• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

A company utilizes a patching server to regularly update their PC's. After the latest round of


patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the

network and now require a technician to fix the issue locally at each PC. Which of the following



should be done to prevent this issue in the future?

A.



Enable automatic rebooting of the pCs after patching is completed



B.



Require the patching server to update the oldest PCs off hours



C.



Disable automatic driver updates to PCs on the patching server



D.



Throttle the connection speed of the patching server to match older PCs

Throttle the connection speed of the patching server to match older PCs

A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch


panel. The technician has cabled this port to be used with which of the following?

A.

10baseT

B.

POTS

C.

568B

D.

568A

POTS


Plain old telephone services

Which of the following protocols is used to encapsulate other network layer protocols such as


multicast and IPX over WAN connections?

A.

MPLS

B.

ESP

C.

GRE

D.

PPP


GRE


Generic Routing Encapsulation

A network technician is tasked with designing a firewall to improve security for an existing FTP


server that is on the company network and is accessible from the internet. The security concern is


that the FTP server is compromised it may be used as a platform to attack other company servers.


Which of the following is the BEST way to mitigate this risk?

A.

Add an outbound ACL to the firewall

B.

Change the FTP server to a more secure SFTP

C.

Use the implicit deny of the firewall

D.


Move the server to the DMZ of the firewall


D.

Move the server to the DMZ of the firewall

A network administrator received the following email from a user:


From: user@company.com


To: abuse@company.com


Subject: Free smart phone


Dear, user, please click the following link to get your free smart phone


http://www.freesmartphone.it:8080/survey.php


Which of of the following should the administrator do to prevent all employees from accessing the


link in the above email, while still allowing Internet access to the freesmartphone.it domain?

A.

Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

B.

Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL

C.

Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter

D.

Add http://www.freesmartphone.it:8080/survey.php to the load balancer


A.

Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

Which of the following types of equipment should be used for telecommunications equipment and


have an open design?

A.

2/4 post racks

B.

Rail Racks

C.

Vertical frame

D.

Ladder racks


2/4 post racks

A facility would like to verify each individual's identity prior to allowing access to the datacenter.


Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of


the following would BEST meet these goals?

A.

Implement a biometric reader at the datacenter entrance and require passage through a mantrap

B.

Implement a security guard at the facility entrance and a keypad on the datacenter entrance

C.

Implement a CCTV camera and a proximity reader on the datacenter entrance

D.

Implement a biometric reader at the facility entrance and a proximity card at the datacenter


entrance


A.

Implement a biometric reader at the datacenter entrance and require passage through a mantrap





A network technician needs to connect two switches. The technician needs a link between them




which is capable of handling 10gb. Which of the following media would be optimal for this




application?



A.



CAT5e cable



B.



Coax cable



C.



Fiber Optic cable



D.



CAT6 cable




Fiber Optic cable

Joe, and administrator, is setting up three more switches in the test lab and is configuring the


switches. He is verifying the connectivity but when he pings one of the switches he receives


"Destination Unreachable". Which of the following issues could this be?

A.

Denial of service attack

B.

Misconfigured DNS settings

C.

Misconfigured Split Horizon

D.

RADIUS authentication errors


Misconfigured Split Horizon

A company is selecting a fire suppression system for their new datacenter and wants to minimize


the IT system recovery period in the event of a fire. Which of the following is the best choice for


the fire suppression system?

A.

Portable extinguishers

B.

Wet Pipe

C.

Clean Gas

D.

Dry Pipe


Clean Gas

Which of the following BEST describes the process of documenting everyone who has physical


access or possession of evidence

A.

Legal hold

B.

Chain of custody

C.

Secure copy protocol

D.

Financial responsibility


Chain of custody

A network manager wants a monthly report of the security posture of all the assets on the network


(e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a


system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is


associated with the missing update or patch. Which of the following solutions would work BEST to


present this data?



A.



Security policy



B.



Penetration scan



C.



Virus scan



D.



Vulnerability scanner


Vulnerability scanner

Which of the following is a logical host on the network where unauthorized users believe they are


on the production network?

A.

Virtual server

B.

VLAN

C.

Honeypot

D.

Virtual Terminal





Honeypot

Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor


support technician to properly set up and configure the SAN on the network. In order to begin SAN


I/O optimization, which of the following would Joe need to provide the vendor support technician?

A.

Network diagrams

B.

Baseline documents

C.

Asset management document

D.

Access to the datacenter


Network diagrams

Joe, a home user, would like to share music throughout the computers in his house using a USB


drive connected to a router he purchased a year ago. The manufacturer states that the router is


capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the


network. Which of the following should Joe perform in order to resolve this issue?

A.

Load the latest hardware drivers for his USB drive

B.

Install the latest OS on his computers

C.

Download the latest playback software for his music files

D.


Flash the latest firmware for his router


D.

Flash the latest firmware for his router

A technician has completed a survey of a wireless network and documented signal strengths. This


document is known as which of the following?

A.

Logical Network map

B.

Heat map

C.

Network baseline

D.

Bandwidth survey


Heat map

A network technician must allow use of HTTP from the internet to an internal resource running

HTTP. This is an example of which of the following?

A.

Dynamic DNS

B.

Virtual Private networking (VPN)

C.

Dynamic NAT

D.

Port Forwarding


Port Forwarding

A network topology in which all nodes have point to point connections to all other nodes is known


as which of the following?

A.

Mesh

B.

Ring

C.

Bus

D.

Star


Mesh

A technician needs to install a server to authenticate remote users before they have access to


corporate network resources when working from home. Which of the following servers should the


technician implement?

A.

DNSSEC

B.

PPP

C.

RAS

D.

VLAN

E.

NAT


RAS


Remote Access Server

While monitoring the network, a technician notices that the network traffic to one of the servers is


extremely high. Which of the following should the technician use to verify if this is a concern?

A.

Log management

B.

Network diagram

C.

Network baseline

D.

Real time monitor


Network baseline