Podcast
Questions and Answers
What standard should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
What standard should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
Which protocol would be BEST to use for detecting a MAC spoofing attack?
Which protocol would be BEST to use for detecting a MAC spoofing attack?
What tool should a technician use to troubleshoot high amounts of jitter in a wireless network with large variations in latency?
What tool should a technician use to troubleshoot high amounts of jitter in a wireless network with large variations in latency?
Which step will MOST likely determine the cause of intermittent internet connectivity issues reported by wireless users?
Which step will MOST likely determine the cause of intermittent internet connectivity issues reported by wireless users?
Signup and view all the answers
In the scenario described, what attack was the network administrator able to prevent?
In the scenario described, what attack was the network administrator able to prevent?
Signup and view all the answers
Where would a network administrator MOST likely start to troubleshoot when a network is experiencing CRC errors?
Where would a network administrator MOST likely start to troubleshoot when a network is experiencing CRC errors?
Signup and view all the answers
To resolve the issue of an exhausted DHCP scope without creating a new pool, what can the administrator do?
To resolve the issue of an exhausted DHCP scope without creating a new pool, what can the administrator do?
Signup and view all the answers
Which switch feature is MOST likely to be used for logging IPv6 and MAC addresses periodically?
Which switch feature is MOST likely to be used for logging IPv6 and MAC addresses periodically?
Signup and view all the answers
As an alias to another record, which DNS record should an administrator use?
As an alias to another record, which DNS record should an administrator use?
Signup and view all the answers
What should a technician utilize to gather metrics from a switch?
What should a technician utilize to gather metrics from a switch?
Signup and view all the answers
Why are critical events not being received by the syslog server?
Why are critical events not being received by the syslog server?
Signup and view all the answers
What is the best way to secure a new datacenter in a different region communicating with an old datacenter?
What is the best way to secure a new datacenter in a different region communicating with an old datacenter?
Signup and view all the answers
Which technology provides a failover mechanism for the default gateway?
Which technology provides a failover mechanism for the default gateway?
Signup and view all the answers
What action can an administrator take to easily mitigate users connecting to the guest wireless network for inappropriate downloads?
What action can an administrator take to easily mitigate users connecting to the guest wireless network for inappropriate downloads?
Signup and view all the answers
What is the term for attempting to find a network password by inputting common words and phrases?
What is the term for attempting to find a network password by inputting common words and phrases?
Signup and view all the answers
What would likely happen due to mismatched duplex settings on network devices?
What would likely happen due to mismatched duplex settings on network devices?
Signup and view all the answers
What is the BEST way to describe a network topology where all devices are connected to a central hub?
What is the BEST way to describe a network topology where all devices are connected to a central hub?
Signup and view all the answers
To prevent unauthorized modifications to a network, which document would be the MOST suitable to enforce version control and change management?
To prevent unauthorized modifications to a network, which document would be the MOST suitable to enforce version control and change management?
Signup and view all the answers
Which scenario is MOST likely to generate significant East-West traffic in a datacenter environment?
Which scenario is MOST likely to generate significant East-West traffic in a datacenter environment?
Signup and view all the answers
What should a technician check first when a network switch stops responding intermittently while in debugging mode?
What should a technician check first when a network switch stops responding intermittently while in debugging mode?
Signup and view all the answers
In a deployment with multiple WAPs broadcasting the same SSID for client access, what does this configuration represent?
In a deployment with multiple WAPs broadcasting the same SSID for client access, what does this configuration represent?
Signup and view all the answers
What needs to be configured for two networks to reach each other when getting 'U.U.U.U' response during a ping attempt?
What needs to be configured for two networks to reach each other when getting 'U.U.U.U' response during a ping attempt?
Signup and view all the answers
'Zero Trust' in network security primarily aims to:
'Zero Trust' in network security primarily aims to:
Signup and view all the answers
'PaaS' is a service model that would likely replace on-premises servers with cloud solutions. What does 'PaaS' stand for?
'PaaS' is a service model that would likely replace on-premises servers with cloud solutions. What does 'PaaS' stand for?
Signup and view all the answers
When evaluating a firewall for protecting east-west traffic in a datacenter, which traffic scenario is MOST relevant?
When evaluating a firewall for protecting east-west traffic in a datacenter, which traffic scenario is MOST relevant?
Signup and view all the answers
What can be used to prioritize Internet usage per application and user on a network?
What can be used to prioritize Internet usage per application and user on a network?
Signup and view all the answers
To query the NSs for a remote application, what command would be most useful for the network administrator?
To query the NSs for a remote application, what command would be most useful for the network administrator?
Signup and view all the answers
Which of the following technologies would be most suitable for optimizing speeds for global content distribution and reducing latency in high-density user locations?
Which of the following technologies would be most suitable for optimizing speeds for global content distribution and reducing latency in high-density user locations?
Signup and view all the answers
After making changes in the office, a user reports being unable to access network resources. What should a network technician do FIRST?
After making changes in the office, a user reports being unable to access network resources. What should a network technician do FIRST?
Signup and view all the answers
A new cabling certification is being requested everytime a network technician rebuilds one end of a Cat 6 cable to create a crossover connection between switches. Which feature would allow the use of the original cable for this purpose?
A new cabling certification is being requested everytime a network technician rebuilds one end of a Cat 6 cable to create a crossover connection between switches. Which feature would allow the use of the original cable for this purpose?
Signup and view all the answers
Which software tool would BEST help a technician find all devices connected within a network?
Which software tool would BEST help a technician find all devices connected within a network?
Signup and view all the answers
In configuring a high-density wireless network for maximum channel support, which standard 802.11 frequency range should a technician look for in WAP specifications?
In configuring a high-density wireless network for maximum channel support, which standard 802.11 frequency range should a technician look for in WAP specifications?
Signup and view all the answers
What should a technician configure on a network switch in a publicly accessible location to prevent unintended connections?
What should a technician configure on a network switch in a publicly accessible location to prevent unintended connections?
Signup and view all the answers
Which of the following is used to track and document various types of known vulnerabilities?
Which of the following is used to track and document various types of known vulnerabilities?
Signup and view all the answers
What does a network engineer need to configure on a server after setting up LACP on switchports to increase server bandwidth?
What does a network engineer need to configure on a server after setting up LACP on switchports to increase server bandwidth?
Signup and view all the answers
A network technician is configuring network settings for a new device with a network block of 192.168.0.0/20. What subnet should be used?
A network technician is configuring network settings for a new device with a network block of 192.168.0.0/20. What subnet should be used?
Signup and view all the answers
What is the LARGEST MTU for a standard Ethernet frame?
What is the LARGEST MTU for a standard Ethernet frame?
Signup and view all the answers
According to troubleshooting methodology, what should the technician do NEXT after determining the most likely probable cause of an issue?
According to troubleshooting methodology, what should the technician do NEXT after determining the most likely probable cause of an issue?
Signup and view all the answers
What type of device can provide content filtering, threat protection, and manage multiple IPSec site-to-site connections?
What type of device can provide content filtering, threat protection, and manage multiple IPSec site-to-site connections?
Signup and view all the answers
What is the most likely cause of late collisions on a half-duplex link with devices configured for half duplex?
What is the most likely cause of late collisions on a half-duplex link with devices configured for half duplex?
Signup and view all the answers
To ensure connectivity during a failover for two systems on a load balancer, what must the administrator configure?
To ensure connectivity during a failover for two systems on a load balancer, what must the administrator configure?
Signup and view all the answers
In a high-rise building with frequent network disconnections, what is the most likely cause of the issue with mounted APs?
In a high-rise building with frequent network disconnections, what is the most likely cause of the issue with mounted APs?
Signup and view all the answers
After configuring firewalls at remote branches, what should the network engineer do next to ensure successful hardening?
After configuring firewalls at remote branches, what should the network engineer do next to ensure successful hardening?
Signup and view all the answers
At which OSI model layer would a technician find an IP header?
At which OSI model layer would a technician find an IP header?
Signup and view all the answers
Which feature should be enabled to prevent network stability issues when configuring redundant network links between switches?
Which feature should be enabled to prevent network stability issues when configuring redundant network links between switches?
Signup and view all the answers
Which routing protocol is used to exchange route information between public autonomous systems?
Which routing protocol is used to exchange route information between public autonomous systems?
Signup and view all the answers
To detect the exact break point of a fiber link connecting two campus networks, what tool should an engineer use?
To detect the exact break point of a fiber link connecting two campus networks, what tool should an engineer use?
Signup and view all the answers
What can be used to centrally manage credentials for various administrative privileges on configured network devices?
What can be used to centrally manage credentials for various administrative privileges on configured network devices?
Signup and view all the answers
For installing new software on a Windows-based server in a different geographical location, what should a network technician use?
For installing new software on a Windows-based server in a different geographical location, what should a network technician use?
Signup and view all the answers
To improve videoconferencing performance for branch users, what should the company MOST likely configure?
To improve videoconferencing performance for branch users, what should the company MOST likely configure?
Signup and view all the answers
What should a network administrator check FIRST to address poor connectivity reported by users associated with a distanced AP?
What should a network administrator check FIRST to address poor connectivity reported by users associated with a distanced AP?
Signup and view all the answers
Which connector type would offer the MOST flexibility?
Which connector type would offer the MOST flexibility?
Signup and view all the answers
Which port is commonly used by VoIP phones?
Which port is commonly used by VoIP phones?
Signup and view all the answers
What is MOST likely to be affected by jitter greater than 10ms on a WAN connection?
What is MOST likely to be affected by jitter greater than 10ms on a WAN connection?
Signup and view all the answers
Which port should be blocked in the firewall configuration to prevent outside users from telnetting into servers at the datacenter?
Which port should be blocked in the firewall configuration to prevent outside users from telnetting into servers at the datacenter?
Signup and view all the answers
What command should a technician run to confirm server names for Linux servers in a company's server farm?
What command should a technician run to confirm server names for Linux servers in a company's server farm?
Signup and view all the answers
What is MOST likely causing extreme latency in a network with unmanaged Layer 2 switches and multiple connections between each pair?
What is MOST likely causing extreme latency in a network with unmanaged Layer 2 switches and multiple connections between each pair?
Signup and view all the answers
What should a technician use to record changes to new and old equipment in a major retail store?
What should a technician use to record changes to new and old equipment in a major retail store?
Signup and view all the answers
Which attack encrypts user data and requires a proper backup implementation for recovery?
Which attack encrypts user data and requires a proper backup implementation for recovery?
Signup and view all the answers
To analyze attacks on a company's network, what must a network administrator implement?
To analyze attacks on a company's network, what must a network administrator implement?
Signup and view all the answers
Which command should a network administrator use to ensure a database engine listens on a specific port?
Which command should a network administrator use to ensure a database engine listens on a specific port?
Signup and view all the answers
What feature would BEST allow a wireless network to provide Internet access while preventing stations from communicating with each other?
What feature would BEST allow a wireless network to provide Internet access while preventing stations from communicating with each other?
Signup and view all the answers
In a disaster recovery scenario with budget constraints, what concept should a company select if it needs equipment ready but not live data mirrored?
In a disaster recovery scenario with budget constraints, what concept should a company select if it needs equipment ready but not live data mirrored?
Signup and view all the answers
Which command-line tool should an IT technician use to locate a break in an uplink providing connectivity to the core switch?
Which command-line tool should an IT technician use to locate a break in an uplink providing connectivity to the core switch?
Signup and view all the answers
What should a technician do when link LEDs fail to light on the workstation and modem after verifying DSL synchronization?
What should a technician do when link LEDs fail to light on the workstation and modem after verifying DSL synchronization?
Signup and view all the answers
Which service offers data storage, hardware options, and scalability to companies that cannot afford new devices?
Which service offers data storage, hardware options, and scalability to companies that cannot afford new devices?
Signup and view all the answers
What document is likely needed to be signed before sharing project information with vendors?
What document is likely needed to be signed before sharing project information with vendors?
Signup and view all the answers
What is the BEST solution for securely connecting two remote offices over an untrustworthy MAN to access each other's network shares?
What is the BEST solution for securely connecting two remote offices over an untrustworthy MAN to access each other's network shares?
Signup and view all the answers
To segment departments into different networks efficiently, what should be configured in a campus network with users across multiple buildings?
To segment departments into different networks efficiently, what should be configured in a campus network with users across multiple buildings?
Signup and view all the answers
What tool should the systems administrator select to improve WiFi performance for a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
What tool should the systems administrator select to improve WiFi performance for a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
Signup and view all the answers
Which tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?
Which tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?
Signup and view all the answers
What should the network administrator do to determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?
What should the network administrator do to determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?
Signup and view all the answers
Which type of attack did the network administrator prevent when redirecting an unknown person to the security desk in the datacenter?
Which type of attack did the network administrator prevent when redirecting an unknown person to the security desk in the datacenter?
Signup and view all the answers
At which layer of the OSI model will the administrator MOST likely troubleshoot if a network is experiencing CRC errors?
At which layer of the OSI model will the administrator MOST likely troubleshoot if a network is experiencing CRC errors?
Signup and view all the answers
To resolve DHCP scope exhaustion without creating a new pool, what action can the administrator take?
To resolve DHCP scope exhaustion without creating a new pool, what action can the administrator take?
Signup and view all the answers
Which switch feature would the administrator MOST likely use to periodically log IPv6 and MAC addresses of devices on a network segment?
Which switch feature would the administrator MOST likely use to periodically log IPv6 and MAC addresses of devices on a network segment?
Signup and view all the answers
In a scenario where client devices cannot enter a network due to DHCP exhaustion, what could the administrator do to alleviate the issue?
In a scenario where client devices cannot enter a network due to DHCP exhaustion, what could the administrator do to alleviate the issue?
Signup and view all the answers
What should be configured on a switch in a publicly accessible location to prevent unintended connections?
What should be configured on a switch in a publicly accessible location to prevent unintended connections?
Signup and view all the answers
What should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
What should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?
Signup and view all the answers
What tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?
What tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?
Signup and view all the answers
What step would MOST likely determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?
What step would MOST likely determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?
Signup and view all the answers
What attack did the network administrator prevent by directing the unknown person following closely to the security desk in the datacenter?
What attack did the network administrator prevent by directing the unknown person following closely to the security desk in the datacenter?
Signup and view all the answers
In the given network scenario, how should the wireless signals be configured to avoid interference?
In the given network scenario, how should the wireless signals be configured to avoid interference?
Signup and view all the answers
What subnet capacity limitation should the network administrator set for the Access Points and switches in this scenario?
What subnet capacity limitation should the network administrator set for the Access Points and switches in this scenario?
Signup and view all the answers
Which encryption method should the Access Points be configured to support in order to meet the given requirements?
Which encryption method should the Access Points be configured to support in order to meet the given requirements?
Signup and view all the answers
At which layer of the OSI model will the network administrator MOST likely start troubleshooting if CRC errors occur?
At which layer of the OSI model will the network administrator MOST likely start troubleshooting if CRC errors occur?
Signup and view all the answers
Study Notes
Wireless Network Administration
- To improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices, the systems administrator should select the 802.11ac standard.
- To detect MAC spoofing attacks, the BEST protocol to use is DHCP snooping.
- To troubleshoot high amounts of jitter in a wireless network with large variations in latency, the technician should use the iperf tool.
Network Security
- The network administrator prevented a tailgating attack by directing an unknown person to the security desk in the datacenter.
- To mitigate users connecting to the guest wireless network for inappropriate downloads, the administrator can configure the network to require authentication and implement content filtering.
Network Fundamentals
- The BEST way to describe a network topology where all devices are connected to a central hub is a Star topology.
- To prevent unauthorized modifications to a network, the MOST suitable document to enforce version control and change management is a Change Management Policy.
Network Troubleshooting
- When a network switch stops responding intermittently while in debugging mode, the technician should check the switch's configuration and logs first.
- If CRC errors occur, the network administrator should start troubleshooting at the Data Link layer (Layer 2) of the OSI model.
Network Protocols and Technologies
- The 'PaaS' service model stands for Platform as a Service, which would likely replace on-premises servers with cloud solutions.
- To query the NSs for a remote application, the network administrator can use the dig command.
Network Design and Implementation
- To ensure connectivity during a failover for two systems on a load balancer, the administrator must configure a Floating IP address.
- In a high-rise building with frequent network disconnections, the most likely cause of the issue with mounted APs is interference.
Network Management
- To centrally manage credentials for various administrative privileges on configured network devices, the administrator can use a Privileged Access Management (PAM) system.
- To record changes to new and old equipment in a major retail store, the technician should use a Configuration Management Database (CMDB).
Network Applications and Services
- To analyze attacks on a company's network, the network administrator must implement a Security Information and Event Management (SIEM) system.
- To ensure successful hardening of firewalls at remote branches, the network engineer should next implement a vulnerability management process.
Network Architecture
- In a disaster recovery scenario with budget constraints, the company should select a Cold Site, which provides equipment ready but not live data mirrored.
- To segment departments into different networks efficiently, the network administrator should configure VLANs in a campus network with users across multiple buildings.
Network Cabling and Wiring
- To prevent unintended connections, the technician should configure Port Security on a network switch in a publicly accessible location.
- To detect the exact break point of a fiber link connecting two campus networks, the engineer should use an Optical Time-Domain Reflectometer (OTDR).
Network Storage and Virtualization
- To store data, hardware options, and scalability for companies that cannot afford new devices, the service that offers this is Cloud Storage.
- To ensure a database engine listens on a specific port, the network administrator should use the(netstat -an | grep ) command.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on TCP ports used by Windows OS for file sharing and troubleshooting wireless AP coverage. Questions range from identifying TCP ports to troubleshooting poor connectivity in wireless networks.