Practice Exam B

  1. A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network.
    Which of the following protocols needs to be denied?




    B. ICMP
  2. A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access
    Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?




    D. Implicit deny
  3. The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?




    A. MDF
  4. A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?




    C. Transfer the replacement servers offsite to a data center.
  5. Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?




    A. Honeypot
  6. Which of the following is the FASTEST Ethernet technology?




    A. 10GBaseSR
  7. A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the
    Internet. Which of the following would BEST accomplish this goal?




    B. Enable MAC address filtering
  8. Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?




    C. Port filtering
  9. Companies trying to cut down on constant documentation of IP addresses could use which of the following?




    A. Dynamic IP addressing
  10. Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher's station, a few feet away, to the same hub. The teacher
    is experiencing no network connectivity. Which of the following is MOST likely the problem?




    D. Split cables
  11. A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?




    B. ipconfig
  12. In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?




    C. tracert
  13. A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the
    following would BEST be used to monitor CPU cycles on the routers?




    A. SNMP
  14. Which of the following network topologies describes a network where each node is connected to every other node?




    B. Mesh
  15. Which of the following DHCP properties defines the size of the pool of available IP addresses?




    A. Scope
  16. Which of the following supports faster wireless broadband speeds?




    A. WiMAX
  17. A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?




    D. Port security on the Ethernet switch has disabled the port.
  18. A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?




    A. EAP-TTLS
  19. A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?




    B. WEP
  20. Which of the following protocols works at the LOWEST layer of the OSI model?




    C. L2TP
  21. A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?




    B. WAP placement
  22. A network administrator needs to implement a monitoring tool to send log information to a server and receive log information from other clients. Which should be implemented (Select TWO).

    A. SNMP
    B. Network sniffer
    C. Syslog
    D. System log
    E. History log
    • C. Syslog
    • D. System log
  23. Which of the following network appliances will only detect and not prevent malicious network activity?




    D. IDS
  24. Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?




    B. Decreasing radio strength
  25. A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of
    application?




    C. Traffic analysis
  26. An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection?




    B. RDP
  27. A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?




    A. SNMP
  28. Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?




    B. Network sniffer
  29. When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?




    A. nbstat
  30. Which of the following WAN technologies has the HIGHEST latency?




    D. Satellite
  31. Which of the following connectors are MOST commonly used on a POTS line?




    C. RJ-11
Author
a2k2d2
ID
245883
Card Set
Practice Exam B
Description
Practice Exam B
Updated