A network administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?
A logical interface used for the routing of VLANs
A network administrator is performing a refresh of a wireless environment. As the APs are being placed, they overlap a little bit with each other. Which of the following 2.4GHz channels should be selected to ensure that they do not conflict?
1, 6, 11
Which of the following network cables involves bouncing light off of protective cladding?
Multimode
Which of the following would allow a network administrator to analyze attacks coming from the internet without affecting latency?
IDS
A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user's laptop is lost. Which of the following frequency bands is the laptop most likely using?
2.4GHz
A network administrator needs to implement routing capabilities in a hypervisor. Which of the following should the administrator most likely implement?
NFV
A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?
Toner
A network administrator received complaints of intermittent network connectivity issues. The administrator investigates and finds that the
network design contains potential loop scenarios. Which of the following should the administrator do?
Enable spanning tree.
Which of the following routing technologies uses a successor and a feasible successor?
EIGRP
Which of the following best describes what an organization would use port address translation for?
Non-routable address on the perimeter router
A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage?
802.11ax
Which of the following network traffic types is sent to all nodes on the network?
Broadcast
Which of the following cable types provides the highest possible transmission speed?
Fiber-optic
Which of the following layers of the OSI model is responsible for end-to-end encryption?
Presentation
A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?
Port mirroring
Which of the following does a full-tunnel VPN provide?
Corporate inspection of all network traffic
Which of the following does a hash provide?
Integrity
A company wants to implement a disaster recovery site for non-critical applications, which can tolerate a short period of downtime. Which of the following types of sites should the company implement to achieve this goal?
Warm
Which of the following is an XML-based security concept that works by passing sensitive information about users, such as log-in information and attributes, to providers?
SAML
Which of the following routing technologies uses unequal cost load balancing and port 88?
EIGRP
A wireless network consultant is deploying a large number of WAPs and wants to centrally control them from one wireless LAN controller. Which of the following network types should the consultant employ?
Infrastructure
Which of the following network topologies involves sending all traffic through a single point?
Hub-and-spoke
Which of the following functions is used to prioritize network traffic based on the type of traffic?
QoS
Which of the following most likely determines the size of a rack for installation? (Choose two.)
Switch depth, Server height
A network administrator is planning to implement device monitoring to enhance network visibility. The security team requires that the solution provides authentication and encryption. Which of the following meets these requirements?
SNMPv3