Filters
Question type

Study Flashcards

Which of the following MUST be installed on an employee's computer if the remote access VPN implements an SSL VPN with PKI authentication?


A) Shared secret
B) HTTPS server
C) Soft token
D) Private certificate

Correct Answer

verifed

verified

Which of the following devices are MOST often responsible for 802.1q tagging? (Choose two.)


A) Switch
B) Router
C) IDS
D) Hub
E) IPS
F) Network tap

Correct Answer

verifed

verified

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?


A) Replace the omnidirectional antennas with unidirectional antennas.
B) Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.
C) Replace the 802.11 wireless standard and use GSM instead.
D) Replace the wireless bridges with wireless routers.

Correct Answer

verifed

verified

A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?


A) EAP-PEAP
B) CCMP-AES
C) WPA2-PSK
D) TKIP-RC4

Correct Answer

verifed

verified

A network technician is capturing packets on the network and notices a UDP packet stream from a phone to the PBX system. The payload of the packet shows the phone downloaded the file cm7910-sccp-load-2995.xml. Which of the following protocols was MOST likely used to download this file?


A) SIP
B) TFTP
C) SSL
D) ICMP

Correct Answer

verifed

verified

A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?


A) Port enumeration
B) Baseline review
C) Vulnerability scanning
D) Packet analysis

Correct Answer

verifed

verified

A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?


A) Two days
B) Three days
C) Six days
D) Seven days

Correct Answer

verifed

verified

Which of the following protocols operates at the data link layer of the OSI model?


A) IGRP
B) BGP
C) PPP
D) FTP

Correct Answer

verifed

verified

A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?


A) Change management records
B) Inventory management
C) Network log files
D) Logical diagrams

Correct Answer

verifed

verified

Which of the following BEST explains why a network engineer would use a wireless mesh network when connecting sensors to a sensor gateway?


A) It creates various paths to a particular destination.
B) It increases the overall throughput of the links connecting the devices.
C) It provides redundancy if the sensor network experiences broad wireless interference.
D) It allows autonomous communication if the sensor network goes down.

Correct Answer

verifed

verified

Which of the following devices acts as a multiport repeater at the physical layer of the OSI model?


A) Switch
B) Bridge
C) Hub
D) Transceiver

Correct Answer

verifed

verified

Ann, a customer, recently upgraded her SOHO Internet to gigabit fiber from cable. She was previously getting speeds around 75Mbps down and 25Mbps up. After the upgrade, Ann runs a speed test on her desktop and gets results of 1000Mbps down and 100Mbps up. A technician connects directly to the router and sees the correct 1000Mbps speeds. Which of the following is MOST likely the cause? (Choose two.)


A) All ports should be configured for full duplex.
B) There is a 10/100 switch on the network.
C) The connections are using Cat 5 cable.
D) The connections are using Cat 6 cable.
E) There is a transceiver mismatch at the fiber termination point.
F) Signal attenuation on the new fiber has reached the upper limits.

Correct Answer

verifed

verified

A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?


A) Load balancer
B) IDS
C) Proxy server
D) Wireless controller

Correct Answer

verifed

verified

A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?


A) Remote desktop gateway
B) Transport mode IPSec
C) SSH tunneling
D) TLS VPN

Correct Answer

verifed

verified

Which of the following is used to classify network data for the purpose of providing QoS?


A) STP
B) VLANs
C) SIP
D) DSCP

Correct Answer

verifed

verified

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?


A) Conducting daily vulnerability scans
B) Performing daily port scans
C) Utilizing a protocol analyzer
D) Using a SIEM
E) Reviewing daily logs

Correct Answer

verifed

verified

A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office. Of which of the following types of IoT technologies is this an example?


A) LAN
B) WAN
C) SAN
D) PAN

Correct Answer

verifed

verified

Which of the following network topologies is primarily used to connect servers to large network disk arrays?


A) SAN
B) MAN
C) CAN
D) PAN
E) LAN

Correct Answer

verifed

verified

A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?


A) Use port mirroring
B) Install an inline tap
C) Periodically view the server logs
D) Configure port aggregation

Correct Answer

verifed

verified

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?


A) Run a port scanner on each name server to ensure TCP port 53 is open and listening.
B) Run tracert from a desktop client to query each name server and see what answers are sent back from each server. Run tracert from a desktop client to query each name server and see what answers are sent back from each server.
C) Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
D) Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Correct Answer

verifed

verified

Showing 681 - 700 of 829

Related Exams

Show Answer