Wifi
Scenario
Security
Routing
IP Address
100

A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?

a) a

b) ac

c) g

d) n

ac

100

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

A. Verify the session time-out configuration on the captive portal settings

B. Check for encryption protocol mismatch on the client's wireless settings

C. Confirm that a valid passphrase is being used during the web authentication

D. Investigate for a client's disassociation caused by an evil twin AP

Verify the session time-out configuration on the captive portal settings

100

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

A. Evil twin

B. Tailgating

C. Piggybacking

D. Shoulder surfing

Tailgating

100

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy server

C. Layer 2 switch

D. Smart hub

Layer 3 switch

100

Double Points

In an IP network, what does the subnet mask accomplish?

A. It determines the default gateway

B. It calculates the network for both the source host and destination host

C. It blocks certain IP addresses

D. It specifies the time server

It calculates the network for both the source host and destination host

200

Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?

A.802.11ac

B.802.11h

C.802.11n

D.802.1X

802.1X

200

What kind of issue can occur when an electromagnetic signal conducted on copper wires is in close proximity to another cable?

A.Attenuation

B.Warped signals

C.Crosstalk

D.Improper termination

Crosstalk

200

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

A. Configure ACLs.

B. Implement a captive portal.

C. Enable port security.

D. Disable unnecessary services.

Enable port security

200

Double Points

Which of the following statements about the Open Shortest Path First (OSPF) routing protocol is false?

A.OSPF is an interior gateway protocol.

B.OSPF is a link-state routing protocol.

C.OSPF does not support Classless Inter-Domain Routing (CIDR).

D.OSPF shares routes within an autonomous system.

OSPF does not support Classless Inter-Domain Routing (CIDR)

200

Which of the following correctly describes the range of private IP addresses for small networks as per RFC 1918?

A. 10.0.0.0 to 10.255.255.255

B. 172.16.0.0 to 172.31.255.255

C. 192.168.0.0 to 192.168.255.255

D. 254.254.0.0 to 254.254.255.255

192.168.0.0 to 192.168.255.255

300

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

A. 2.4GHz

B. 5GHz

C. 6GHz

D. 900MHz

5GHz

300

A new folder has been uploaded to the company’s intranet servers. It contains training videos larger than 1GB. The marketing and sales teams were encouraged to access it at 8 AM and participate in the training session. The server hosting the files is an old system with limited resources. At 8:05 AM, the network slows down, and many users complain about not seeing the resource on the network. Many have their video streams stuck. Which network component is the most likely cause of this problem?

A.The employees’ individual computers

B.The company’s external Internet connection

C.The router or switch managing internal traffic

D.The email server

The router or switch managing internal traffic

300

Double Points

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?

A. DHCP snooping

B. Geofencing

C. Port security

D. Secure SNMP

Port security

300

What is the significance of Generic Router Encapsulation (GRE) in connecting two offices separated by the Internet?

A. It prohibits the use of routing protocols

B. It enables privacy of data being tunneled through an internetwork

C. It discourages the use of GRE because it is a clear-text protocol

D. It allows a routing protocol such as Open Shortest Path First (OSPF) to work between the two offices

It allows a routing protocol such as Open Shortest Path First (OSPF) to work between the two offices

300

What is the purpose of Class E network IDs in IP addressing?

A. They are used for large networks.

B. They are used for multicasting purposes.

C. They are considered for experimental use only and were never used.

D. They are used for small networks.

They are considered for experimental use only and were never used

400

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

A. 802.11ac

B. 802.11ax

C. 802.11g

D. 802.11n

802.11ax

400

Double Points

You are troubleshooting a switch that has three computers connected to it. However, only two can communicate with each other. After confirming that the hardware is functioning properly, which of the following probable causes can be singled out for the third computer’s communication problem?

A.Incorrect VLAN assignment

B.The networking is experiencing a switching loop

C.The third computer is experiencing an MTU black hole

D.A virtual router is configured between the third and the other two computers

Incorrect VLAN assignment

400

You are responsible for the security of an organization’s server farm. You are considering server hardening procedures to ensure optimum security against major threat actors. Which of the following can be considered viable server-hardening techniques?

A.Installing additional memory

B.Disabling unnecessary services

C.Creating privileged user accounts

D.Enabling all TCP and UDP ports

Disabling unnecessary services

400

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?

A. The OSPF not-so-stubby area is misconfigured

B. Reduced wireless network coverage

C. Spanning tree ports in flooding mode

D. BGP routing issues

BGP routing issues

400

Which statement best describes the purpose of unique local addresses in IPv6?

A. These addresses are used for direct communications between two hosts.

B. Unique local addresses are used for internal routing and not intended for Internet routing.

C. These addresses are used for a one-to-nearest connectivity.

D. Unique local addresses are used in lieu of broadcasts in IPv6.

Unique local addresses are used for internal routing and not intended for Internet routing.

500

Double Points

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

A. NetFlow analyzer

B. Bandwidth analyzer

C. Protocol analyzer

D. Spectrum analyzer

Spectrum analyzer

500

ou have received reports that some employees are staying late in the office, using office resources to play networked computer games with each other after hours. After investigating the MAC address table on the main network switch, you suspect someone is connecting an unauthorized switch to the main switch’s Ethernet port. Which command should you use to secure and prevent employees from connecting external switches to the network?

A.Use the port-security command on the main switch

B.Use the port-security command on all the connected switches

C.Use the port-forward block command on the main switch

D.Use the dynamic port forwarding command on the main switch

Use the port-security command on the main switch

500

How does a network security list act as a virtual firewall?

A.By creating a ruleset to filter out malicious network traffic

B.By blocking all incoming and outgoing traffic according to a ruleset

C.By controlling all incoming and outgoing traffic based on what is allowed by the security list

D.By using rules to maneuver the virtual firewall

By controlling all incoming and outgoing traffic based on what is allowed by the security list

500

You are troubleshooting misconfigured routes on one of the routers. Which troubleshooting step saves a lot of time by narrowing the problem to a missing route?

A.Implement the solution or escalate.

B.Talk to the affected user about their problems when connecting to the problematic router.

C.Use the show routes command to view the routing table

D.Use the show ip route command to view the routing table

Use the show ip route command to view the routing table

500

Double Points

A corporate network user cannot access the Internet or communicate with devices outside their local subnet. They can, however, successfully connect to internal resources on the same subnet. Upon troubleshooting, you notice the following configuration: IP Address: 192.168.1.25 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.2.1 What is the most likely cause of this connectivity issue?

Incorrect IP address configuration

Incorrect subnet mask

Incorrect DNS settings

Incorrect default gateway

Incorrect default gateway

M
e
n
u