• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back


A network administrator is tasked with building a wireless network in a new adjacent building.


Wireless clients should not have visibility to one another but should have visibility to the wired


users. Users must seamlessly migrate between the two buildings while maintaining a connection


to the LAN. Which of the following is the BEST way to configure the new wireless network in the


new building?


A.


Use the same SSIDs on different channels and AP isolation


B.


Use different SSIDs on different channels and VLANs


C.


Use different SSIDs on the same channels with VLANs


D.


Use the same SSIDs on same channels with AP isolation


Use the same SSIDs on different channels and AP isolation

A customer is attempting to download a file from a remote FTP server, but receives an error that a


connection cannot be opened. Which of the following should be one FIRST to resolve the


problem?

A.

Ensure that port 20 is open

B.

Ensure that port 161 is open

C.

Flush the DNS cache on the local workstation

D.

Validate the security certificate from the host


Ensure that port 20 is open

OFDM, QAM and QPSK are all examples of which of the following wireless technologies?

A.

Frequency

B.

Modulation

C.

RF interference

D.

Spectrum

Modulation

A network administrator is following best practices to implement firewalls, patch management and


policies on the network. Which of the following should be performed to verify the security controls


in place?

A.

Penetration testing

B.

AAA authentication testing

C.

Disaster recovery testing

D.

Single point of failure testing


Penetration testing

Which of the following is a connectionless protocol? (Select TWO)



ICMP

B.

SSL

C.

TCP

D.

SSH

E.

HTTP

F.

UDP


ICMP


UDP

Ann, a network technician is preparing to configure a company's network. She has installed a


firewall to allow for an internal DMZ and external network. No hosts on the internal network should


be directly accessible by IP address from the internet, but they should be able to communicate


with remote networks after receiving a proper IP address. Which of the following is an addressing


scheme that will work in this situation?

A.

Teredo tunneling

B.

Private

C.

APIPA

D.

Classless



Private

A company has just implemented VoIP. Prior to the implementation, all of the switches were


upgraded to layer 3 capable in order to more adequately route packages. This is an example of


which of the following network segmentation techniques?

A.

Compliance implementation

B.

Separate public/private newtorking

C.

Honeypot implementation

D.

Performance optimization


Performance optimization

A malicious student is blocking mobile devices from connecting to the internet when other students


are in the classroom. Which of the following is the malicious student implementing?





A.



Removing the AP from the classroom



B.



ACL



C.



Jamming



D.



Firewall



E.



IPS















Jamming








A technician configures a firewall in the following manner in order to allow HTTP traffic


Source IPZone Dest IPZonePortAction


AnyUntrustAnyDMZ80Allow


The organization should upgrade to which of the following technologies to prevent unauthorized


traffic from traversing the firewall?

A.

HTTPS

B.

Stateless packet inspection

C.

Intrusion detection system

D.

Application aware firewall


Application aware firewall

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as


which of the following?

A.

Multiplexing

B.

Zero-day attack

C.

Smurfing

D.

Bluejacking


Bluejacking

A technician is concerned about security and is asked to set up a network management protocol.


Which of the following is the best option?

A.

SLIP

B.

SNMPv3

C.

TKIP

D.

SNMPv2


SNMPv3

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses


the 192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select


TWO)

A.

PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80

B.

PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

C.

PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY

D.

PERMIT SRCIP: ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT:80

E.

PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80


PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80



A network technician has been asked to make the connections necessary to add video transported


via fiber optics to the LAN within a building. Which of the following is the MOST common


connector that will be used on the switch to connect the media converter?

A.

FDDI

B.

Fiber coupler

C.

MT-RJ

D.

ST


ST


Straight Tip

Which of the following protocols is considered a hybrid routing protocol?

A.

OSPF

B.

RIPv2

C.

IS-IS

D.

BGP

E.

EIGRP


E.

EIGRP


Enhanced Interior Gateway Routing Protocol

Ann, an employee, has properly connected her personal wireless router to a network jack in her


office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP


address when connected to the same jack. Ann checks the router configuration to ensure it is


configured to obtain a DCHP address. Which of the following is the MOST likely reason why the


router is not receiving a DHCP address?

A.

The administrator has enabled DHCP snooping on the network

B.

The administrator is blocking DHCP requests that originate from access points

C.

The administrator is blocking the wireless router's MAC address using MAC filtering

D.

The Administrator has implemented a feature that only allows white-listed MAC addresses


The Administrator has implemented a feature that only allows white-listed MAC addresses

As part of unified communications services, QoS must be implemented. DSCP and CoS map to


which of the following OSI layers? (Select TWO)

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5


Layer 2


Layer 3

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to


devices on the network. Which of the following should the technician check FIRST?

A.

WAP placement

B.

Encryption type

C.

Bandwidth saturation

D.

WAP SSID


WAP placement

A network technician responds to a customer reporting that a workstation keeps losing its network


connection. The user explains that it occurs randomly and it happens several times throughout the


day. Which of the following troubleshooting methods should the technician perform FIRST?

A.

Test the theory

B.

Establish a plan of action

C.

Gather information

D.

Question the obvious


Gather information

A user reports slow computer performance. A technician troubleshooting the issue uses a


performance monitoring tool and receives the following results:


Avg % Processor Time =10%

Avg Pages/Second = 0


Avg Disk Queue Length = 3


Based on the results, which of the following is causing a bottleneck?

A.

Hard drive

B.

Memory

C.

Processor

D.

NIC


Hard drive

A technician has responded to a security issue with an employee's computer. Which of the


following basic forensic steps should be taken NEXT?

A.

Secure the area

B.

Initiate Data collection

C.

Create the forensics report

D.

Verify the chain of custody


Secure the area