A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
a) a
b) ac
c) g
d) n
ac
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
A. Verify the session time-out configuration on the captive portal settings
B. Check for encryption protocol mismatch on the client's wireless settings
C. Confirm that a valid passphrase is being used during the web authentication
D. Investigate for a client's disassociation caused by an evil twin AP
Verify the session time-out configuration on the captive portal settings
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A. Evil twin
B. Tailgating
C. Piggybacking
D. Shoulder surfing
Tailgating
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub
Layer 3 switch
Double Points
In an IP network, what does the subnet mask accomplish?
A. It determines the default gateway
B. It calculates the network for both the source host and destination host
C. It blocks certain IP addresses
D. It specifies the time server
It calculates the network for both the source host and destination host
Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?
A.802.11ac
B.802.11h
C.802.11n
D.802.1X
802.1X
What kind of issue can occur when an electromagnetic signal conducted on copper wires is in close proximity to another cable?
A.Attenuation
B.Warped signals
C.Crosstalk
D.Improper termination
Crosstalk
A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?
A. Configure ACLs.
B. Implement a captive portal.
C. Enable port security.
D. Disable unnecessary services.
Enable port security
Double Points
Which of the following statements about the Open Shortest Path First (OSPF) routing protocol is false?
A.OSPF is an interior gateway protocol.
B.OSPF is a link-state routing protocol.
C.OSPF does not support Classless Inter-Domain Routing (CIDR).
D.OSPF shares routes within an autonomous system.
OSPF does not support Classless Inter-Domain Routing (CIDR)
Which of the following correctly describes the range of private IP addresses for small networks as per RFC 1918?
A. 10.0.0.0 to 10.255.255.255
B. 172.16.0.0 to 172.31.255.255
C. 192.168.0.0 to 192.168.255.255
D. 254.254.0.0 to 254.254.255.255
192.168.0.0 to 192.168.255.255
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A. 2.4GHz
B. 5GHz
C. 6GHz
D. 900MHz
5GHz
A new folder has been uploaded to the company’s intranet servers. It contains training videos larger than 1GB. The marketing and sales teams were encouraged to access it at 8 AM and participate in the training session. The server hosting the files is an old system with limited resources. At 8:05 AM, the network slows down, and many users complain about not seeing the resource on the network. Many have their video streams stuck. Which network component is the most likely cause of this problem?
A.The employees’ individual computers
B.The company’s external Internet connection
C.The router or switch managing internal traffic
D.The email server
The router or switch managing internal traffic
Double Points
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
Port security
What is the significance of Generic Router Encapsulation (GRE) in connecting two offices separated by the Internet?
A. It prohibits the use of routing protocols
B. It enables privacy of data being tunneled through an internetwork
C. It discourages the use of GRE because it is a clear-text protocol
D. It allows a routing protocol such as Open Shortest Path First (OSPF) to work between the two offices
It allows a routing protocol such as Open Shortest Path First (OSPF) to work between the two offices
What is the purpose of Class E network IDs in IP addressing?
A. They are used for large networks.
B. They are used for multicasting purposes.
C. They are considered for experimental use only and were never used.
D. They are used for small networks.
They are considered for experimental use only and were never used
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
802.11ax
Double Points
You are troubleshooting a switch that has three computers connected to it. However, only two can communicate with each other. After confirming that the hardware is functioning properly, which of the following probable causes can be singled out for the third computer’s communication problem?
A.Incorrect VLAN assignment
B.The networking is experiencing a switching loop
C.The third computer is experiencing an MTU black hole
D.A virtual router is configured between the third and the other two computers
Incorrect VLAN assignment
You are responsible for the security of an organization’s server farm. You are considering server hardening procedures to ensure optimum security against major threat actors. Which of the following can be considered viable server-hardening techniques?
A.Installing additional memory
B.Disabling unnecessary services
C.Creating privileged user accounts
D.Enabling all TCP and UDP ports
Disabling unnecessary services
An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?
A. The OSPF not-so-stubby area is misconfigured
B. Reduced wireless network coverage
C. Spanning tree ports in flooding mode
D. BGP routing issues
BGP routing issues
Which statement best describes the purpose of unique local addresses in IPv6?
A. These addresses are used for direct communications between two hosts.
B. Unique local addresses are used for internal routing and not intended for Internet routing.
C. These addresses are used for a one-to-nearest connectivity.
D. Unique local addresses are used in lieu of broadcasts in IPv6.
Unique local addresses are used for internal routing and not intended for Internet routing.
Double Points
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
A. NetFlow analyzer
B. Bandwidth analyzer
C. Protocol analyzer
D. Spectrum analyzer
Spectrum analyzer
ou have received reports that some employees are staying late in the office, using office resources to play networked computer games with each other after hours. After investigating the MAC address table on the main network switch, you suspect someone is connecting an unauthorized switch to the main switch’s Ethernet port. Which command should you use to secure and prevent employees from connecting external switches to the network?
A.Use the port-security command on the main switch
B.Use the port-security command on all the connected switches
C.Use the port-forward block command on the main switch
D.Use the dynamic port forwarding command on the main switch
Use the port-security command on the main switch
How does a network security list act as a virtual firewall?
A.By creating a ruleset to filter out malicious network traffic
B.By blocking all incoming and outgoing traffic according to a ruleset
C.By controlling all incoming and outgoing traffic based on what is allowed by the security list
D.By using rules to maneuver the virtual firewall
By controlling all incoming and outgoing traffic based on what is allowed by the security list
You are troubleshooting misconfigured routes on one of the routers. Which troubleshooting step saves a lot of time by narrowing the problem to a missing route?
A.Implement the solution or escalate.
B.Talk to the affected user about their problems when connecting to the problematic router.
C.Use the show routes command to view the routing table
D.Use the show ip route command to view the routing table
Use the show ip route command to view the routing table
Double Points
A corporate network user cannot access the Internet or communicate with devices outside their local subnet. They can, however, successfully connect to internal resources on the same subnet. Upon troubleshooting, you notice the following configuration: IP Address: 192.168.1.25 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.2.1 What is the most likely cause of this connectivity issue?
Incorrect IP address configuration
Incorrect subnet mask
Incorrect DNS settings
Incorrect default gateway
Incorrect default gateway