SFP Questions on Windows TCP Ports and Wireless APs
86 Questions
8 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What standard should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

  • 802.11ac
  • 802.11g
  • 802.11n
  • 802.11ax (correct)
  • Which protocol would be BEST to use for detecting a MAC spoofing attack?

  • Reverse Address Resolution Protocol (correct)
  • Internet Message Access Protocol
  • Dynamic Host Configuration Protocol
  • Internet Control Message Protocol
  • What tool should a technician use to troubleshoot high amounts of jitter in a wireless network with large variations in latency?

  • Spectrum analyzer (correct)
  • Protocol analyzer
  • Bandwidth analyzer
  • NetFlow analyzer
  • Which step will MOST likely determine the cause of intermittent internet connectivity issues reported by wireless users?

    <p>Check the DHCP lease duration on the APs</p> Signup and view all the answers

    In the scenario described, what attack was the network administrator able to prevent?

    <p>Tailgating</p> Signup and view all the answers

    Where would a network administrator MOST likely start to troubleshoot when a network is experiencing CRC errors?

    <p>Layer 1</p> Signup and view all the answers

    To resolve the issue of an exhausted DHCP scope without creating a new pool, what can the administrator do?

    <p>Reduce the lease time</p> Signup and view all the answers

    Which switch feature is MOST likely to be used for logging IPv6 and MAC addresses periodically?

    <p>Neighbor Discovery Protocol</p> Signup and view all the answers

    As an alias to another record, which DNS record should an administrator use?

    <p>CNAME</p> Signup and view all the answers

    What should a technician utilize to gather metrics from a switch?

    <p>MIB</p> Signup and view all the answers

    Why are critical events not being received by the syslog server?

    <p>The network device is not configured to log that level to the syslog server</p> Signup and view all the answers

    What is the best way to secure a new datacenter in a different region communicating with an old datacenter?

    <p>Site-to-site VPN</p> Signup and view all the answers

    Which technology provides a failover mechanism for the default gateway?

    <p>FHRP</p> Signup and view all the answers

    What action can an administrator take to easily mitigate users connecting to the guest wireless network for inappropriate downloads?

    <p>Enable wireless client isolation</p> Signup and view all the answers

    What is the term for attempting to find a network password by inputting common words and phrases?

    <p>Dictionary attack</p> Signup and view all the answers

    What would likely happen due to mismatched duplex settings on network devices?

    <p>Increased CRC errors</p> Signup and view all the answers

    What is the BEST way to describe a network topology where all devices are connected to a central hub?

    <p>Star</p> Signup and view all the answers

    To prevent unauthorized modifications to a network, which document would be the MOST suitable to enforce version control and change management?

    <p>A change management policy</p> Signup and view all the answers

    Which scenario is MOST likely to generate significant East-West traffic in a datacenter environment?

    <p>Duplicating a hosted virtual server for redundancy</p> Signup and view all the answers

    What should a technician check first when a network switch stops responding intermittently while in debugging mode?

    <p>CPU utilization</p> Signup and view all the answers

    In a deployment with multiple WAPs broadcasting the same SSID for client access, what does this configuration represent?

    <p>Extended service set</p> Signup and view all the answers

    What needs to be configured for two networks to reach each other when getting 'U.U.U.U' response during a ping attempt?

    <p>Default gateway</p> Signup and view all the answers

    'Zero Trust' in network security primarily aims to:

    <p>Prevent lateral movement of attackers</p> Signup and view all the answers

    'PaaS' is a service model that would likely replace on-premises servers with cloud solutions. What does 'PaaS' stand for?

    <p>Platform as a Service</p> Signup and view all the answers

    When evaluating a firewall for protecting east-west traffic in a datacenter, which traffic scenario is MOST relevant?

    <p>Traffic between VMs on different hosts</p> Signup and view all the answers

    What can be used to prioritize Internet usage per application and user on a network?

    <p>Bandwidth management</p> Signup and view all the answers

    To query the NSs for a remote application, what command would be most useful for the network administrator?

    <p>dig</p> Signup and view all the answers

    Which of the following technologies would be most suitable for optimizing speeds for global content distribution and reducing latency in high-density user locations?

    <p>Content delivery network</p> Signup and view all the answers

    After making changes in the office, a user reports being unable to access network resources. What should a network technician do FIRST?

    <p>Ask what changes were made</p> Signup and view all the answers

    A new cabling certification is being requested everytime a network technician rebuilds one end of a Cat 6 cable to create a crossover connection between switches. Which feature would allow the use of the original cable for this purpose?

    <p>MDIX</p> Signup and view all the answers

    Which software tool would BEST help a technician find all devices connected within a network?

    <p>IP scanner</p> Signup and view all the answers

    In configuring a high-density wireless network for maximum channel support, which standard 802.11 frequency range should a technician look for in WAP specifications?

    <p>5GHz</p> Signup and view all the answers

    What should a technician configure on a network switch in a publicly accessible location to prevent unintended connections?

    <p>Port security</p> Signup and view all the answers

    Which of the following is used to track and document various types of known vulnerabilities?

    <p>CVE</p> Signup and view all the answers

    What does a network engineer need to configure on a server after setting up LACP on switchports to increase server bandwidth?

    <p>NIC teaming</p> Signup and view all the answers

    A network technician is configuring network settings for a new device with a network block of 192.168.0.0/20. What subnet should be used?

    <p>255.255.240.0</p> Signup and view all the answers

    What is the LARGEST MTU for a standard Ethernet frame?

    <p>1500</p> Signup and view all the answers

    According to troubleshooting methodology, what should the technician do NEXT after determining the most likely probable cause of an issue?

    <p>Implement the solution or escalate as necessary.</p> Signup and view all the answers

    What type of device can provide content filtering, threat protection, and manage multiple IPSec site-to-site connections?

    <p>VPN headend</p> Signup and view all the answers

    What is the most likely cause of late collisions on a half-duplex link with devices configured for half duplex?

    <p>The cable length is excessive</p> Signup and view all the answers

    To ensure connectivity during a failover for two systems on a load balancer, what must the administrator configure?

    <p>VIP</p> Signup and view all the answers

    In a high-rise building with frequent network disconnections, what is the most likely cause of the issue with mounted APs?

    <p>Channel overlap occurring</p> Signup and view all the answers

    After configuring firewalls at remote branches, what should the network engineer do next to ensure successful hardening?

    <p>Configure log settings to central syslog server</p> Signup and view all the answers

    At which OSI model layer would a technician find an IP header?

    <p>Layer 3</p> Signup and view all the answers

    Which feature should be enabled to prevent network stability issues when configuring redundant network links between switches?

    <p>STP</p> Signup and view all the answers

    Which routing protocol is used to exchange route information between public autonomous systems?

    <p>BGP</p> Signup and view all the answers

    To detect the exact break point of a fiber link connecting two campus networks, what tool should an engineer use?

    <p>OTDR</p> Signup and view all the answers

    What can be used to centrally manage credentials for various administrative privileges on configured network devices?

    <p>Zero Trust</p> Signup and view all the answers

    For installing new software on a Windows-based server in a different geographical location, what should a network technician use?

    <p>SSH</p> Signup and view all the answers

    To improve videoconferencing performance for branch users, what should the company MOST likely configure?

    <p>Quality of service</p> Signup and view all the answers

    What should a network administrator check FIRST to address poor connectivity reported by users associated with a distanced AP?

    <p>Validate the roaming settings on the APs and WLAN clients</p> Signup and view all the answers

    Which connector type would offer the MOST flexibility?

    <p>SFP</p> Signup and view all the answers

    Which port is commonly used by VoIP phones?

    <p>5060</p> Signup and view all the answers

    What is MOST likely to be affected by jitter greater than 10ms on a WAN connection?

    <p>An in-office video call with a coworker</p> Signup and view all the answers

    Which port should be blocked in the firewall configuration to prevent outside users from telnetting into servers at the datacenter?

    <p>23</p> Signup and view all the answers

    What command should a technician run to confirm server names for Linux servers in a company's server farm?

    <p>nslookup</p> Signup and view all the answers

    What is MOST likely causing extreme latency in a network with unmanaged Layer 2 switches and multiple connections between each pair?

    <p>A broadcast storm</p> Signup and view all the answers

    What should a technician use to record changes to new and old equipment in a major retail store?

    <p>Asset tags</p> Signup and view all the answers

    Which attack encrypts user data and requires a proper backup implementation for recovery?

    <p>Ransomware</p> Signup and view all the answers

    To analyze attacks on a company's network, what must a network administrator implement?

    <p>Network segmentation</p> Signup and view all the answers

    Which command should a network administrator use to ensure a database engine listens on a specific port?

    <p>netstat -a</p> Signup and view all the answers

    What feature would BEST allow a wireless network to provide Internet access while preventing stations from communicating with each other?

    <p>Wireless client isolation</p> Signup and view all the answers

    In a disaster recovery scenario with budget constraints, what concept should a company select if it needs equipment ready but not live data mirrored?

    <p>Cold site</p> Signup and view all the answers

    Which command-line tool should an IT technician use to locate a break in an uplink providing connectivity to the core switch?

    <p>show interface</p> Signup and view all the answers

    What should a technician do when link LEDs fail to light on the workstation and modem after verifying DSL synchronization?

    <p>Replace the cable connecting the modem and workstation</p> Signup and view all the answers

    Which service offers data storage, hardware options, and scalability to companies that cannot afford new devices?

    <p>IaaS</p> Signup and view all the answers

    What document is likely needed to be signed before sharing project information with vendors?

    <p>NDA</p> Signup and view all the answers

    What is the BEST solution for securely connecting two remote offices over an untrustworthy MAN to access each other's network shares?

    <p>Site-to-site VPN</p> Signup and view all the answers

    To segment departments into different networks efficiently, what should be configured in a campus network with users across multiple buildings?

    <p>Port tagging</p> Signup and view all the answers

    What tool should the systems administrator select to improve WiFi performance for a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

    <p>802.11ax</p> Signup and view all the answers

    Which tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?

    <p>PingPlotter</p> Signup and view all the answers

    What should the network administrator do to determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?

    <p>Investigate DHCP lease times</p> Signup and view all the answers

    Which type of attack did the network administrator prevent when redirecting an unknown person to the security desk in the datacenter?

    <p>Tailgating attack</p> Signup and view all the answers

    At which layer of the OSI model will the administrator MOST likely troubleshoot if a network is experiencing CRC errors?

    <p>Data link layer</p> Signup and view all the answers

    To resolve DHCP scope exhaustion without creating a new pool, what action can the administrator take?

    <p>Decrease the lease time for the DHCP clients</p> Signup and view all the answers

    Which switch feature would the administrator MOST likely use to periodically log IPv6 and MAC addresses of devices on a network segment?

    <p>Port mirroring</p> Signup and view all the answers

    In a scenario where client devices cannot enter a network due to DHCP exhaustion, what could the administrator do to alleviate the issue?

    <p>Implement IP address reservation</p> Signup and view all the answers

    What should be configured on a switch in a publicly accessible location to prevent unintended connections?

    <p>Access control lists</p> Signup and view all the answers

    What should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

    <p>802.11ax</p> Signup and view all the answers

    What tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?

    <p>Protocol Analyzer</p> Signup and view all the answers

    What step would MOST likely determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?

    <p>Check for IP Address Conflicts</p> Signup and view all the answers

    What attack did the network administrator prevent by directing the unknown person following closely to the security desk in the datacenter?

    <p>Tailgating Attack</p> Signup and view all the answers

    In the given network scenario, how should the wireless signals be configured to avoid interference?

    <p>Different channels for each Access Point</p> Signup and view all the answers

    What subnet capacity limitation should the network administrator set for the Access Points and switches in this scenario?

    <p>30 devices maximum</p> Signup and view all the answers

    Which encryption method should the Access Points be configured to support in order to meet the given requirements?

    <p>TKIP</p> Signup and view all the answers

    At which layer of the OSI model will the network administrator MOST likely start troubleshooting if CRC errors occur?

    <p>Physical Layer (Layer 1)</p> Signup and view all the answers

    Study Notes

    Wireless Network Administration

    • To improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices, the systems administrator should select the 802.11ac standard.
    • To detect MAC spoofing attacks, the BEST protocol to use is DHCP snooping.
    • To troubleshoot high amounts of jitter in a wireless network with large variations in latency, the technician should use the iperf tool.

    Network Security

    • The network administrator prevented a tailgating attack by directing an unknown person to the security desk in the datacenter.
    • To mitigate users connecting to the guest wireless network for inappropriate downloads, the administrator can configure the network to require authentication and implement content filtering.

    Network Fundamentals

    • The BEST way to describe a network topology where all devices are connected to a central hub is a Star topology.
    • To prevent unauthorized modifications to a network, the MOST suitable document to enforce version control and change management is a Change Management Policy.

    Network Troubleshooting

    • When a network switch stops responding intermittently while in debugging mode, the technician should check the switch's configuration and logs first.
    • If CRC errors occur, the network administrator should start troubleshooting at the Data Link layer (Layer 2) of the OSI model.

    Network Protocols and Technologies

    • The 'PaaS' service model stands for Platform as a Service, which would likely replace on-premises servers with cloud solutions.
    • To query the NSs for a remote application, the network administrator can use the dig command.

    Network Design and Implementation

    • To ensure connectivity during a failover for two systems on a load balancer, the administrator must configure a Floating IP address.
    • In a high-rise building with frequent network disconnections, the most likely cause of the issue with mounted APs is interference.

    Network Management

    • To centrally manage credentials for various administrative privileges on configured network devices, the administrator can use a Privileged Access Management (PAM) system.
    • To record changes to new and old equipment in a major retail store, the technician should use a Configuration Management Database (CMDB).

    Network Applications and Services

    • To analyze attacks on a company's network, the network administrator must implement a Security Information and Event Management (SIEM) system.
    • To ensure successful hardening of firewalls at remote branches, the network engineer should next implement a vulnerability management process.

    Network Architecture

    • In a disaster recovery scenario with budget constraints, the company should select a Cold Site, which provides equipment ready but not live data mirrored.
    • To segment departments into different networks efficiently, the network administrator should configure VLANs in a campus network with users across multiple buildings.

    Network Cabling and Wiring

    • To prevent unintended connections, the technician should configure Port Security on a network switch in a publicly accessible location.
    • To detect the exact break point of a fiber link connecting two campus networks, the engineer should use an Optical Time-Domain Reflectometer (OTDR).

    Network Storage and Virtualization

    • To store data, hardware options, and scalability for companies that cannot afford new devices, the service that offers this is Cloud Storage.
    • To ensure a database engine listens on a specific port, the network administrator should use the(netstat -an | grep ) command.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on TCP ports used by Windows OS for file sharing and troubleshooting wireless AP coverage. Questions range from identifying TCP ports to troubleshooting poor connectivity in wireless networks.

    More Like This

    TCP and UDP Ports Flashcards
    22 questions
    Indirizzi IP e Porte TCP
    40 questions
    Use Quizgecko on...
    Browser
    Browser