Q1. A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds? A. MU-MIMO B. LWAPP C. PoE D. MIMO View AnswerAnswer: D Q2. A company has implemented the capability to send all log files…
Q1. A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? A. 802.11ac with 2 spatial streams and an 80MHz bandwidth B. 802.11ac with 3 spatial streams and a 20MHz bandwidth C. 802.11ac with 3 spatial streams and a 40MHz bandwidth D. 802.11ac with 4 spatial streams and…
Q1. Which of the following protocols must be implemented in order for two switches to share VLAN information? A. VTP B. MPLS C. STP D. PPTP View AnswerAnswer: A Q2. A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices? A. WPA2 B. IPv6 C. SNMPv3 D. RIPv2 View AnswerAnswer: C Q3. Which of the following WAN technologies is associated…
Q1. Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue? A. Signal-to-noise ratio B. AP configuration C. Incorrect SSID D. Bounce View AnswerAnswer:…
Q1. Which of the following is used to define how much bandwidth can be used by various protocols on the network? A. Traffic shaping B. High availability C. Load balancing D. Fault tolerance View AnswerAnswer: A Q2. Which of the following is an example of an IPv4 address? A. 192:168:1:55 B. 192.168.1.254 C. 00:AB:FA:B1:07:34 D. ::1 View AnswerAnswer: B Q3. A desktop computer is connected to the network and receives an APIPA…
Q1. A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility: Network DestinationNetmask Gateway Interface 192.168.1.0 255.255.255.0 192.168.1.254 eth0 192.168.1.10255.255.255.255 192.168.1.10 eth0 127.0.0.1255.0.0.0 On-Link lo 127.0.0.0255.0.0.0 On-Link lo 255.255.255.255255.255.255.255 102.168.1.10 eth0 Which of the following is the reason for the computer issue, given the above output? A. Wrong…
Q1. HOTSPOT Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. Instructions: When the…
Q1. Which of the following network topologies has a central, single point of failure? A. Ring B. Star C. Hybrid D. Mesh View AnswerAnswer: B Q2. Which of the following WAN technologies is associated with high latency? A. T1 B. Satellite C. Cable D. OCx View AnswerAnswer: B Q3. An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to…
Q1. Which of the following protocols must be implemented in order for two switches to share VLAN information? A. VTP B. MPLS C. STP D. PPTP View AnswerAnswer: A Q2. A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect…
Q1. A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to? A. nbtstat –a B. show mac address-table C. show interface status D. show ip access-list E. nslookup hostname View AnswerAnswer: B Q2. CORRECT TEXT You have been…
Q1. When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting? A. Transport layer B. Physical layer C. Network layer D. Session layer View AnswerAnswer: B Q2. CORRECT TEXT Alter recent changes to the pictured network, several users are unable to access the servers.…
Q1. A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST? A. Compatibility requirements B. Environment limitations C. Cable length D. Equipment limitations View AnswerAnswer: B Q2. A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks…
Q1. Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. C. Port 80 web…
Q1. Which of the following WAN technologies is associated with high latency? A. T1 B. Satellite C. Cable D. OCx View AnswerAnswer: B Q2. A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? A. PoE B. Port bonding C. VLAN D. Trunking View AnswerAnswer: A Q3. A network technician must create a wireless link between two buildings in an office park…
Q1. A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user? A. The user is connected using the wrong channel. B. The user is connected to the wrong SSID. C. The user is experiencing an EMI issue. D. The user is connected to the wrong…
Q1. A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? A. Star B. Ring C. Mesh D. Bus View AnswerAnswer: A Q2. Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the…
Q1. A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement? A. Star B. Bus C. Ring D. Mesh View AnswerAnswer: C Q2. A network administrator recently installed…
Q1. CORRECT TEXT Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem. You, a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity.…
Q1. Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform? A. Erase the files created by…
Q1. Which of the following describes a smurf attack? A. Attack on a target using spoofed ICMP packets to flood it B. Intercepting traffic intended for a target and redirecting it to another C. Spoofed VLAN tags used to bypass authentication D. Forging tags to bypass QoS policies in order to steal bandwidth View AnswerAnswer: A Q2. A user calls the help desk and states that…