Network Security and Server Configuration Quiz
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What would be the BEST to use to detect a MAC spoofing attack?

  • Internet Control Message Protocol
  • Reverse Address Resolution Protocol (correct)
  • Dynamic Host Configuration Protocol
  • Internet Message Access Protocol
  • Which tool should the technician use to troubleshoot interference from other networks and non-802.11 devices?

  • NetFlow analyzer
  • Bandwidth analyzer
  • Protocol analyzer
  • Spectrum analyzer (correct)
  • What is the MOST likely cause of intermittent internet connectivity for wireless users?

  • Check for encryption protocol mismatch on the client’s wireless settings
  • Verify the session time-out configuration on the captive portal settings (correct)
  • Confirm that a valid passphrase is being used during the web authentication
  • Ensure proper DNS configuration on the client devices
  • What should the network administrator do to ensure constant internet connectivity for wireless users?

    <p>Optimize channel selection and reduce interference</p> Signup and view all the answers

    What is the focus of the practice questions related to Disaster Recovery as a Service (DRaaS)?

    <p>Addressing the considerations and challenges of implementing DRaaS</p> Signup and view all the answers

    What is the primary consideration for evaluating a firewall to protect a datacenter's east-west traffic?

    <p>Integration with external threat intelligence sources</p> Signup and view all the answers

    What is the main purpose of prioritizing Internet usage per application and per user on the network?

    <p>To optimize network bandwidth allocation</p> Signup and view all the answers

    What is the purpose of using commands to query NSs for a remote application?

    <p>To troubleshoot DNS resolution issues</p> Signup and view all the answers

    In what context is reviewing previous upgrades to a system explained?

    <p>Assessing the impact of upgrades on system security</p> Signup and view all the answers

    What is detailed in gathering metrics from a new switch model for network monitoring software?

    <p>Measuring packet loss and latency on switch ports</p> Signup and view all the answers

    How can a network administrator prevent a tailgating attack?

    <p>Direct the unknown person to the security desk in a datacenter</p> Signup and view all the answers

    Where are CRC errors during network communication typically troubleshooted?

    <p>Layer 2 of the OSI model</p> Signup and view all the answers

    How can a network administrator accurately assess a performance issue affecting 100 users on VMs?

    <p>By monitoring CPU usage and memory metrics</p> Signup and view all the answers

    How can DHCP exhaustion be resolved without creating a new pool?

    <p>By reducing the lease time</p> Signup and view all the answers

    What is likely to be used to log IPv6 and MAC addresses of devices on a network segment?

    <p>Neighbor Discovery Protocol</p> Signup and view all the answers

    How does a CNAME DNS record function?

    <p>As an alias to another record</p> Signup and view all the answers

    What should a network administrator correct to resolve access issues to an intranet site in a new building connected via fiber-optic cable?

    <p>DNS server entries in the DHCP scope</p> Signup and view all the answers

    What is the most likely cause of a fiber connection issue in a datacenter?

    <p>A reversed TX/RX connection</p> Signup and view all the answers

    How can a technician locate a device's network port?

    <p>Reviewing the MAC table on the switch</p> Signup and view all the answers

    What does NIC teaming provide on a file server to ensure connectivity in case of a port failure on a switch?

    <p>Redundancy</p> Signup and view all the answers

    What should a network technician inquire about when addressing user access issues to network resources after office changes?

    <p>What changes were made in the office</p> Signup and view all the answers

    What should be used to allow the use of the original Cat 6 cable when rebuilding it for a crossover connection?

    <p>MDIX (Media Dependent Interface Crossover)</p> Signup and view all the answers

    What should a network engineer perform NEXT to ensure all the firewalls are hardened successfully?

    <p>Update the firewalls with current firmware and software</p> Signup and view all the answers

    At which of the following OSI model layers would a technician find an IP header?

    <p>Layer 3</p> Signup and view all the answers

    Which of the following should a wireless technician do NEXT to troubleshoot the inability of several WIFI users to connect to the network?

    <p>Reconfigure the channels to reduce overlap</p> Signup and view all the answers

    Which of the following routing protocols is used to exchange route information between public autonomous systems?

    <p>BGP</p> Signup and view all the answers

    Which of the following tools should an engineer use to detect the exact break point of a fiber link connecting two campus networks?

    <p>OTDR</p> Signup and view all the answers

    Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

    <p>TACACS+</p> Signup and view all the answers

    A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?

    <p>FTP</p> Signup and view all the answers

    A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:

    <p>questioning the obvious.</p> Signup and view all the answers

    What is the recommended subnet mask for the network block 192.168.0.0/20?

    <p>255.255.240.0</p> Signup and view all the answers

    What is the largest MTU (Maximum Transmission Unit) for a standard Ethernet frame?

    <p>1500 bytes</p> Signup and view all the answers

    Which command-line tool can be used to generate specific output?

    <p>grep</p> Signup and view all the answers

    What is the next step in troubleshooting methodology after determining the probable cause?

    <p>Identify potential effects of the solution</p> Signup and view all the answers

    What cable type is used to connect a modem to the ISP?

    <p>Coaxial cable</p> Signup and view all the answers

    What physical topology is commonly used for an Ethernet LAN?

    <p>Star topology</p> Signup and view all the answers

    What metric confirms a cabling issue when reviewing interface counters on a router?

    <p>CRC errors</p> Signup and view all the answers

    What command can be used to ensure two-factor authentication on a network device?

    <p>aaa new-model</p> Signup and view all the answers

    Which document supports prevention of unnecessary network modifications and maintaining version control?

    <p>Change management policy</p> Signup and view all the answers

    What tasks are commonly performed by a network engineer to increase server bandwidth?

    <p>Implementing link aggregation</p> Signup and view all the answers

    What description fits a network appliance that warns of unapproved devices accessing the network?

    <p>Network Access Control (NAC) device</p> Signup and view all the answers

    What setup supports disaster recovery and High Availability (HA) policies with two different data centers?

    <p>Active-Passive</p> Signup and view all the answers

    Study Notes

    IT Network Technician Exam Questions Summary

    • Recommended policies to mitigate network issues: two-factor authentication and complex passwords
    • Tasks performed by a network engineer to increase server bandwidth
    • Subnet recommendation for a network block 192.168.0.0/20
    • The largest MTU for a standard Ethernet frame
    • Command-line tool to generate specific output
    • Next step in troubleshooting methodology after determining probable cause
    • Description of a network appliance that warns of unapproved devices accessing the network
    • Cable type used to connect a modem to the ISP
    • Metric confirming a cabling issue when reviewing interface counters on a router
    • Physical topology for an Ethernet LAN
    • Description of a setup for disaster and HA policies with two different data centers
    • Document supporting prevention of unnecessary network modifications and maintaining version control

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of network security and server configuration with this quiz. Identify the best policies to mitigate issues, and understand tasks to increase server bandwidth.

    More Like This

    Use Quizgecko on...
    Browser
    Browser