Which splash screen is a webpage presented when you connect to a public network as a guest, prompting for a username/password and terms of service that you must agree to before proceeding with the Internet connection?
A.Captive portal
B.Splash portal
C.Welcome page
D.CAPWAP portal
A.Captive portal
Which wireless AP mode provides more coverage than a single access point, allowing mobile wireless clients to roam freely within the same network?
A.Basic Service Set Identifier (BSSID)
B.Extended Service Set Identifier (ESSID)
C.Multiple Service Set Identifier (MSSID)
D.Thin access points
B.Extended Service Set Identifier (ESSID)
How does Spanning Tree Protocol (STP) stop network loops from occurring on a Layer 2 network that includes bridges or switches?
A.It finds all links by monitoring the network and stops any loops by shutting down redundant ones.
B.It creates Bridge Protocol Data Units (BPDUs) to stop network loops during an active Layer 2 data transfer session.
C.Frames are forwarded on regular STP-picked links and are destroyed if they contain redundant loops.
D.Frames are forwarded on premium STP-picked links and are destroyed if they contain redundant loops.
A.It finds all links by monitoring the network and stops any loops by shutting down redundant ones.
Joe is configuring vLAN on a Gigabit Ethernet interface. The physical interface is divided into multiple interfaces, with one subnet assigned per vLAN. Each subinterface is the default gateway address for each vLAN/subnet. What must be assigned to each interface to define the VLAN ID of that subinterface?
A.Inter-VLAN routing
B.Encapsulation identifier
C.Switched virtual interface
D.802.1Q trunking configuration
B.Encapsulation identifier
A first-hop redundancy protocol (FHRP) is designed to dynamically alter which of the following Internet Protocol (IP) configuration settings on a network host?
A.IP address
B.Subnet mask
C.Default gateway
D.DNS server address
C.Default gateway
Which wireless technology uses low-energy radio waves at sub-GHz frequencies to initiate communication between smart appliances, such as a remote garage door opener?
A.Near-field Communications (NFC)
B.Radio Frequency Identification (RFID)
C.Z-Wave
D.Infrared
C.Z-Wave
Which wireless network technology allows antennas to be spread over a multitude of independent access points without directly affecting the data rates?
A.Multiple Input, Multiple Output (MIMO)
B.Quadrature Amplitude Modulation (QAM)
C.Multiuser Multiple-Input, Multiple-Output (MU-MIMO)
D.Orthogonal Frequency-Division Multiple Access (OFDMA)
C.Multiuser Multiple-Input, Multiple-Output (MU-MIMO)
Which of the following is a protocol that identifies VLANs by inserting a 32-bit field in the Ethernet frame?
A.IEEE 802.1P
B.EEE 802.1Q
C.IEEE 802.1X
D.IEEE 802.1AB
B.EEE 802.1Q
What happens when a public IP address is substituted for the private IP address assigned to the device’s network interface?
A.A virtual IP address is assigned.
B.A private IP address is created.
C.A public IP address is converted into IPv6.
D.A private IP address is converted into IPv6.
A.A virtual IP address is assigned.
Joe is configuring a network router. The router has a static route, a RIP-advertised route, and an EIGRP-advertised route listing the same network. Which route will be used by default unless he changes the AD to that route?
A.EIGRP-advertised route
B.RIP-advertised route
C.BGP route
D.Static route
D.Static route
Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?
A.802.11ac
B.802.11h
C.802.11n
D.802.1X
D.802.1X
How does rate shifting allow access points to support multiple clients at varying speeds depending on each client’s location?
A.Rate limiting
B.Collision avoidance
C.Request to send/Clear to send (RTS/CTS)
D.Transmission-by-transmission
D.Transmission-by-transmission
On a network carrying both voice and data traffic, separate virtual local area networks (VLANs) enable the voice traffic to be assigned a higher priority than the data traffic. Which of the following are methods for identifying the packets carrying voice traffic so the switches can assign them to the voice VLAN?
A.MAC addresses
B.VLAN tags
C.IP addresses
D.DNS names
B.VLAN tags
Which of the following statements about the Open Shortest Path First (OSPF) routing protocol is false?
A.OSPF is an interior gateway protocol.
B.OSPF is a link-state routing protocol.
C.OSPF does not support Classless Inter-Domain Routing (CIDR).
D.OSPF shares routes within an autonomous system.
C.OSPF does not support Classless Inter-Domain Routing (CIDR).
Joe has an old router running RIP. Since the network has been upgraded to EIGRP, he needs the old router to connect to the network. How can he translate the RIP routes into EIGRP?
A.Run RIP to EIGRP converter.
B.Run BGP for the hybrid routing protocol.
C.Run route redistribution on one router.
D.Run router redistribution by installing sub-interfaces.
C.Run route redistribution on one router.
Andy has been hired to design the network between two buildings 2000 feet apart. The client requires high-bandwidth network cables that transfer data at high speeds while providing high-level resistance to electromagnetic interference (EMI). The solution should be easy to install and economical. Which cable type meets the client’s needs?
A.Multimode fiber optic cable
B.Singlemode fiber optic cable
C.Thin coaxial cable
D.Augmented Ethernet cable
A.Multimode fiber optic cable
Which of the following is NOT one of the advantages of infrastructure as code (IaC) deployment for cloud-based virtual machines?
A.IaC provides rapid deployment of playbooks containing virtual machine configurations.
B.IaC provides configuration drift protection for virtual machines.
C.IaC provides cost savings by automating the virtual machine configuration process.
D.IaC provides increased security by encrypting the virtual machine configuration
D.IaC provides increased security by encrypting the virtual machine configuration
Which approach to orchestrating automation tasks involves listing all the steps to get to the desired state of automation?
A.Declarative
B.Imperative
C.Comparative drift
D.Dynamic progression
B.Imperative
Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?
A.EUI-64
B.SLAAC
C.APIPAv6
D.DHCPv6
B.SLAAC
Which source control type identifies and resolves code conflicts when they occur?
A.Version control
B.Branching
C.Central repository
D.Conflict identification
A.Version control
Which transceiver interfaces networking hardware to a fiber-optic cable or active/passive electrical copper connection, allowing a 4×10 Gbit/s link?
A.SFP+
B.QSFP
C.QSFP+
D.QSFP28
C.QSFP+
Which software-defined networking system allows users to configure and remotely deploy multiple network devices without needing to access each device individually?
A.Zero-touch provisioning
B.Transport agnostic
C.Application-aware provisioning
D.Central policy provisioning
A.Zero-touch provisioning
Which of the following are reasons why an overlay network using a virtual extensible LAN (VXLAN) might be preferable to one using VLANs? (Choose all that apply.)
A.VXLANs can be used for Data Center Interconnect (DCI).
B.VXLANs use a 24-bit network identifier.
C.VXLANs run as an overlay network.
D.VXLANs encapsulate Layer 2 frames within TCP segments.
A.VXLANs can be used for Data Center Interconnect (DCI).
B.VXLANs use a 24-bit network identifier.
C.VXLANs run as an overlay network.
Joe is configuring a storage area network for iSCSI storage. The Ethernet frame size is 1500. When he tests the network, he finds it sluggish when fetching data from iSCSI storage. Which configuration change can be implemented to resolve the network speed issue for iSCSI storage?
A.Change the Ethernet frame size to 9000
B.Change the Ethernet frame size to 3000
C.Decrease latency rates for the Ethernet adapter
D.Install the latest Ethernet card
A.Change the Ethernet frame size to 9000
How does the Spanning Tree Protocol (STP) cause issues with Layer 2 communication in the Layer 2 encapsulation process?
A.By blocking potential delivery paths to prevent switching loops
B.By transferring VXLAN packets through the underlying Layer 3 network headers
C.By using Layer 3 routing and link aggregation protocols
D.By extending Layer 2 interconnects over the underlying network infrastructure
A.By blocking potential delivery paths to prevent switching loops