0 of 45 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 45 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the
Which of the following would block access to an untagged port when connected to a Layer 2 device?
Given the table below:
Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?
To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?
Which of the following OSI layers contains the LLC function?
A senior technician is reconfiguring the company’s firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior
technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the
performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?
A network technician is investigating a device that has been reported as responding slowly. Which of the following should the technician check FIRST?
Which of the following BEST describes the RADIUS authentication service protocol?
A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring
between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?
A network engineer utilizes a box of Cat5e cable in a datacenter for use between 10Gbps switches in a single rack. After the engineer finishes the installation, switch administrators notice random speed drops
and intermittent connection issues. Which of the following is this an example of?
A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner
needs to initiate a secure connection to the company’s router. Which of the following would BEST meet the requirements? (Choose two.)
Which of the following properties should be configured to extend logical network separation on an uplink interface to a second switch?
A document outlining the types of actions allowed on the corporate network would be BEST defined as an:
While troubleshooting a connectivity issue, a network technician successfully pinged the loopback address and external DNS server tut was unable to ping the website’s URL Which of the following tools should the
technician use to determine where the network issue is located?
A new datacenter is being created, and management is trying to control access to that area. Which of the following are the BEST choices for providing access to the new datacenter? (Choose two.)
While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to
prevent unauthorized access?
Which of the following are reasons for enabling jumbo frames? (Select TWO)
A network technician is capturing packets on the network and notices a UDP packet stream from a phone to the PBX system. The payload of the packet shows the phone downloaded the file cm7910-sccp-load2995.xml. Which of the following protocols was MOST likely used to download this file?
A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying
ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all
machines to connect?
A network technician is assisting a user cannot connect to a wireless connection. The user is connecting to the correct SSID and has the correct pre-shared key. The technician verifies the WAP is working, and
other clients are connected to it from same location. Which of the following should the technician investigate?
A server administrator is building an email server. To protect the corporate/internal network from external users, the email server should be placed:
Which of the following routing conventions is known as a link-state protocol?
A technician needs a way to allow clients to access a new application server on the network. Which of the following should the technician set up to achieve this objective? (Select TWO)
A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going
outside the company’s network? (Choose three.)
A technician is making the population of routers more secure. Which of the following are the BEST options
for making authentication more secure? (Choose two.)
A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy?
When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
A technician is installing six PCs and six VoIP telephones on a small office LAN. The VoIP telephones require QoS to be configured for proper operation. The customer router does not have QoS capability.
Which of the following network devices should the technician purchase and install at this office?
Which of the following BEST explains why a firewall would be subject to international export controls?
A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is
associated with which of the following OSI layers?
A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the
network administrator cannot reach the Internet using that address. Which of the following is the MOST likely explanation?
In which of the following layers of the OSI model is checksum added to the end of an Ethernet frame?
A network device compares a computed value of its major software components against a stored value. While the network device is loading, the device halts and alerts the administrator that the values are different. Which of the following is the name of the value in use, and what does this process provide?
A company deploys many workers in the field who remotely access files from a server at headquarters. Leadership is concerned about the risks posed when field workers update these files from unsecured
networks. Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.)
Which of the following components should be used to provide interconnectivity between virtual machines in distinct broadcast domains inside the hypervisor’s environment?
A flood disables the equipment in a company’s server room. When implementing the disaster recovery plan, all operations are immediately transitioned to another location with momentary downtime. This is an
example of a:
A manufacturing company has signed an agreement with another company to collaborate on an upcoming project. Both companies require secure and persistent access to resources on each others’ networks.
Which of the following remote access technologies should the companies implement to satisfy their requirements?
Which of the following would MOST likely provide continuous power during a short brownout?
A network administrator is reviewing security logs and notes a strange IP address logging into the management console of a switch. The administrator verifies the switch is not using default credentials.
Which of the following steps should the administrator take NEXT?
A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented?
A network technician receives a call from Joe, a user about slow speeds when he copies large files from the file server Other users can copy the same files in a matter of seconds. Prior to experiencing the slow
speeds, Joe moved the computer farther from the network jack and built his own Cat5 cable During troubleshooting the on-site network technician observes Joe is only getting a 10Mbps connection speed
while everyone else who is connected to the switch is getting 1000Mbps. Which of the following should the network technician check NEXT? (Select TWO)
Management asks a network technician to install a new connection between two main locations. Management requests that the connection be the fastest possible for data replication. Which of the
following would be the MOST appropriate type?
Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully
tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this?
A user in the finance department can access the department printer and file server yet is unable to print to
the marketing department’s printer. A technician runs ipconfig and sees the following output:
IPv4 Address. . . . . . . . . . . : 192.168.0.101
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
The technician has verified the user’s PC is in the proper VLAN and sees an UP/UP status on the
switchport. Which of the following is MOST likely causing the issue?
A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?