POST EXAM QUESTIONS.docx
Document Details

Uploaded by HeartfeltGermanium
Tags
Full Transcript
A network administrator will be running Ethernet cables through raised ceilings. Which of the following types of Ethernet cables is the safest solution? **Answer: Plenum** Which of the following should be implemented to allow remote users to access network resources while only redirecting necessar...
A network administrator will be running Ethernet cables through raised ceilings. Which of the following types of Ethernet cables is the safest solution? **Answer: Plenum** Which of the following should be implemented to allow remote users to access network resources while only redirecting necessary traffic? **Answer: Split-tunnel VPN** A public, wireless ISP mounts its access points on top of traffic signal poles. Fiber-optic cables are installed from a fiber switch through the ground and up the pole to a fiber-copper media converter and then connected to the AP. In one location, the switch port is showing sporadic link loss to the attached AP. A similar link loss is not seen at the AP interface. The fiber-optic cable is moved to another unused switch port with a similar result. Which of the following steps should the assigned technician complete NEXT? **Answer: Clean the fiber-optic cable ends.** Which of the following should be used to associate an IPV6 address with a domain name? **Answer: AAAA** Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue? **Answer: Verify the session time-out configuration on the captive portal settings** A company\'s management team wants to implement NAC on the wired and wireless networks. Which of the following is an authentication component that must be used in this solution? **Answer: 802.1X** During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report: Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client? **Answer: Temperature** Which of the following documents dictates the uptimes that were agreed upon by the involved parties? **Answer: SLA** A network consultant is installing a new wireless network with the following specifications: 5GHz 1,300Mbps 20/40/80MHz. Which of the following standards should the network consultant use? **Answer: 802.11ac** Which of the following fields are negotiated during the three-way handshake process? (Select three). **Answer: Sequence number, Window size, MSS** Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated significant network issues occur. Which of the following is the MOST likely cause for the WAN instability? **Answer: Asymmetrical routing** Which of the following most likely occurs when an attacker is between the target and a legitimate server? **Answer: On-path attack** A technician is troubleshooting servers with high CPU usage. While trying to connect, the technician needs to open a port for remote access. Which of the following ports should the technician open? **Answer: 5900** An ISP configured an internet connection to provide 20Mbps, but actual data rates are occurring at 10Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check? **Answer: Throughput** Which of the following is required for hosts to receive DHCP addresses from a server that is located on a different subnet? **Answer: DHCP relay** Staff members notify a network technician that the wireless network is not working as expected and connectivity to wireless devices is intermittent. Some devices connect but then disconnect. The technician reviews the logs on the WAP controller and identifies thousands of connection attempts from unrecognized devices within a short amount of time. Which of the following is the most likely reason for the wireless network connectivity issue? **Answer: Denial of service** Which of the following policies would be best to refer to when trying to prevent a disgruntled employee from copying sensitive materials off company servers after termination? **Answer: Offboarding** A customer is having issues accessing local resources on the network. A technician questions the user and discovers that a small switch had been taken out of storage and installed so that additional devices could be connected in the room. The technician runs the ping command from the PC to the network server and does not find any issues. However, data transfers to the server are slow, and the transfer appears to be locked up at times. Which of the following is the most likely cause of the issue? **Answer: Duplexing mismatch.** An attacker is using an unknown vulnerability that allows malicious actors to utilize the print spooler to gain system privileges on a computer. Which of the following is this scenario an example of? **Answer: Zero-day attack** A new computer that was connected to the network reported an error of an identical IP address with another computer. Both computers were configured for SLAAC. Which of the following is causing the error? **Answer: Duplicate MAC addresses** Which of the following can IOT devices most likely be connected to? **Answer: Router** A network administrator has been assigned to a team that is currently troubleshooting a large-scale outage. The network administrator makes some configuration changes to an on-premises router to see if the link comes up. Which of the following troubleshooting stages is described in this scenario? **Answer: Test the theory to determine the cause.** A user is having trouble uploading files to a server. However, other users in the department are not experiencing this issue. The network administrator checks the access switch and sees multiple CRC errors on that user\'s switch port. Which of the following should the network administrator do first? **Answer: Replace the user's network cable** A technician just validated a theory that resolved a network outage. The technician then verified that all users could access resources. Which of the following is the next step the technician should take in the network troubleshooting methodology? **Answer: Write the lessons learned.** Which of the following authentication protocols should be used when securing a basic wireless network? (Choose two.) **Answer: WPA2 & WPA** A network administrator is troubleshooting an issue on a newly configured college campus network. A Linux workstation can connect to the internet, but it fails to connect to the campus intranet, which is located on another campus. Which of the following commands should the administrator run next to troubleshoot the connection?\ **Answer: Traceroute** A company that replicated the production environment in a cloud environment is starting to use a load balancer to evenly distribute requests between both environments. Which of the scenario best describe? **Answer: High availability** A technician is troubleshooting network connectivity from a wall jack. Readings from a multimeter indicate extremely low ohmic values instead of the rated impedance from the switchport. Which of the following is the MOST likely cause of this issue? **Answer: Short circuit** Which of the following routing protocols uses bandwidth and delays as the primary metrics to calculate the best path? **Answer: EIGRP** A network administrator connects two unmanaged switches together with a straight-through Ethernet cable. The administrator reviews the connection and notices that the uplinks are not on. Which of the following options offers the best solution for the issue? **Answer: A crossover cable needs to be used** Which of the following is most closely associated with the management plane? **Answer: Current configuration** In a data center, data traffic that moves east-west is flowing between: **Answer: Top rack of switches.** Which of the following routing protocols uses attributes to select the best path? **Answer: BGP** Which of the following is the best way to remotely monitor who is accessing a secure data center? **Answer: Cameras** Which of the following attacks can be effectively protected against by using techniques to check if a connection was made by a human user? (Select two). **Answer: Phishing & Shoulder surfing** Users report they cannot reach any websites on the internet. An on-site network engineer is able to duplicate the issue on a different PC. The network engineer then tries to ping a website and receives the following message: *ping request could not find host www.google.com. Please check the name and try again.* Which of the following is the next step the engineer should take? **Answer: Ping internal name server functionality** Which of the following records is the main type in a reverse DNS lookup zone? **Answer: PTR** When a user makes a VoIP phone call and finishes speaking, the user experiences a delay in hearing a response. Which of the following should the network engineer check? **Answer: Latency** Which of the following can be used to identify users after an action has occurred? **Answer: Cameras** In which of the following locations is a VPN headend found? **Answer: WAN edge** A company\'s cloud model consists of the following. - An on-premise data center. - An Iaas cloud provider. - A private-direct connection from on-premises to Iaas. 42. Clients have reported slowness between a branch and a hub location. The senior engineer suspects asymmetrical routing is causing the issue. Which of the following should the engineer run on both the source and the destination network devices to validate this theory? **Answer: Traceroute** 43. The Chief Executive Officer of a company wants to ensure business operations are not disrupted in the event of a disaster. The solution must have fully redundant equipment, real-time synchronization, and zero data loss. Which of the following should be prepared? **Answer: Hot site** 44. A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information? **Answer:  Notifications** 45. A technician manages a DHCP scope but needs to allocate a portion of the scope\'s subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts? **Answer: Exclusion range** 46. Which of the following is most closely associated with attempting to actively prevent network intrusion? **Answer: IPS** 47. Which of the following is associated with the session layer of the OSI model? **Answer: Sockets** 48. Which of the following copper wire standards utilizes four pairs of wires to achieve Gigabit Ethernet speeds? **Answer: 1000BASE-T** 49. An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organizations requirements? **Answer: Cloud site** 50. A company just moved into a new office space, and a network technician has been hired to set up a wireless infrastructure. What would the proper first step be for the technician? **Answer:  Perform a site survey** 51. A user reports that the internet seems slow on a workstation, but no other users have reported any issues. The server team confirms the servers are functioning normally. A technician suspects something specific to the user\'s computer is overutilizing bandwidth. Which of the following commands should the technician use to further investigate the issue? **Answer: Netstat** 52. A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery? **Answer: Jumbo Frames** 53. A technician reviews a network performance report and finds a high level of collisions happening on the network. At which of the following layers of the OSI model would these collisions be found? **Answer: Layer 1** 54. A network technician is troubleshooting VoIP calls that have jumbled and distorted audio. The network technician analyzes the voice VLAN traffic and determines packets on the voice VLAN are being received out of order. Which of the following network metrics are causing the VoIP issues? **Answer: Jitter** 55. A network administrator notices excessive wireless traffic occurring on an access point after normal business hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit wireless access outside the building? **Answer: Change to a directional antenna.** 56. A technician is investigating an intermittent connectivity issue that occurs when specific WAPs are turned on. The technician checks into the issue further and finds the WAPs that are having issues share channel five. Which of the following is most likely causing the issue? **Answer: Interference** 57. A user is experimenting with audio transmissions and would like the transmissions to reach several specific devices simultaneously over the IP network. The user requests assistance from a network technician to configure the appropriate features within the SOHO. Which of the following should the technician configure to meet the requirements? **Answer: Multicast** 58. A company commissioned a site survey to check wireless network coverage. The technician noticed undesirable levels of RSSI in different areas of the office. Which of the following levels did the technician most likely notice? **Answer: -82dBm** 59. A network technician added a new workstation to the network and needs to make a custom, shielded cable that is 492ft (150m) with both ends wired to TIA/EIA-568A standards. The workstation is not establishing a link to the switchport. Which of the following is the cause of the issue? **Answer: Incorrect pinout** 60. A network security engineer is responding to a security incident. The engineer suspects that an attacker used an authorized administrator account to make configuration changes to the boundary firewall. Which of the following should the network security engineer review? **Answer: Audit logs** 61. A network engineer has added a new route on a border and is trying to determine of traffic is using the new route. Which of the following commands should the engineer use? **Answer: Tracert** 62. Which of the following is a physical topology in which all devices are connected to each other? **Answer: Mesh** 63. A network technician for a bank configured a WLAN that provides good coverage. Bank employees are now reporting Wi-Fi issues when the microwave in the lunch room area is used. Which of the following frequencies should the use to minimize interference? **Answer: 5GHz** 64. A technician is working on a ticket for a user in the human resources department who received a new PC that does not connect to the internet. All users in human resources can access the internet. The technician can ping the PC from the human resources router but not from the IT network. Which of the following is the most likely cause of the issue? **Answer: Incorrect default gateway** 65. A trusted vendor emailed a security advisory to an engineer. The advisory listed publicly disclosed security issues and resolutions for the vendor installed network devices. Which of the following describes this security concept? **Answer: CVE** 66. Which of the following most likely determines the size of a rack for installation? (Choose two.) **Answer: Switch depth & Server height** 67. Which of the following would most likely affect design considerations when building out an IDF? **Answer:  The cable transmission speeds** 68. A building was recently remodeled in order to expand the front lobby. Some mobile users have been unable to connect to the available network jacks within the new lobby, while others have had no issues. Which of the following is the most likely cause of the connectivity issues? **Answer: Port security** 69. In order to prepare for a fire or natural disaster, a Chief Executive Officer would like the network administrator to set up a site with no equipment. Which of the following should the network administrator set up? **Answer: A cold site** 70. A Chief Information Officer is concerned about environmental issues in the data center at corporate headquarters. Which of the following are the most common sensors installed in a data center? (Choose two.) **Answer: Humidity & Temperature** 71. Which of the following would allow a network administrator to analyze attacks coming from the internet without affecting latency? **Answer: IDS** 72. Which of the following routing technologies uses a successor and a feasible successor? **Answer: EIGRP** 73. A hacker used a packet sniffer on the network to capture the hardware address of the server. Which of the following types of attacks can the hacker perform now? **Answer: MAC Spoofing** 74. A network administrator is preparing new switches that will be deployed to support a network extension project. The lead network engineer has already provided documentation to ensure the switches are set up properly. Which of the following did the engineer most likely provide? **Answer: Baseline configurations** 75. A network administrator needs to implement a solution to mediate access to the internet. Which of the following should the administrator most likely implement? **Answer: Proxy** 76. Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified? **Answer: Establish a theory.** 77. A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue? **Answer: Devices\' duplex settings** 78. A network technician needs to determine which RJ45 jack in a patch panel corresponds to the RJ45 drop in the Chief Executive Officer\'s office. Which of the following tools would be best for the technician to use? **Answer: Tone Generator** 79. Which of the following is the DNS feature that controls how long a lookup is stored in cache on a server? **Answer: TTL** 80. Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup? **Answer: RPO** 81. Which of the following OSI model layers will ensure messages are transmitted to their destinations and no data is duplicated? **Answer: Transport** 82. A technician wants to assign addresses to PCs on a subnet that uses IPv4 and IPv6. The DHCP server only supports IPv4. Which of the following can the technician use to assign IPv6 addresses without DHCP? **Answer: SLAAC** 83. A network technician is troubleshooting an issue that involves connecting to a server via SSH. The server has one network interface that does not support subinterfaces. The technician runs a command on the server and receives the following output: \[image 1\] On the host, the technician runs another command and receives the following: \[image 2\] Which of the following best explains the issue? **Answer: The host does not have a route to the server.** 84. A user is trying to reach an internet destination. A systems administrator thinks that packets are being dropped in transit. Which of the following command-line tools would confirm if the packets are being dropped? **Answer: Traceroute** 85. A security engineer wants to provide a secure, dedicated, alternate access method into an IT network infrastructure to administer connected devices and IT assets. Which of the following is the engineer most likely to implement? **Answer: Out of band management** 86. A customer hired a network consultant to provide advice on the installation of new wireless access. The customer has several devices that operate in either the 5.0GHz range or the 2.4GHz range, and the best performance must be available. Which of the following standards should the technician suggest? **Answer: 802.11n** 87. Which of the following DNS records maps an alias to a true name? **Answer: CNAME** 88. A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use? **Answer: Port mirroring** 89. When internal users attempt to access the company website, they are redirected to an inappropriate website. Which of the following is this scenario an example of? **Answer: DNS Poisoning** 90. Which of the following are the most likely reasons voltage calculations are made before installing equipment? (Choose two.) **Answer: To ensure equipment is not damaged & To ensure compatibility.** 91. Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified? **Answer: Verify functionality** 92. A network technician is planning the infrastructure for a new data center that will support a 10GBASE-T network. Traffic in the data center is expected to be high, and data integrity is very important. Which of the following would the network technician most likely include in the plan? **Answer: Cat 6a STP** 93. A network administrator is planning to implement device monitoring to enhance network visibility. The security team requires that the solution provides authentication and encryption. Which of the following meets these requirements? **Answer: SNMPv3** 94. A network administrator needs to connect two network closets that are 492ft (150m) away from each other. Which of the following cable types should the administrator install between the closets? **Answer: Single-mode fiber** 95. Which of the following network types is composed of computers that can all communicate with one another with equal permissions and allows users to directly share what is on or attached to their computers? **Answer: Peer-to-peer network** 96. A network administrator is investigating a network connectivity issue. The administrator runs a command to view the status of the network cards. The administrator receives the following output:\ *RX packets:45332 errors: 45332 dropped:0 overruns 0 frame:0*\ Which of the following should the administrator troubleshoot based on the output?\ **Answer: Physical layer components** 97. A local company is planning to upgrade its current wireless network solution to achieve better performance and improve employees\' experience. The solution will require a 5GHz radio band to support all current company devices. Which of the following should be considered as an option for the upgrade? **Answer: 802.11n** 98. Which of the following is a hybrid routing protocol? **Answer: EIGRP** 99. Which of the following describes a situation in which an employee knowingly allows someone access to a restricted area without verifying authentication? **Answer: Piggybacking** - 100\. Users report that the network is slower than usual when accessing on-premises email. Which of the following should a network technician do to confirm the issue? **Answer: Compare the network baselines to the current network status.** - An IT intern moved the location of a WAP from one conference room to another. The WAP was unable to boot following the move. Which of the following should be used to fix the issue? **Answer: PoE injector** - A technician is configuring a wireless access point in a public space for guests to use. Which of the following should the technician configure so that only approved connections are allowed? **Answer: Captive portal** - A consultant is working with two international companies. The companies will be sharing cloud resources for a project. Which of the following documents would provide an agreement on how to utilize the resources? **Answer: MOU** - Which of the following is the most accurate NTP time source that is capable of being accessed across a network connection? **Answer: Stratum 1 device** - A user cannot connect to the network, although others in the office are unaffected. The network technician sees that the link lights on the NIC are not on. The technician needs to check which switchport the user is connected to, but the cabling is not labeled. Which of the following is the best way for the technician to find where the computer is connected? **Answer: Use a tone generator to trace the cable.** - Which of the following policies outlines the software and hardware requirements for using personally owned devices to conduct business? **Answer: BYOD** - A network technician is troubleshooting a port channel issue. When logging in to one of the switches, the technician sees the following information displayed:\ *Native VLAN mismatch detected on interface g0/1*\ Which of the following layers of the OSI model is most likely to be where the issue resides? **Answer:  Layer 2** - A network technician has identified a breach and is attempting to determine how the attacker connected to a device on the network. The technician uses tcpdump to perform a port scan and receives the following result: **Answer: The attacker used RDP** - A user is connecting a smartwatch to a smartphone for internet access. Which of the following network types is the user employing? **Answer: PAN** - An online gaming company needs a cloud solution that will allow for more virtual resources to be deployed when tournaments are held. The number of users who access the service increases during tournaments. The company also needs the resources to return to baseline levels once the resources are not needed in order to reduce cost. Which of the following cloud concepts would provide the best solution? **Answer:  Elasticity** - A network security engineer is investigating a potentially malicious insider on the network. The network security engineer would like to view all traffic coming from the user\'s PC to the switch without interrupting any traffic or having any downtime. Which of the following should the network security engineer do? **Answer: Enable port mirroring** - A company is implementing a secure remote access solution for multiple employees. Which of the following should the company use? **Answer: Client-to-site VPN** - A network engineer needs to change an entire subnet of SLAAC-configured workstation addresses. Which of the following methods would be the best for the engineer to use? **Answer: Change the address prefix in a router in order for the router to advertise the new prefix with an ND.** - A network administrator is configuring DCHP and wants to explicitly set an IP address based on a MAC address. Which of the following should the administrator use? **Answer: Reservation** - A network administrator is trying to create a subnet, which is the most efficient size possible, for 31 laptops. Which of the following network subnets would be best in this situation? **Answer: 10.10.10.0/27** - Users at a company will require more bandwidth on their wireless laptops because of a migration to the cloud. The company\'s current infrastructure contains four 802.11n access points, which are creating a bottleneck. Hardware upgrades are not an option. Which of the following configurations will provide a solution? **Answer: Channel bonding** - A systems administrator has two network switches that need to be cabled together via copper cabling. Neither of the switches support MDIX. Which of the following types of cables should the administrator use?**\ Answer: Straight** - Which part of the following OSI layers is IMCP a part of? **Answer: Layer 3 / Network** - A branch office is experiencing frequent power-related issues that are taking the network down daily. Which of the following would best address this network uptime issue? **Answer: UPS** - Which of the following is a major difference between a router and a layer 3 switch? **Answer: A Layer 3 switch can run more routing protocols than a router.** - Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network? **Answer: Layer 6** - Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? **Answer: Transport** - Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets than it can process at any given time? **Answer: Transport** - The fourth layer of the OSI model is called the: **Answer: Transport** - A network is experiencing a number of CRC errors during normal network communication. At which of the following OSI model will the administrator most likely start to troubleshoot? **Answer: Layer 2** - At which of the following OSI model layers would a technician find an IP header? **Answer: Layer 3** - Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated? **Answer: Session** - Which of the following is used to provide network capability for VMs at layer 2 of the OSI model? **Answer: VSwitch** - At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header? **Answer: Transport** - Which of the following OSI model layers contains the IP headers? **Answer: Network** - A system administrator wants to use the least amount of equipment to segment two departments that have cables terminating in the same room. Which of the following would allow this to occur? **Answer: A layer 3 switch** - Which of the following OSI model layers is where a technician would view UDP information? **Answer: Transport** - At which of the following OSI model layers does routing occur? **Answer: Network** - Which of the following devices have the capability to allow communication between two different subnetworks? **Answer: A layer 3 switch & a router** - At which of the following OSI model layers does an IMAP client run? **Answer: Layer 3** -