An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
Implementing enterprise authentication
A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After
the technician connects the fiber patch cable, the indicator light does not tum on. Which of the following should a technician try first to troubleshoot this issue?
Reverse the fibers.
After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?
Inspect the connectors for any wires that are touching or exposed.
A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?
tracert
After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following
steps should the architect take to troubleshoot the issue?
Check to see if the end connections were wrapped in copper tape before terminating.
A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer is concerned that the network might not be able to handle the traffic if the traffic reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?
A VLAN with 100Mbps speed limits
A virtual machine has the following configuration:
IPv4 address: 169.254.10.10 -
Subnet mask: 255.255.0.0 -
The virtual machine can reach collocated systems but cannot reach external addresses on the internet. Which of the following is most likely the root cause?
The DHCP server is offline.
Which of the following is used to estimate the average life span of a device?
MTBF
Which of the following is the most secure way to provide site-to-site connectivity?
IPSec
A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?
SC
A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?
802.1Q tagging
A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?
802.1X
Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?
Direct Connect
A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?
netstat
Which of the following devices can operate in multiple layers of the OSI model?
Switch
Before using a guest network, an administrator requires users to accept the terms of use. Which of the following is the best way to accomplish this goal?
Captive portal
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
Port mirroring
Which of the following most likely requires the use of subinterfaces?
A router with only one available LAN port
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
Content filtering
Which of the following requires network devices to be managed using a different set of IP addresses?
Out of band
A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?
Administrative distance
Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
Duplicate the problem.
A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?
32768
A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?
Roaming between access points
A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?
/30