A technician is trying to determine the IP address of a customer's router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer's router?
E. 255 255 255.0
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?
A. Decreased performance of internal network
B. Loss of full control over data resources
C. Increased malware exposure
D. Incompatibility with the current network
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?
A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?
A. Light sensors are interfering with the network
B. EMI from the lights is interfering with the network cables
C. Network wiring is run perpendicular to electrical conduit
D. Temperature changes are causing attenuation in copper cabling
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an
issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
A. Layer 2 switch
B. Layer 3 switch
D. Load balancer
A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server
that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure
the Linux server can reach the backup location?
An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of
the following is needed to protect BOTH the employee and the company?
A. An NDA ensuring work data stored on the personal phone remains confidential
B. An AUP covering how a personal phone may be used for work matters
C. A consent to monitoring policy covering company audits of the personal phone
D. Real-time remote monitoring of the phone's activity and usage
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A network administrator wants to ensure sensitive data is not infiltrated from the system electronically. Which of the following should be implemented
A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the
business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the
application. Which of the following would be the MOST cost effective for the administrator to recommend?
A. Create Ethernet VLANs
B. Disable autonegotiation on the servers
C. Install 10Gb Ethernet NICs in the servers
D. Install Fibre Channel for the server network
The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician
suspects the performance issues are network related Which of the following should the technician do to improve performance?
A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel
A customer cannot access a company's secure website. The company's network security is reviewing the firewall for the server and finds the following output:
Which of the following changes should be made to allow all customers to access the company's secure website?
A. Allow any any 10.5.0.10 443
B. Allow any any 18.104.22.168 443
C. Allow 10.5.0.10 443 any any
D. Allow 10.5.0.10 any 10.5.0.10 30
A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular
connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician
need to complete the installation?
A. LC to SC
B. SC to ST
C. LC to ST
D. ST to ST
E. SC to SC
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet
access going to individual tables. The contractor measured the distance between the hotel's patch panel to the jack, and the distance is within Cat 5e
specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following
actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A. Place a switch at the hotel's patch panel for connecting each room's cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there
A technician is investigating a server performance issue, The technician has gathered the server utilization statistics. Which of the following should the
technician use to determine which statistics are not in the normal range?
A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician
confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should
the technician use to reveal the location of the fault?
B. Light meter
C. Tone generator
A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which
of the following threats is MOST likely involved?
A. Smurf attack
B. Rogue AP
C. Compromised system
D. Unintentional DoS
A technician is connecting a router directiy to a PC using the G1 /0/1 interface. Without the use of auto-sensing ports, which of the following cables should be
A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following shouId the technician perform to ensure another
cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all access points
D. Use TACACS+ authentication
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager
notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems
involved in security incidents?
A. Enforce port security to require system authentication
B. Implement a standardized UNC
C. Label existing systems with current hostnames
D. Forward the DHCP logs to the security manager every day
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch
does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A. Damaged fiber
B. Corrupted operating system
C. VLAN mismatch
D. Bad port
In which of the following ways does a DDoS attack differ from a spoofing attack?
A. DDoS attacks target multiple networks
B. Spoofing attacks originate from a single host
C. DDoS attacks are launched from multiple hosts
D. Spoofing attacks require physical presence
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation.
No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department's router, but is not
able to ping the machine from the IT network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can
communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
B. Fibre Channel
A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the
following is an out-of-band method the technician would MOST likely utilize to check the branch office's router status?
A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site
An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
*WLAN architecture supporting speeds in excess of 150 Mbps
*Client less remote network access
*Port-based network access control
Which of the following solution sets properly addresses all of the identified requirements?
A. 802.11a, IPSec VPN, 802.1x
B. 802.11ac, MPLS, 802.3
C. 802.11b, PPTP,802.1x
D. 802.11g, MS-CHAP, 802.16
E. 802.11n, SSL-VPN, 802.1x