1) Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified? a) Establish a theory. b) Create a plan of action. c) Document outcomes. d) Verify functionality. 2) A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up? a) A separate scope for the file server using a /32 subnet b) A static IP address within the DHCP IP range c) A reservation for the server based on the MAC address d) A SLAAC for the server 3) A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process? a) Captive portal b) Ad hoc network c) Enterprise authentication d) WPA3 4) A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement? a) Multitenancy b) SaaS c) VPC d) NFV 5) Which of the following ports is used for secure email? a) 25 b) 143 c) 110 d) 587 6) A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use the latest standard. There is a mix of devices that use 2.4 and 5Ghz. Which of the following should the systems admin. select to meet this requirement? 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement? a) 802.11ax b) 802.11ac 7) Which of the following would be BEST to use to detect a MAC spoofing attack? a) Internet Control Message Protocol b) Dynamic Host Configuration Protocol c) Reverse Address Resolution Protocol d) Internet Message Access Protocol 8) A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue? a) NetFlow analyzer b) Spectrum analyzer c) Bandwidth analyzer d) Protocol analyzer 9) Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue? a) Check for encryption protocol mismatch on the client's wireless settings b) Investigate for a client's disassociation caused by an evil twin AP c) Confirm that a valid passphrase is being used during the web authentication d) Verify the session time-out configuration on the captive portal settings 10) A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent? a) Piggybacking b) Tailgating c) Evil twin d) Shoulder surfing 11) Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the admin perform to resolve the issue? a) Install load balancers b) Reduce the lease time c) Install more switches d) Decrease the number of VLANs 12) Which of the following DNS records works as an alias to another record? a) AAAA b) CNAME c) MX d) SOA 13) A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue? a) Correct the DNS server entries in the DHCP scope b) Correct the NTP server settings on the clients c) Correct the external firewall gateway address d) Correct a TFTP Issue on the company's server 14) A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port? a) IP route table b) QoS tag c) MAC table d) VLAN tag 15) Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch? a) NIC teaming b) RAID array c) Load balancer d) PDUs 16) An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization's requirements? a) Load balancing b) Content delivery network c) Public cloud d) Infrastructure as a service 17) A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST? a) Check the system's IP address b) Ask what changes were made c) Do a ping test against the servers d) Reseat the cables into the back of the PC 18) A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable? a) CSMA/CD b) MDIX c) PoE+ d) LACP 19) A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task? a) NetFlow analyzer b) Terminal emulator c) Port scanner d) IP scanner 20) A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications? a) 6GHz b) 5GHz c) 2.4GHz d) 900MHz 21) A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections? a) DHCP snooping b) Secure SNMP c) Geofencing d) Port security 22) Which of the following is used to track and document various types of known vulnerabilities? a) SIEM b) Penetration testing c) Least privilege d) CVE 23) A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use? a) 255.255.128.0 b) 255.255.240.0 c) 255.255.192.0 d) 255.255.248.0 24) Which of the following is the LARGEST MTU for a standard Ethernet frame? a) 1452 b) 1492 c) 2304 d) 1500 25) Which of the following command-line tools would generate this output? a) netstat b) arp c) dig d) tracert 26) According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue? a) Establish a plan of action to resolve the issue and identify potential effects b) Test the theory to determine the cause c) Verify full system functionality and, if applicable, implement preventive measures d) Implement the solution or escalate as necessary 27) Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network? a) Firewall b) IDS c) AP d) Proxy server 28) A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP? a) Single-mode fiber b) Coaxial c) Cat 6e d) Multimode fiber 29) An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe? a) A hot site b) Data mirroring c) A warm site d) Load balancing 30) A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue? a) Audit logs b) CRC errors c) CPU utilization d) Jitter 31) A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment? a) Basic service set b) Extended service set c) Unified service set d) Independent basic service set 32) A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other? a) Network address translation b) Loopback c) Default gateway d) Routing protocol 33) Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution? a) PaaS b) Disaster recovery as a Service (DRaaS) c) SaaS d) IaaS 34) A network administrator is implementing OSPF on all of a company's network devices. Which of the following will MOST likely replace all the company's hubs? a) A Layer 3 switch b) A NGFW c) A proxy server d) A WLAN controller 35) Which network device operates at Layer 3? a) Router b) Hub c) Repeater d) Bridge 36) Which of the following IEEE specifications describes the use of network authentication? a) 802.1d b) 802.1x c) 802.3af d) 802.3ad 37) An outside organization has completed a penetration test for a company. One of the report items states that an attacker may have the ability to read TLS traffic from the webserver due to a software bug. What is the MOST likely mitigation for this reported item? a) Configure the firewall to block traffic on port 443 b) Implement a VPN for employees c) Ensure patches are deployed d) Install an IDS on the network 38) A network engineer is designing an 802.11g wireless network that uses three wireless access points for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point? a) Adjacent access points should be assigned channels 2, 6, and 10 with a 20MHz channel width b) Adjacent access points should be assigned channels 7, 9, and 11 with a 40MHz channel width c) Adjacent access points should be assigned channels 1, 6, and 11 with a 20MHz channel width d) Adjacent access points should be assigned channels 4, 8, and 12 with a 40MHz channel width 39) IPv4 addresses are written using Base 10 numbers, while IPv6 addresses are written in Base 16 numbers. What type of notation does Base16 utilize? a) Octet b) Binary c) Decimal d) Hexadecimal 40) You suspect that your server has been the victim of a web-based attack. Which of the following ports would most likely be seen in the logs to indicate the attack's target? a) 3389 b) 21 c) 389 d) 443 41) An end-user receives a new computer and now is unable to connect to the MySQL database over the Dion Training local area network. Other users can successfully connect. The network technician can successfully ping the database server but still is unable to connect. Which of the following is the most likely reason for this issue? a) The database server is configured with the wrong default gateway address b) A host-based firewall on the user's computer is blocking port 3306 c) The route to the database server's subnet is missing d) The end user's network interface card is defective 42) You have installed and configured a new wireless router. The clients and hosts can ping each other. The network uses a fiber optic WAN connection with 1 Gbps throughput. The wired clients have fast connections, but the wireless clients are displaying high latency when a ping is performed. The wireless clients are also only receiving 300 Mbps when downloading files from the Internet. Which of the following is MOST likely the cause of the slow speeds experienced by the wireless clients? a) A fiber connection does not support wireless b) A high signal-to-noise ratio on the wireless network c) The network should use 802.11g WAPs to increase throughput d) The wireless access point is experiencing RF interference 43) Which of the following ports does SIP use? a) 389/636 b) 80/443 c) 5060/5061 d) 139/445 44) A network administrator, Tamera, follows the best practices to implement firewalls, patch management, and security policies on his network. Which of the following should be performed to verify that the security controls are in place? a) Single point of failure testing b) Penetration testing c) Disaster recovery testing d) AAA authentication testing 45) Your company has two office buildings which are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn't appear to be temporary. What is the MOST likely cause of the outage? a) Cross-talk on the cable b) An open circuit has been created c) Electromagnetic interference on the cable d) Signal attenuation on the cable 46) The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue? a) Session hijacking b) ARP spoofing c) Evil twin d) Distributed DoS 47) What is the broadcast address associated with the host located at 201.58.12.245/28? a) 201.58.12.240 b) 201.58.12.254 c) 201.58.12.255 d) 201.58.12.241 48) Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?` a) The cable is a crossover cable b) The cable has RJ-11 connectors instead of RJ-45 c) The cable is a straight-through cable d) The cable has exceeded bend radius limitations 49) You are currently troubleshooting a workstation in the office and determined that it is an issue with the cabling somewhere between the workstation and the switch. You have tested the patch cable from the workstation to the wall jack and it is not faulty. You want to check the port on the switch next. Which of the following would BEST help you identify which switch port is associated with the workstation's wall jack? a) Network baseline b) Proper labeling c) Standard procedures d) Inventory management 50) Which type of network device operates at layer 2 of the OSI model and allows connected devices to operate at full-duplex since each port is in their own collision domain? a) Switch b) Access point c) Hub d) Router 51) You are currently troubleshooting a network connection error. When you ping the default gateway, you receive no reply. You checked the default gateway, and it is functioning properly, but the gateway cannot connect to any of the workstations on the network. Which of the following layers could be causing this issue? a) Physical b) Transport c) Session d) Presentation 52) Which of the following IEEE specifications describes the use of VLANs? a) 802.1x b) 802.1d c) 802.3af d) 802.1q 53) Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions? a) Jitter b) Bandwidth c) Throughput d) Latency 54) Which of the following is the BEST way to regularly prevent different security threats from occurring within your network? a) Business continuity training b) Penetration testing c) Disaster recovery planning d) User training and awareness 55) Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services? a) TACACS+ b) RADIUS c) Kerberos d) CHAP 56) When you arrived at work today, you saw a message on your computer screen stating that your hard drive has been encrypted and you must pay 1 ETH to get the decryption key. What type of attack has occurred against your workstation? a) Phishing b) Brute-force c) Malware d) Ransomware 57) You have been asked to connect three 802.11a devices to an 802.11g access point configured with WEP. The devices are within 20 feet of the access point, but they still cannot associate with the access point. Which of the following is the MOST likely cause of the devices not associating with the WAP? a) Interference b) Mismatched encryption c) Signal loss d) Frequency mismatch 58) A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator can ping the fiber uplink interface, but none of the new workstations plugged into the switch are responding to the technician's ICMP requests. Which of the following actions should the technician perform next? a) Determine if port security is enabled on the ports b) Determine if the link lights are lit for the ports c) Verify the ports on the switch are full-duplex d) Verify that the uplink interface is configured correctly 59) A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly, and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform NEXT? a) Test the theory to determine the cause b) Establish a theory of probable cause c) Verify full system functionality d) Establish a plan of action to resolve the problem 60) Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem? a) Install an upgraded router b) Install a surge protector c) Install a new electrical outlet d) Install a UPS

Net General

vytvoril(a)

Rebríček

Vizuálny štýl

Možnosti

Prepnúť šablónu

Obnoviť automaticky uložené: ?