Networking 2
Networking 2
Networking 2
Networking 2
Networking 2
100

A network administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

A logical interface used for the routing of VLANs

100

A network administrator is performing a refresh of a wireless environment. As the APs are being placed, they overlap a little bit with each other. Which of the following 2.4GHz channels should be selected to ensure that they do not conflict?

1, 6, 11

100

Which of the following network cables involves bouncing light off of protective cladding?

Multimode

100

Which of the following would allow a network administrator to analyze attacks coming from the internet without affecting latency?

IDS 

100

A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user's laptop is lost. Which of the following frequency bands is the laptop most likely using?

2.4GHz

200

A network administrator needs to implement routing capabilities in a hypervisor. Which of the following should the administrator most likely implement?

NFV

200

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Toner

200

A network administrator received complaints of intermittent network connectivity issues. The administrator investigates and finds that the
network design contains potential loop scenarios. Which of the following should the administrator do?

Enable spanning tree.

200

Which of the following routing technologies uses a successor and a feasible successor?

EIGRP

200

Which of the following best describes what an organization would use port address translation for?

Non-routable address on the perimeter router

300

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage?

802.11ax

300

Which of the following network traffic types is sent to all nodes on the network?

Broadcast

300

Which of the following cable types provides the highest possible transmission speed?

Fiber-optic

300

Which of the following layers of the OSI model is responsible for end-to-end encryption?

Presentation

300

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Port mirroring

400

Which of the following does a full-tunnel VPN provide?

Corporate inspection of all network traffic

400

Which of the following does a hash provide?

Integrity

400

A company wants to implement a disaster recovery site for non-critical applications, which can tolerate a short period of downtime. Which of the following types of sites should the company implement to achieve this goal?

Warm

400

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as log-in information and attributes, to providers?

SAML

400

Which of the following routing technologies uses unequal cost load balancing and port 88?

EIGRP

500

A wireless network consultant is deploying a large number of WAPs and wants to centrally control them from one wireless LAN controller. Which of the following network types should the consultant employ?

Infrastructure

500

Which of the following network topologies involves sending all traffic through a single point?

Hub-and-spoke

500

Which of the following functions is used to prioritize network traffic based on the type of traffic?

QoS

500

Which of the following most likely determines the size of a rack for installation? (Choose two.)

Switch depth, Server height

500

A network administrator is planning to implement device monitoring to enhance network visibility. The security team requires that the solution provides authentication and encryption. Which of the following meets these requirements?

SNMPv3