A network technician needs all nodes with IP addresses in the range of 192.168.0.3 through 192.168.0.240 to be in the same subnet. Which subnet mask will achieve this?
255.255.255.0
A customer shares a building with several other tenants. He has an unencrypted wireless network installed that has become increasingly slow. At the same time, his Internet traffic has steadily been increasing. What should be configured to fix both of these problems?
WAP
Your company has just experienced an attack that caused the Web site www.yourwebsite.com to go down. What term BEST describes this?
DoS attack
What Linux command is used to check or change the IP address settings of a network-interface card?
ifconfig
What document would you expect to find a privacy/consent-to-monitoring section?
Acceptable-use policy
Network technician Neo wants to install three different servers to reduce the chance of a single, insecure login. He wants to install a Linux-based e-mail server, a Microsoft Web server, and a directory services server. What technologies would BEST reduce hardware costs?
Virtual servers
Network administrator Marie manages one Linux and two Windows servers. She wants to be able to review all of the server logs centrally. What service could Lisa use in this scenario?
Syslog
What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select TWO.)
ACLs & Firewall
A computer user, Zaphod, is unable to log on to the domain from his desktop computer. A cable certifier is used to check his network cable and it shows a high value of NEXT. What is most likely the cause?
Crosstalk
What is a numbering system that represents values with ones and zeroes?
Binary
Class B network addresses have which default subnet mask?
255.255.0.0
A Windows server is experiencing problems after it boots. What should the technician immediately check?
System logs
Users must do their part to maintain network security. How can users know how to reduce risk factors?
Users should be trained in risk mitigation.
A new office's wireless network is causing interference with the medical office's wireless network located next door. What should be changed to BEST prevent the interference?
Signal strength
What is the maximum length of a 10Base2 Ethernet segment?
185 meters
A company is using VoIP phones. What network performance optimization method would Lars, a technician, use in this situation?
QoS
What is the benefit of using PoE+ (802.3at) over using PoE (802.3af)?
More power
This process watches for incoming IP address-assignment requests from unknown MAC addresses.
DHCP snooping
What type of user is most like to cause a DOS attack?
Malicious user
What document defines services, products, and time frames for support provided by a vendor?
Statement of work
Cliff is a network administrator who needs to add an additional connection to a room. He adds a new Ethernet switch and must now connect it to an existing switch. What type of cable should Cliff use to connect the two switches?
Crossover cable
When a switch does not know a path to a destination MAC address, it broadcasts an ARP request out of all of its ports. What is this process called?
Flooding
Two-factor authentication requires two different types of factors. What is an example of two-factor authentication?
Check card and PIN
There is a broadcast storm using much of the network bandwidth. Network technician Kelly needs to determine the MAC address of a device that is generating the storm. What tool will provide the needed information?
Network sniffer
What signaling category allows a single signal to exist on network media?
Baseband