Filters
Question type

Study Flashcards

A user is connected to the guest wireless network for a video conference with colleagues. The user's computer shows a strong wireless signal, and websites seem to load without issue, but the voice and video have periods of choppiness. Which of the following would BEST identify the issue?


A) Verify the wireless capacity is not exceeded.
B) Check the signal attenuation.
C) Increase the power transmission level.
D) Adjust the antenna placement.

Correct Answer

verifed

verified

A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)


A) RG-9
B) DB-9
C) RJ-11
D) DB-25
E) RJ-45
F) BNC

Correct Answer

verifed

verified

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?


A) Loopback adapter
B) Cable tester
C) Tone generator
D) Multimeter

Correct Answer

verifed

verified

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?


A) Powerline extender
B) Ethernet-over-power adapter
C) Power-over-Ethernet switch
D) Power distribution unit
E) Ethernet power controller

Correct Answer

verifed

verified

A switch has detected duplicate broadcast messages sourced from a second port. The broadcasts continue to be transmitted and duplicated until the amount of traffic causes severe performance issues. Which of the following should be configured to prevent this behavior?


A) BPDU guard
B) DHCP snooping
C) ARP protection
D) Spanning tree

Correct Answer

verifed

verified

A systems administrator has recently purchased and installed a large electronic signage screen for the company's parking garage. The screen's management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?


A) Changing the management software's default credentials
B) Disabling unnecessary services from the server and management software
C) Changing the management software's default port
D) Replacing the management software's self-signed certificate with a valid certificate

Correct Answer

verifed

verified

A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)


A) 802.11ac
B) 802.11b
C) 802.11g
D) 802.11n
E) Bluetooth
F) Z-Wave

Correct Answer

verifed

verified

Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?


A) Check the latency by running a continuous ping to the site.
B) Perform the ipconfig/flushdns command on the affected users' PCs. Perform the ipconfig/flushdns command on the affected users' PCs.
C) Run a speedtest from a user's PC to a site on the Internet.
D) Verify if there is MTU mismatch in the path to the site.

Correct Answer

verifed

verified

Which of the following MUST be implemented to share metrics between routing protocols within the same router?


A) Routing loop
B) Routing table
C) Route redistribution
D) Dynamic routes

Correct Answer

verifed

verified

A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems. Which of the following standards BEST fits these requirements?


A) 802.11a
B) 802.11ac
C) 802.11b
D) 802.11g

Correct Answer

verifed

verified

A router is set up to utilize RIPv2 to route traffic throughout the network. Which of the following routing metrics is used to determine the path?


A) Distance
B) Bandwidth
C) Speed
D) Hop count

Correct Answer

verifed

verified

A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?


A) The cables have an incorrect pin-out.
B) The cables are UTP instead of STP.
C) The cables are Cat 6 instead of Cat 5.
D) The cables are not plenum rated.

Correct Answer

verifed

verified

A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?


A) Test the possible solution
B) Question the users
C) Determine what has changed
D) Document the theory

Correct Answer

verifed

verified

A network administrator is attempting to limit the installation of malware on company workstations. The administrator wants to remove root access from the user accounts. Which of the following is this an example of?


A) Changing default credentials
B) Limiting spoofing
C) Role separation
D) Port security

Correct Answer

verifed

verified

A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?


A) Tone generator
B) Multimeter
C) OTDR
D) Loopback adapter

Correct Answer

verifed

verified

Which of the following WAN transmission mediums is the fastest and can travel the longest distance?


A) Satellite
B) Copper
C) Wireless
D) Fiber

Correct Answer

verifed

verified

A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?


A) ipconfig
B) nslookup
C) arp
D) dig

Correct Answer

verifed

verified

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?


A) Access control lists
B) Captive portal
C) WPA2
D) Port security

Correct Answer

verifed

verified

A consultant is designing a new network for a company that will be hosting its own email and web servers. The company wants to ensure there are separate devices to protect the internal network from the DMZ and the DMZ from the Internet. Which of the following would provide this protection?


A) The installation of a firewall with multiple interfaces for the Internet to the DMZ and the LAN.
B) The in-line installation of two firewalls to divide the Internet to the DMZ and the DMZ to the LAN.
C) The installation of two switches to divide the Internet from the LAN and the LAN to the DMZ.
D) The installation of a switch from the Internet to the DMZ and a firewall between the DMZ and the LAN.

Correct Answer

verifed

verified

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?


A) /24
B) /25
C) /30
D) /32

Correct Answer

verifed

verified

Showing 161 - 180 of 829

Related Exams

Show Answer