Q1. CORRECT TEXT
Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem.
You, a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any NECESSARY changes to the wireless and wired infrastructure by adjusting devices.
Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are clickable. When you feel the simulation is complete please select the Done button.
Answer:
-Change the speed and duplex settings on AP2 only to 100 and full. -Change the mode to G on AP2 -Change the channel to 6 on AP2
Explanation:
Since we know that the network was running perfectly before replacing AP2 we should start by
looking at this new device that was used to replace the old one. Here we see that the other AP’s
have hard coded the speed and duplex settings to 100/full, while AP2 is set to auto/auto.
Also, the other AP’s have been configured to use 802.11G, while AP2 is using 802.11B.
Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6,
and 11 are spaced far enough apart that they don’t overlap. On a non-MIMO setup (i.e. 802.11 a,
b, or g) you should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using
11, AP2 should be using 6.
Q2. A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?
A. APIPA
B. MAC
C. Static
D. Public
Answer: A
Q3. When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?
A. Transport layer
B. Physical layer
C. Network layer
D. Session layer
Answer: B
Q4. Which of the following protocols must be implemented in order for two switches to share VLAN information?
A. VTP
B. MPLS
C. STP
D. PPTP
Answer: A
Q5. A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?
A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack
Answer: B
Q6. A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?
A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10
Answer: A
Q7. A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?
A. HTTPS
B. Fibre channel
C. iSCSI
D. MS-CHAP
Answer: C
Q8. Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?
A. Multifactor authentication
B. ISAKMP
C. TACACS+
D. Network access control
Answer: C
Q9. A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos
Answer: A
Q10. A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?
A. Regression test
B. Speed test
C. Baseline
D. Statement of work
Answer: C
Q11. It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
A. Network device power issues
B. Network device CPU issues
C. Storage area network issues
D. Delayed responses from RADIUS
Answer: B
Q12. After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible?
A. Reformat and install the compatible drivers.
B. Reset Ann's equipment configuration from a backup.
C. Downgrade the PC to a working patch level.
D. Restore Ann's PC to the last known good configuration.
E. Roll back the drivers to the previous version.
Answer: E
Q13. A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?
A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication
Answer: A
Q14. After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP
Answer: C
Q15. Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN?
A. Access switch
B. UC gateway
C. UC server
D. Edge router
Answer: B