Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
A network technician has downloaded the latest vendor switch O/S. which includes new features and enhancements. Which of the following should the technician perform FIRST when updating the switches? A. Backup the current configuration for each switch B. Install during non-business hours to test the system C. Test the O/S on one of the production switches D. Power cycle the company's border router |
Backup the current configuration for each switch |
|
Which of the following protocols is used to send mail to another server on the Internet? |
SMTP Simple Mail Transfer Protocol |
|
Which of the following ports is used to provide secure sessions over the web by default? |
port 22
|
|
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following? |
Social engineering |
|
After an employee connected a switch port of a home router to the wall jack in the office, other employees in the office started losing connectivity. Which of the following can be implemented on the company switch to prevent loss of connectivity in the future? |
Loop prevention |
|
An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using? |
Public Iaas |
|
When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU. Which of the following was MOST likely used by the technician? |
Loopback plug |
|
A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office. Which of the following should be created? |
Guest network |
|
A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices. Which of the following will allow SNMP monitoring of the devices? |
MIBS management information base |
|
A network technician determines that two dynamically assigned workstations have duplicate IP addresses. Which of the following commands should the technician use to correct this problem? |
ipconfig /release then ipconfig /renew |
|
After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected. Which of the following is the MOST likely cause? |
Cable short |
|
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. Which of the following encryption types should be implemented? |
WPA2 Enterprise |
|
A network administrator wants to logically separate web function servers on the network. Which of the following network devices will need to be configured? |
Switch |
|
A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office. The used has MOST likely: |
installed the printer in ad-hoc mode |
|
When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection. This creates which of the following conditions? |
Short |