Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments? |
The admin private network allowing only admin access |
|
A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it? A. An SNMP GET B. A top listener tool C. An intrusion detection system D. A packet sniffer |
A packet sniffer |
|
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks? A. Social engineering B. Spoofing C. Zero-day attack D. VLAN hopping |
Social engineering |
|
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? A. Hybrid B. Public C. Community D. Private |
Hybrid
|
|
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic? A Intrusion detection system B. Application aware firewall C. Stateful packet inspection D. Stateless packet inspection |
Stateful packet inspection
|
|
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use? A. BPDU B. LACP C. Spanning tree D. Load balancing |
LACP Link Aggregation Control Protocol |
|
A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network? A. Use SNMPv1 for all configurations involving the router B. Ensure the password is 10 characters, containing letter and numbers C. Copy all configurations to routers using TFTP for secuirty D. Only allow administrators to access routers using port 22 |
Only allow administrators to access routers using port 22 |
|
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause? A. Distance limitation B. Wavelength mismatch C. cross-talk D. EMI E. Macro bend |
Wavelength mismatch |
|
A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n |
802.11a 802.11ac |
|
Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back? A. The browser on the server B. The server's NIC drivers C. The server's IP address D. The antivirus updates |
The server's NIC drivers |
|
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of the following? A. Network diagram B. Site survey C. Network topology D. PoE requirements |
Site survey |
|
Which of the following default ports is associated with protocols that are connectionless? A. 80 B. 443 C. 2427 D. 3389 |
2427 User Datagram Protocol |
|
A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of two-factor authentication? A. ID badge and keys B. Password and key fob C. fingerprint scanner and retina scan D. Username and password |
Password and key fob |
|
A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network? A. Wireless bridge B. VPN concentrator C. Default WAP D. Wireless router |
Wireless router |
|
Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver? A. IPSEC B. SHA C. DES D. CRC |
IPSEC |
|
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to allow it to interpret the new device and control it using SNMP? A. TRAP B. GET C. MIB D. WALK |
MIB management information base |
|
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices? A. Anycast B. Unicast C. CoS D. QoS E. Multicast |
Multicast |
|
Which of the following is a UC application? A. Softphone B. Intranet C. Proxy D. Facsimile |
Softphone |
|
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results? A. A TACACS+ device and a RADIUS server B. A TACACS and a proxy server C. A RADIUS server and an access point D. A RADIUS server and a network controller |
A RADIUS server and an access point |
|
A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured? A. Content filter B. Firewall C. DNS D. DHCP |
Firewall |