarc.

A. Update the DNS server with the proxy server information.

A network technician has set up a firewall and entered only three rules allowing traffic on ports 21,110, and 25 to secure the network. Users are reporting they cannot access web pages using the URLs. Which of the following can the technician do to correct the situation?


A. Add a rule to the end allowing port 80 and 53.​B. Add a rule to the end allowing port 143 and 22.


C. Add a rule to the end allowing port 137 and 66.


D. Add a rule to the end allowing port 445 and 173.

A. Add a rule to the end allowing port 80 and 53.

A PC is having trouble connecting to a remote resource. Which of the following will identify the routers a packet travels through and provide real-time feedback regarding latency?


A. tracert


B. NETBIOS​


C. ipconfig


D. nslookup


E. ping

A. tracert

When introducing new devices to the network, the organization’s security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?


A. SLA​


B. Baseline​


C. Forensic log


D. Vulnerability assessment

B. Baseline

Which of the following would BEST mitigate the risk of social engineering?


A. Man traps


​B. Business continuity planning


​C. End-user training


D. Penetration testing

​C. End-user training

A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?


A. Firmware updates


​B. Changing to IPv6


​C. Cloning


D. Vulnerability patching

A. Firmware updates

A user in an apartment building on a wireless network is no longer able to print to the network printer. The user has been able to print to the printer in the past and nothing on the network has changed. A technician notices that the user has a different IP address scheme than what was originally setup and is able to browse the Internet using that IP address scheme. Which of the following is MOST likely the issue?


A. Connected to wrong WAP


​B. Bandwidth saturation​


C. Overlapping channels


D. Wrong antenna type

A. Connected to wrong WAP

Which of the following are appropriate environmental controls for a datacenter? (Select TWO).


A. Video​


B. Voltage​


C. Humidity


D. Locks


E. UPS


F. Temperature

C. Humidity


F. Temperature

A technician has fixed an issue with an employee’s computer and verified that the system is fully operational. Which of the following should the technician do NEXT according to the troubleshooting methodology?


A. Document the findings​


B. Contact the user


​C. Duplicate the problem


D. Escalate to a senior technician

​A. Document the findings

A technician is configuring a VPN for a client. The client wants to be able to RDP into the company's servers from a remote location. Which of the following default ports should the technician open?


A. 143​


B. 445​


C. 3128


D. 3389


E. 8080

D. 3389

A system administrator is connecting workstations to a switch. During testing and verification, the system administrator notices latency with processing data on the workstations. The system administrator then notices that the workstations are connected to 100Mb ports on the switch and the workstations have 1Gb NICs. Which of the following issues is the system administrator having with the switch and the workstations?


A. Speed and duplex mismatch


​B. Bad switch ports


​C. Bad NICs


D. Misconfigured IP

A. Speed and duplex mismatch

A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN. Which of the following should be placed on the router interface to accomplish this goal?


A. Static routes for all port 80 traffic​


B. DHCP reservations for all /24 subnets​


C. ACL for ports 20 and 21


D. MAC filtering using wildcards

​C. ACL for ports 20 and 21

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?


A. Unicast address


​B. IPV6​


C. DHCP6


D. APIPA

​D. APIPA