• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Channel bonding will improve which of the following wireless characteristics?

A.

Signal strength

B.

Encryption strength

C.

Coverage area

D.

Connection speed

Users have reported poor network performance. A technician suspects a user may have


maliciously flooded the network with ping request. Which of the following should the technician


implement to avoid potential occurrences from happening in the future?

A.

Block all ICMP request

B.

Update all antivirus software

C.

Remove all suspected users from the network

D.

Upgrade firmware on all network cards

A network technician is troubleshooting a network connection error, when pinging the default


gateway no reply is received. The default gateway is found to be functioning properly but cannot


connect to any workstations. At which of the following OSI layers could the problem exist? (Select


TWO)


Data link





Physical




A technician has determined the most likely cause of an issue and implement a solution. Which of


the following is the NEXT step that should be taken?


Verify system functionality

An administrator has a physical server with a single NIC. The server needs to deploy two virtual


machines. Each virtual machine needs two NIC's, one that connects to the network, and a second


that is a server to server heartbeat connection between the two virtual machines. After deploying


the virtual machines, which of the following should the administrator do to meet these


requirements?


The administrator should create a virtual switch to bridge all of the connections to the network. The


virtual heartbeat NICs should be set to addresses in an unused range

A network technician is asked to redesign an Ethernet network before new monitoring software is


added to each host on the network. The new software will broadcast statistics from each host to a


monitoring host for each of the five departments in the company. The added network traffic is a


concern of management that must be addressed. Which of the following solutions should the


technician design into the new network?


Place each department in a separate VLAN

A company has added several new employees, which has caused the network traffic to increase


by 200%. The network traffic increase from the new employees was only expected to be 20% to


30%. The administration suspects that the network may have been compromised. Which of the


following should the network administrator have done previously to minimize the possibility of a


network breach?


Provide end user awareness and training for employees

A network technician discovers an issue with spanning tree on the core switch. Which of the


following troubleshooting steps should the network technician perform NEXT to resolve the issue?


Establish a theory of probable cause

Which of the following would be the BEST addition to a business continuity plan that would protect


business from a catastrophic event such as a fire, tornado, or earthquake?


Hot sites or cold sites

A network technician has created a network consisting of an external internet connection, a DMZ,


an internal private network, and an administrative network. All routers and switches should be


configured to accept SSH connections from which of the following network segments?


The admin private network allowing only admin access

A network technician needs to monitor the network to find a user that is browsing inappropriate


websites. Which of the following would the technician use to view the website and find the user


browsing it?


A packet sniffer

A network administrator receives a call asking for assistance with connecting to the network. The


user asks for the IP address, subnet class, and VLAN required to access the network. This


describes which of the following attacks?


Social engineering

Which of the following cloud infrastructure designs includes on premise servers utilizing a


centralized syslog server that is hosted at a third party organization for review?











Hybrid

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which


of the following technologies would be able to detect and block this traffic?





Stateful packet inspection

The network administrator is configuring a switch port for a file server with a dual NIC. The file


server needs to be configured for redundancy and both ports on the NIC need to be combined for


maximum throughput. Which of the following features on the switch should the network


administrator use?


LACP