SFP Questions on Windows TCP Ports and Wireless APs

BonnyDramaticIrony avatar
BonnyDramaticIrony
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What standard should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

802.11ax

Which protocol would be BEST to use for detecting a MAC spoofing attack?

Reverse Address Resolution Protocol

What tool should a technician use to troubleshoot high amounts of jitter in a wireless network with large variations in latency?

Spectrum analyzer

Which step will MOST likely determine the cause of intermittent internet connectivity issues reported by wireless users?

<p>Check the DHCP lease duration on the APs</p> Signup and view all the answers

In the scenario described, what attack was the network administrator able to prevent?

<p>Tailgating</p> Signup and view all the answers

Where would a network administrator MOST likely start to troubleshoot when a network is experiencing CRC errors?

<p>Layer 1</p> Signup and view all the answers

To resolve the issue of an exhausted DHCP scope without creating a new pool, what can the administrator do?

<p>Reduce the lease time</p> Signup and view all the answers

Which switch feature is MOST likely to be used for logging IPv6 and MAC addresses periodically?

<p>Neighbor Discovery Protocol</p> Signup and view all the answers

As an alias to another record, which DNS record should an administrator use?

<p>CNAME</p> Signup and view all the answers

What should a technician utilize to gather metrics from a switch?

<p>MIB</p> Signup and view all the answers

Why are critical events not being received by the syslog server?

<p>The network device is not configured to log that level to the syslog server</p> Signup and view all the answers

What is the best way to secure a new datacenter in a different region communicating with an old datacenter?

<p>Site-to-site VPN</p> Signup and view all the answers

Which technology provides a failover mechanism for the default gateway?

<p>FHRP</p> Signup and view all the answers

What action can an administrator take to easily mitigate users connecting to the guest wireless network for inappropriate downloads?

<p>Enable wireless client isolation</p> Signup and view all the answers

What is the term for attempting to find a network password by inputting common words and phrases?

<p>Dictionary attack</p> Signup and view all the answers

What would likely happen due to mismatched duplex settings on network devices?

<p>Increased CRC errors</p> Signup and view all the answers

What is the BEST way to describe a network topology where all devices are connected to a central hub?

<p>Star</p> Signup and view all the answers

To prevent unauthorized modifications to a network, which document would be the MOST suitable to enforce version control and change management?

<p>A change management policy</p> Signup and view all the answers

Which scenario is MOST likely to generate significant East-West traffic in a datacenter environment?

<p>Duplicating a hosted virtual server for redundancy</p> Signup and view all the answers

What should a technician check first when a network switch stops responding intermittently while in debugging mode?

<p>CPU utilization</p> Signup and view all the answers

In a deployment with multiple WAPs broadcasting the same SSID for client access, what does this configuration represent?

<p>Extended service set</p> Signup and view all the answers

What needs to be configured for two networks to reach each other when getting 'U.U.U.U' response during a ping attempt?

<p>Default gateway</p> Signup and view all the answers

'Zero Trust' in network security primarily aims to:

<p>Prevent lateral movement of attackers</p> Signup and view all the answers

'PaaS' is a service model that would likely replace on-premises servers with cloud solutions. What does 'PaaS' stand for?

<p>Platform as a Service</p> Signup and view all the answers

When evaluating a firewall for protecting east-west traffic in a datacenter, which traffic scenario is MOST relevant?

<p>Traffic between VMs on different hosts</p> Signup and view all the answers

What can be used to prioritize Internet usage per application and user on a network?

<p>Bandwidth management</p> Signup and view all the answers

To query the NSs for a remote application, what command would be most useful for the network administrator?

<p>dig</p> Signup and view all the answers

Which of the following technologies would be most suitable for optimizing speeds for global content distribution and reducing latency in high-density user locations?

<p>Content delivery network</p> Signup and view all the answers

After making changes in the office, a user reports being unable to access network resources. What should a network technician do FIRST?

<p>Ask what changes were made</p> Signup and view all the answers

A new cabling certification is being requested everytime a network technician rebuilds one end of a Cat 6 cable to create a crossover connection between switches. Which feature would allow the use of the original cable for this purpose?

<p>MDIX</p> Signup and view all the answers

Which software tool would BEST help a technician find all devices connected within a network?

<p>IP scanner</p> Signup and view all the answers

In configuring a high-density wireless network for maximum channel support, which standard 802.11 frequency range should a technician look for in WAP specifications?

<p>5GHz</p> Signup and view all the answers

What should a technician configure on a network switch in a publicly accessible location to prevent unintended connections?

<p>Port security</p> Signup and view all the answers

Which of the following is used to track and document various types of known vulnerabilities?

<p>CVE</p> Signup and view all the answers

What does a network engineer need to configure on a server after setting up LACP on switchports to increase server bandwidth?

<p>NIC teaming</p> Signup and view all the answers

A network technician is configuring network settings for a new device with a network block of 192.168.0.0/20. What subnet should be used?

<p>255.255.240.0</p> Signup and view all the answers

What is the LARGEST MTU for a standard Ethernet frame?

<p>1500</p> Signup and view all the answers

According to troubleshooting methodology, what should the technician do NEXT after determining the most likely probable cause of an issue?

<p>Implement the solution or escalate as necessary.</p> Signup and view all the answers

What type of device can provide content filtering, threat protection, and manage multiple IPSec site-to-site connections?

<p>VPN headend</p> Signup and view all the answers

What is the most likely cause of late collisions on a half-duplex link with devices configured for half duplex?

<p>The cable length is excessive</p> Signup and view all the answers

To ensure connectivity during a failover for two systems on a load balancer, what must the administrator configure?

<p>VIP</p> Signup and view all the answers

In a high-rise building with frequent network disconnections, what is the most likely cause of the issue with mounted APs?

<p>Channel overlap occurring</p> Signup and view all the answers

After configuring firewalls at remote branches, what should the network engineer do next to ensure successful hardening?

<p>Configure log settings to central syslog server</p> Signup and view all the answers

At which OSI model layer would a technician find an IP header?

<p>Layer 3</p> Signup and view all the answers

Which feature should be enabled to prevent network stability issues when configuring redundant network links between switches?

<p>STP</p> Signup and view all the answers

Which routing protocol is used to exchange route information between public autonomous systems?

<p>BGP</p> Signup and view all the answers

To detect the exact break point of a fiber link connecting two campus networks, what tool should an engineer use?

<p>OTDR</p> Signup and view all the answers

What can be used to centrally manage credentials for various administrative privileges on configured network devices?

<p>Zero Trust</p> Signup and view all the answers

For installing new software on a Windows-based server in a different geographical location, what should a network technician use?

<p>SSH</p> Signup and view all the answers

To improve videoconferencing performance for branch users, what should the company MOST likely configure?

<p>Quality of service</p> Signup and view all the answers

What should a network administrator check FIRST to address poor connectivity reported by users associated with a distanced AP?

<p>Validate the roaming settings on the APs and WLAN clients</p> Signup and view all the answers

Which connector type would offer the MOST flexibility?

<p>SFP</p> Signup and view all the answers

Which port is commonly used by VoIP phones?

<p>5060</p> Signup and view all the answers

What is MOST likely to be affected by jitter greater than 10ms on a WAN connection?

<p>An in-office video call with a coworker</p> Signup and view all the answers

Which port should be blocked in the firewall configuration to prevent outside users from telnetting into servers at the datacenter?

<p>23</p> Signup and view all the answers

What command should a technician run to confirm server names for Linux servers in a company's server farm?

<p>nslookup</p> Signup and view all the answers

What is MOST likely causing extreme latency in a network with unmanaged Layer 2 switches and multiple connections between each pair?

<p>A broadcast storm</p> Signup and view all the answers

What should a technician use to record changes to new and old equipment in a major retail store?

<p>Asset tags</p> Signup and view all the answers

Which attack encrypts user data and requires a proper backup implementation for recovery?

<p>Ransomware</p> Signup and view all the answers

To analyze attacks on a company's network, what must a network administrator implement?

<p>Network segmentation</p> Signup and view all the answers

Which command should a network administrator use to ensure a database engine listens on a specific port?

<p>netstat -a</p> Signup and view all the answers

What feature would BEST allow a wireless network to provide Internet access while preventing stations from communicating with each other?

<p>Wireless client isolation</p> Signup and view all the answers

In a disaster recovery scenario with budget constraints, what concept should a company select if it needs equipment ready but not live data mirrored?

<p>Cold site</p> Signup and view all the answers

Which command-line tool should an IT technician use to locate a break in an uplink providing connectivity to the core switch?

<p>show interface</p> Signup and view all the answers

What should a technician do when link LEDs fail to light on the workstation and modem after verifying DSL synchronization?

<p>Replace the cable connecting the modem and workstation</p> Signup and view all the answers

Which service offers data storage, hardware options, and scalability to companies that cannot afford new devices?

<p>IaaS</p> Signup and view all the answers

What document is likely needed to be signed before sharing project information with vendors?

<p>NDA</p> Signup and view all the answers

What is the BEST solution for securely connecting two remote offices over an untrustworthy MAN to access each other's network shares?

<p>Site-to-site VPN</p> Signup and view all the answers

To segment departments into different networks efficiently, what should be configured in a campus network with users across multiple buildings?

<p>Port tagging</p> Signup and view all the answers

What tool should the systems administrator select to improve WiFi performance for a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

<p>802.11ax</p> Signup and view all the answers

Which tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?

<p>PingPlotter</p> Signup and view all the answers

What should the network administrator do to determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?

<p>Investigate DHCP lease times</p> Signup and view all the answers

Which type of attack did the network administrator prevent when redirecting an unknown person to the security desk in the datacenter?

<p>Tailgating attack</p> Signup and view all the answers

At which layer of the OSI model will the administrator MOST likely troubleshoot if a network is experiencing CRC errors?

<p>Data link layer</p> Signup and view all the answers

To resolve DHCP scope exhaustion without creating a new pool, what action can the administrator take?

<p>Decrease the lease time for the DHCP clients</p> Signup and view all the answers

Which switch feature would the administrator MOST likely use to periodically log IPv6 and MAC addresses of devices on a network segment?

<p>Port mirroring</p> Signup and view all the answers

In a scenario where client devices cannot enter a network due to DHCP exhaustion, what could the administrator do to alleviate the issue?

<p>Implement IP address reservation</p> Signup and view all the answers

What should be configured on a switch in a publicly accessible location to prevent unintended connections?

<p>Access control lists</p> Signup and view all the answers

What should the systems administrator select to improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices?

<p>802.11ax</p> Signup and view all the answers

What tool should the technician use to troubleshoot high amounts of jitter in the wireless network with large variations in latency?

<p>Protocol Analyzer</p> Signup and view all the answers

What step would MOST likely determine the cause of intermittent internet connectivity where users need to reconnect using web authentication each time?

<p>Check for IP Address Conflicts</p> Signup and view all the answers

What attack did the network administrator prevent by directing the unknown person following closely to the security desk in the datacenter?

<p>Tailgating Attack</p> Signup and view all the answers

In the given network scenario, how should the wireless signals be configured to avoid interference?

<p>Different channels for each Access Point</p> Signup and view all the answers

What subnet capacity limitation should the network administrator set for the Access Points and switches in this scenario?

<p>30 devices maximum</p> Signup and view all the answers

Which encryption method should the Access Points be configured to support in order to meet the given requirements?

<p>TKIP</p> Signup and view all the answers

At which layer of the OSI model will the network administrator MOST likely start troubleshooting if CRC errors occur?

<p>Physical Layer (Layer 1)</p> Signup and view all the answers

Study Notes

Wireless Network Administration

  • To improve WiFi performance in a densely populated office tower with a mix of 2.4 GHz and 5 GHz devices, the systems administrator should select the 802.11ac standard.
  • To detect MAC spoofing attacks, the BEST protocol to use is DHCP snooping.
  • To troubleshoot high amounts of jitter in a wireless network with large variations in latency, the technician should use the iperf tool.

Network Security

  • The network administrator prevented a tailgating attack by directing an unknown person to the security desk in the datacenter.
  • To mitigate users connecting to the guest wireless network for inappropriate downloads, the administrator can configure the network to require authentication and implement content filtering.

Network Fundamentals

  • The BEST way to describe a network topology where all devices are connected to a central hub is a Star topology.
  • To prevent unauthorized modifications to a network, the MOST suitable document to enforce version control and change management is a Change Management Policy.

Network Troubleshooting

  • When a network switch stops responding intermittently while in debugging mode, the technician should check the switch's configuration and logs first.
  • If CRC errors occur, the network administrator should start troubleshooting at the Data Link layer (Layer 2) of the OSI model.

Network Protocols and Technologies

  • The 'PaaS' service model stands for Platform as a Service, which would likely replace on-premises servers with cloud solutions.
  • To query the NSs for a remote application, the network administrator can use the dig command.

Network Design and Implementation

  • To ensure connectivity during a failover for two systems on a load balancer, the administrator must configure a Floating IP address.
  • In a high-rise building with frequent network disconnections, the most likely cause of the issue with mounted APs is interference.

Network Management

  • To centrally manage credentials for various administrative privileges on configured network devices, the administrator can use a Privileged Access Management (PAM) system.
  • To record changes to new and old equipment in a major retail store, the technician should use a Configuration Management Database (CMDB).

Network Applications and Services

  • To analyze attacks on a company's network, the network administrator must implement a Security Information and Event Management (SIEM) system.
  • To ensure successful hardening of firewalls at remote branches, the network engineer should next implement a vulnerability management process.

Network Architecture

  • In a disaster recovery scenario with budget constraints, the company should select a Cold Site, which provides equipment ready but not live data mirrored.
  • To segment departments into different networks efficiently, the network administrator should configure VLANs in a campus network with users across multiple buildings.

Network Cabling and Wiring

  • To prevent unintended connections, the technician should configure Port Security on a network switch in a publicly accessible location.
  • To detect the exact break point of a fiber link connecting two campus networks, the engineer should use an Optical Time-Domain Reflectometer (OTDR).

Network Storage and Virtualization

  • To store data, hardware options, and scalability for companies that cannot afford new devices, the service that offers this is Cloud Storage.
  • To ensure a database engine listens on a specific port, the network administrator should use the(netstat -an | grep ) command.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser