• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Which of the following attacks utilizes a wireless access point which has been made to look as


though it belongs to the network in order to eavesdrop on wireless traffic?

Evil twin

A home user is pairing a bluetooth gaming controller with the game console. Which of the


following is implemented between the console and the controller?

PAN

A technician has attempted to optimize the network but some segments are still reporting poor


performance. Which of the following issues should the technician look at?

Packet bottlenecks

Coverage analysis for a new implementation of 802.11n WLAN involves which of the following?


(Select TWO)


Building material

Sight lines

A technician is in a large room that contains a large amount of industrial equipment. The


technician would like to record the usable bandwidth between devices in a wireless network and


the access point. Which of the following should the technician document?


Goodput

A project manager is tasked with the planning of a new network installation for a client. The client


wants to ensure that everything discussed in the meetings will be installed and configured when a


network engineer arrives onsite. Which of the following should the project manager provide the


client?


Statement of work

A technician suspects that the email system is slow due to excessive incoming SPAM. Which of


the following should the technician do according to the troubleshooting methodology?


Gather information

A home office has a dozen devices that need a class based DHCP device to assign addresses.


The subnet only has one octet for the host portion of each device. Which of the following IP


addresses would be assigned to the default gateway?


192.168.0.1

A network administrator needs to allow employees to securely upload files to a remote server.


Which of the following should be allowed on the firewall?


port 21

Joe, a system administrator, is troubleshooting an issue with remotely accessing a new server on


the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the


new server. The server that he cannot remote to is located on the same LAN as another server


that he can successfully remote to. Which of the following output from the command line would


BEST resolve the problem?


C:\windows\system32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS


resource records for all adapters has been initiated. Any errors will be reported in the event viewer


in 15 minutes.

A technician is called to investigate a connectivity issue to a remote office that is connected by


fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation


has been working for several years. The switch was recently moved to the other side of the room


and a new patch cord installed. Which of the following is MOST likely the cause of the issue?


Dirty connectors

A technician is being tasked to centralize the management of the switches and segment the


switches by broadcast domains. The company is currently all on VLAN1 using a single private IP


address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet


and all switches to share the VLAN information. Which of the following options would work BEST


to accomplish these requirements?


Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with


native VLAN 100

A new network administrator is hired to replace a consultant that has been keeping the network


running for several months. After a month, the network administrator is having network issues. The


problems are easily resolved and appear to be changes in the server settings. The log files on the


servers do not contain any error or messages related to the issues. Which of the following is a


possible cause of the issues?


A backdoor has been installed to access the network