Q1. Which of the following is used to define how much bandwidth can be used by various protocols on the network?
A. Traffic shaping
B. High availability
C. Load balancing
D. Fault tolerance
Answer: A
Q2. Which of the following is an example of an IPv4 address?
A. 192:168:1:55
B. 192.168.1.254
C. 00:AB:FA:B1:07:34
D. ::1
Answer: B
Q3. A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem?
A. 802.1q is not configured on the switch port
B. APIPA has been misconfigured on the VLAN
C. Bad SFP in the PC's 10/100 NIC
D. OS updates have not been installed
Answer: A
Q4. A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?
A. Yagi
B. Omni-directional
C. Parabolic
D. Patch
Answer: A
Q5. A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?
A. Username is misspelled is the device configuration file
B. IDS is blocking RADIUS
C. Shared secret key is mismatched
D. Group policy has not propagated to the device
Answer: C
Q6. An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP?
A. tracert
B. ping
C. dig
D. ipconfig
E. netstat
Answer: D
Q7. During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).
A. RSA
B. Passwords
C. Man traps
D. Biometrics
E. Cipher locks
F. VLANs
G. 3DES
Answer: CDE
Q8. A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?
A. Star
B. Ring
C. Mesh
D. Bus
Answer: A
Q9. A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?
A. Regression test
B. Speed test
C. Baseline
D. Statement of work
Answer: C
Q10. In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO).
A. Rack monitoring
B. Device placement
C. Wall plate labeling
D. Room numbering
E. Patch panel labeling
Answer: CE
Q11. A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos
Answer: A
Q12. A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?
A. PoE
B. Port bonding
C. VLAN
D. Trunking
Answer: A
Q13. It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
A. Network device power issues
B. Network device CPU issues
C. Storage area network issues
D. Delayed responses from RADIUS
Answer: B
Q14. A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner?
A. S/MIME
B. SYSLOG
C. PGP
D. SNMPv3
E. RSH
Answer: D
Q15. A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed?
A. Implement an environment to test the enhancements.
B. Implement ACLs that only allow management access to the enhancements.
C. Deploy an IPS on the production network.
D. Move the software team's workstations to the DMZ.
Answer: A