An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?
Which of the following network protocols is used for a secure command line interface for management of network devices?
In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?
Which of the following protocols provides a secure connection between two networks?
A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO).
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem?
Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).
Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?
A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
Which of the following is used to determine whether or not a user’s account is authorized to access a server remotely?
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?
Which of the following will prevent switching loops by selectively shutting down switch ports?
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?
Which of the following protocols is used by Windows to securely access a remote computer?
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?
Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?
A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?
A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on?
A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?
A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).
The components of a NIC function at which of the following layers of the OSI model? (Select TWO).
Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
Which of the following would be used to place extranet servers in a separate subnet for security purposes?
Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?
Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?
Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).
Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?
Which of the following would Karen, a technician, do to monitor remote traffic through an access point?
An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?
Karen, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Karen?
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server?
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?
Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?
Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device’s MIB. Which of the following should she use?
A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?
Which of the following network devices hides network nodes behind one public IP address?
A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?
The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?
The unit responsible for the successful shaping and transmission of a digital signal is called:
A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:
1-----------1
2-----------2
3-----------3
4-----------4
5-----------5
6-----------6
7-----------7
8-----------8
Which of the following should the technician do NEXT?
Which of the following connector types will MOST likely be located on a serial cable?
Joe, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use?
In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?
Which of the following network topologies describes a network where each node is connected to multiple devices?
An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?
Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?
Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?
Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?
Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?
Which of the following wireless standards is the only one capable of operating in either of the 802.11 wireless spectrums?
Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
Which of the following should Kim do to complete the installation?
A user reports that they are unable to connect to the network. Upon further investigation, a technician notices that the user has an IP address/subnet mask combination of 192.168.204.255/24. The default gateway for the network is 192.168.204.254. Which of the following could the user’s IP address be changed to so that they could connect to the network?
Which of the following protocols are used to provide accurate time to network devices?
For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?
Which of the following describes the amount of time it takes for a packet to transmit from one switch to another?
After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).
A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?
Which of the following protocols is the BEST choice for retrieving email on multiple devices?
The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model?
Which of the following assists a network administrator in reverse engineering malware and viruses?
Which protocol is represented by the packet capture below?
UDP 0.0.0.0:68 -> 255.255.255.255:67
Which of the following DNS records would allow for a website to have more than one FQDN?
The MAC address of a network device is used to communicate at which of the following OSI layers?
Which of the following DNS record types will be used for mail transfer if the MX record is not found?
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?
Which of the following services do TCP connections provide to application layer protocols? (Select TWO).
An IP address is encapsulated at which of the following layers of the OSI model?
Frames are the Protocol Data Unit for which of the following layers of the OSI model?
Kurt, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Kurt’s NEXT step?
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?