Network + Practice Exam – Flashcards

Unlock all answers in this set

Unlock answers
question
which of the following protocols is used by voip to set up maintain and terminate a phone call
answer
SIP
question
consider the 850 nm multimode fiber optic cable shown below how much loss can you expect between the transmitter and receiver
answer
-1.2db
question
the immediate preservation of evidence is paramount when conducting a forensic analysis which of the following actions is most likely to destroy critical evidence
answer
Rebooting the system
question
which of the following best describes the condition where a signal sent on one wire is received on another wire within the same connector
answer
NEXT.
question
on which layer of the osi does the hub operate
answer
1 or physical
question
how many total channels are available for 802.11a wireless networks
answer
23
question
you want to use cctv as a preventative security measure which of the following is a requirement for your plan
answer
Security guards.
question
Examin the following output Active connections Proto Local address foreign address state tcp server1:1036 localhost:4832 Time_wait which of the following utilites produced this output
answer
netstat
question
Arrange the computer components listed on the left in order of decreasing volatility on the right
answer
Cpu registers system ram paging file hard disk file system backup
question
you want to use cctv as a preventative security measure which of the following is a requirement for you plan
answer
Security guards
question
you are troubleshooting a wireless connectivity issue in a small office you determine that 2.4Ghz cordless phones used in the office are interfering with the wireless network transmissions if the cordless phones are causing the interference which of the following wireless standards could the network be using
answer
802.11b Bluetooth
question
you are a wireless network administrator for your organization as the size of the organization has grown you've decided to upgrade your wireless network to use 802.1x authentication instead of preshared keys
answer
he system is vulnerable because LEAP is susceptible to dictionary attacks
question
to do this you need to configure a radius server and radius clients you want the server and the client to mutually authenticate with each other
answer
Configure the RADIUS server with a server certificate and Configure all wireless access points with client certificates.
question
in a virtualization what is the role of the hypervisor
answer
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
question
when a wired or wireless host tries to connect to the network a nac agent on the host checks it to make sure it has all of the latest OS updates installed and that the latest antivirus definitions have been appliedto
answer
Posture assesment
question
which of the following are tools used to check the health of your network? which of these is typically used for managing and sending messages from one computer to another
answer
Syslog
question
which of the following are improvement to snmp that are included within snmp version 3
answer
Authentication for agents and managers, Encryption of SNMP messages
question
you have a network that occupies all three floors of a building the wan service into the building in a wiring closet on the main floor you have a second wiring closet on the main floor, you need to connect the two wiring closets which of the following are typically used a network utilizes a network access control solution to protect against malware connect the two wiring closets
answer
A 25 pair C Horizontal cross connect
question
which of the following physical topologies are used with Ethernet networks
answer
Bus Star
question
you have a web server on your network that hosts the public website for your company you want to make sure that the website will continue to be available even if a nic harddrive or other problem prevents the server from responding
answer
Load balancing.
question
you are in the habit of regularly monitoring performance statistics for your devices you find that this month a specific server has averaged a higher number of active connections than last month which document should you update to reflect the change
answer
Baseline.
question
you have just been hired as a network administrator a user has just changed offices and needs you to activate the network and telephone connections in his office however the wiring at the punch down block is labeled poorly and you are unable to tell which wires go to user's office
answer
Use a tone generator to locate the correct wiring.
question
you are responsible for implementing network cabling in a new network installation the cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference which type of cabling would operate best in this environment
answer
Shielded twisted pair cable Fiber-optic cable
question
you are designing a wirless network for a client your client needs the network to support a data rate of at least 54mbps in addition, the client already has a wireless telephone system installed that operates 2.4Ghz which 802.11 standard will work best in this situation
answer
802.11a
question
arrange the steps in the change and configuration management process on the left in the correct order in which they should be completed on the right
answer
identify the need for change conduct a feasibility analysis define the procedure notify the affected parties implement the change test the implementation document the change
question
you are troubleshooting physical layer issues with fi0/1 interface in a router. you need to view and analyze the number of collisions detected on the interface
answer
show interfaces fi0/1
question
a frantic user calls you one morning exclaimining that nothing is working what should you do next
answer
Establish the symptoms.
question
you recently installed a new windows 2012 system to ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet
answer
123
question
a user reports that network access from her workstation is very slow the problem does not seem to be affecting any other users
answer
Duplex mismatch.
question
which of the following is the strongest form of multi-factor authentication
answer
A password, a biometric scan, and a token device
question
you manage a network with a single switch on each switch port a hub connects multiple devices to the switch which condition are you most likely to experience on the network
answer
Collisions
question
which of the following are characteristic of mpls
answer
Supports variable-length data units. Adds labels to data units.
question
you are concerned with the amount of traffic that passed through a router on your network you want to see how the amount of traffic has changed over time which document
answer
Baseline.
question
Arrange the GPOs Group policy objects int he order in which they are applied
answer
1. The Local Group Policy on the computer. 2. GPOs linked to the domain that contains the user or computer object. 3. GPOs linked to the organizational unit that contains the object.
question
you manage a single subnet with three switches the switches are connected to provide redundanct paths between the switches which feature prevents switching loops and ensures there is only a single active path between two switches
answer
Spanning tree.
question
you are configuring the dhcp relay agent role service on a windows server which of the following is required step for the configuration
answer
Specify which server network interface the agent listens on for DHCP messages.
question
you just connected 4 new computer systems to an Ethernet switch using spare patch cables after the installation only three systems are able to access the network you verify all client network setting
answer
Failed patch cable.
question
you would like to find a solution so that static web content can be offloaded to a different server while the web server continues to process dynamic data
answer
proxy
question
which of the following is the best recommendation for applying hot fixes to your server?
answer
Apply only the hotfixes that apply to software running on your systems
question
you are troubleshooting a connectivity problem on a Linux server you are able to connect to another system on the local network but are not able to connect to a server on a remote network
answer
ifconfig
question
You are troubleshooting physical layer issues with the G0/1 interface on a router. You suspect a duplex mismatch error has occurred and need to determine the duplex settings configured on the interface. Which commands should you use?
answer
show interfaces gi0/1 show interfaces gi0/1 status
question
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration
answer
a unmanaged switch and cat5e cabling
question
a user reports that she can't connect to a server on your network you check the problem and find out that all users are having the same problem
answer
Determine what has changed.
question
what purposes does a wireless site survey serve
answer
To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.
question
You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have?
answer
client server
question
which firewall implementation creates a buffer network that can be used to host email or web servers
answer
dmz
question
which type of polish grade uses green colored connectors to help prevent using the wrong connector type
answer
Angle physical
question
which of the following are differences between radius and tacacs+
answer
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
question
You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?
answer
Enable spanning tree on the switches.
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
answer
Host based firewall
question
which media type can backup files be saved to?
answer
Tape Drive NAS
question
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?
answer
Use a different Channel ID.
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquistion (SCADA) devices are used on the manfucaturing floor to manager your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
answer
Install the latest firmware updates from the device manufacturer Verify that your network's existing security infrastrucutre is working properly.
question
Which of the following best describes the purpose of using subnets?
answer
Subnets divide an IP network multiple newirk addresses
question
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk for your network and want to strengthen their security profile as much as possible. Which actions should you take?
answer
Enable device encryption Implement storage segmentation
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
transformer
question
Which method can be used to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
answer
Photographs
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New