• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

A network technician has created a network consisting of an external internet connection, a DMZ,


an internal private network, and an administrative network. All routers and switches should be


configured to accept SSH connections from which of the following network segments?

The admin private network allowing only admin access

A network technician needs to monitor the network to find a user that is browsing inappropriate


websites. Which of the following would the technician use to view the website and find the user


browsing it?

A.



An SNMP GET



B.



A top listener tool



C.



An intrusion detection system



D.



A packet sniffer

A packet sniffer

A network administrator receives a call asking for assistance with connecting to the network. The


user asks for the IP address, subnet class, and VLAN required to access the network. This


describes which of the following attacks?

A.

Social engineering

B.

Spoofing

C.

Zero-day attack

D.

VLAN hopping

Social engineering

Which of the following cloud infrastructure designs includes on premise servers utilizing a


centralized syslog server that is hosted at a third party organization for review?

A.

Hybrid

B.

Public

C.

Community

D.

Private



Hybrid

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which


of the following technologies would be able to detect and block this traffic?




A

Intrusion detection system



B.



Application aware firewall



C.



Stateful packet inspection



D.



Stateless packet inspection



Stateful packet inspection

The network administrator is configuring a switch port for a file server with a dual NIC. The file


server needs to be configured for redundancy and both ports on the NIC need to be combined for


maximum throughput. Which of the following features on the switch should the network


administrator use?

A.

BPDU

B.

LACP

C.

Spanning tree

D.

Load balancing


LACP


Link Aggregation Control Protocol

A network technician is using telnet to connect to a router on a network that has been


compromised. A new user and password has been added to the router with full rights. The


technician is concerned that the regularly used administrator account has been compromised.


After changing the password on all networking devices, which of the following should the


technician perform to prevent the password for the administrator account from being sniffed on the


network?

A.

Use SNMPv1 for all configurations involving the router

B.

Ensure the password is 10 characters, containing letter and numbers

C.

Copy all configurations to routers using TFTP for secuirty

D.

Only allow administrators to access routers using port 22


Only allow administrators to access routers using port 22

A network technician has configured a point-to-point interface on a router, however, once the fiber


optic cables have been run, the interface will not come up. The technician has cleaned the fiber


connectors and used an optical power meter to confirm that light is passing in both directions


without excessive loss. Which of the following is the MOST likely cause?





A.



Distance limitation



B.



Wavelength mismatch

C.



cross-talk



D.



EMI



E.



Macro bend







Wavelength mismatch

A network administrator wants to deploy a wireless network in a location that has too much RF


interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless


transmissions? (Select TWO)

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n


802.11a



802.11ac

Upon arrival at work, an administrator is informed that network users cannot access the file server.


The administrator logs onto the server and sees the updates were automatically installed and the


network connection shows limited and no availability. Which of the following needs to be rolled


back?

A.

The browser on the server

B.

The server's NIC drivers

C.

The server's IP address

D.

The antivirus updates


The server's NIC drivers

A network engineer is conducting an assessment for a customer that wants to implement an


802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is


important to reference which of the following?

A.

Network diagram

B.

Site survey

C.

Network topology

D.

PoE requirements


Site survey

Which of the following default ports is associated with protocols that are connectionless?

A.

80

B.

443

C.

2427

D.

3389


2427


User Datagram Protocol

A company is implementing enhanced user authentication for system administrators accessing the


company's confidential servers. Which of the following would be the BEST example of two-factor

authentication?


A.

ID badge and keys


B.

Password and key fob


C.

fingerprint scanner and retina scan


D.

Username and password


Password and key fob

A company that was previously running on a wired network is performing office-wide upgrades. A


department with older desktop PC's that do not have wireless capabilities must be migrated to the


new network, ensuring that all computers are operating on a single network. Assuming CAT5e


cables are available, which of the following network devices should a network technician use to


connect all the devices to the wireless network?

A.

Wireless bridge

B.

VPN concentrator

C.

Default WAP

D.

Wireless router


Wireless router

Which of the following integrity security mechanisms ensures that a sent message has been


received intact, by the intended receiver?

A.

IPSEC

B.

SHA

C.

DES

D.

CRC


IPSEC

A technician installs a new piece of hardware and now needs to add the device to the network


management tool database. However, when adding the device to the tool using SNMP credentials,


the tool cannot successfully interpret the results. Which of the following would need to be added to


the network management tool to allow it to interpret the new device and control it using SNMP?

A.



TRAP



B.



GET



C.



MIB



D.



WALK


MIB


management information base

Which of the following communication technologies is used by video conferencing systems to


synchronize video streams, and reduce bandwidth, sent by a central location to subscribed


devices?

A.

Anycast

B.

Unicast

C.

CoS

D.

QoS

E.

Multicast


Multicast

Which of the following is a UC application?

A.

Softphone

B.

Intranet

C.

Proxy

D.

Facsimile


Softphone

A company is installing several APs for a new wireless system that requires users to authenticate


to the domain. The network technician would like to authenticate to a central point. Which of the


following would work BEST to achieve these results?

A.

A TACACS+ device and a RADIUS server

B.

A TACACS and a proxy server

C.

A RADIUS server and an access point

D.

A RADIUS server and a network controller


A RADIUS server and an access point

A network technician is replacing security devices that protect the DMZ for a client. The client has


an application that allows external users to access the application remotely. After replacing the


devices, the external users are unable to connect remotely to the application. Which of the


following is MOST likely misconfigured?

A.

Content filter

B.

Firewall

C.

DNS

D.

DHCP


Firewall