Filters
Question type

Study Flashcards

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?


A) 23
B) 25
C) 110
D) 143

Correct Answer

verifed

verified

A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport?


A) Perform a DNS lookup on the server.
B) Set up an SSH session to the desktop.
C) Reference the ARP table in the router.
D) Configure port security on the switch.

Correct Answer

verifed

verified

A network administrator is reviewing security logs and notes a strange IP address logging into the management console of a switch. The administrator verifies the switch is not using default credentials. Which of the following steps should the administrator take NEXT?


A) Implement restrictions via ACL.
B) Update firmware to the current version.
C) Disable unnecessary services.
D) Check the hash of the running firmware.

Correct Answer

verifed

verified

A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the company's network? (Choose three.)


A) 67
B) 68
C) 161
D) 636
E) 1720
F) 5060
G) 5061

Correct Answer

verifed

verified

An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domains that exist?


A) 3
B) 12
C) 13
D) 14
E) 15

Correct Answer

verifed

verified

Which of the following ports should be open on a host-based firewall for a user who needs email and file-sharing capabilities? (Choose two.)


A) 21
B) 88
C) 389
D) 445
E) 587
F) 3389

Correct Answer

verifed

verified

Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer a critical application?


A) SaaS
B) IaaS
C) PaaS
D) CASB

Correct Answer

verifed

verified

A technician receives a report that Joe, an existing user, is unable to access the network. Joe confirms that he had full access the previous day. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe is able to access the network. Which of the following is the MOST likely cause of this issue?


A) Incorrect pin-out
B) Bad port
C) Transceiver mismatch
D) Incorrect cable type

Correct Answer

verifed

verified

A network technician is troubleshooting a connection issue and determines the domain name resolution is not getting out past the firewall. Which of the following ports should the technician check to see if it is being blocked by the ACLs?


A) 23
B) 53
C) 110
D) 389

Correct Answer

verifed

verified

Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?


A) tcpdump
B) dig
C) nmap
D) netstat

Correct Answer

verifed

verified

After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of 169.254.112.137. Which of the following is MOST likely causing the issue?


A) DHCP scope exhaustion
B) Improper DNS setting
C) Incorrect ACL setting
D) Port-security violation

Correct Answer

verifed

verified

A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?


A) Layer 2
B) Layer 3
C) Layer 6
D) Layer 7

Correct Answer

verifed

verified

A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet. Which of the following methods should be used to distribute the images while ensuring integrity?


A) Use a TFTP server and UDP protocol.
B) Use an FTP server and provide the file hash.
C) Use an HTTP server to share the file.
D) Use a modem and dial-up connection.

Correct Answer

verifed

verified

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?


A) RJ11
B) LC
C) BNC
D) F-type

Correct Answer

verifed

verified

Which of the following storage connection types should be used to allow the consolidation of the physical connections for SAN and LAN in just one Layer 2 protocol?


A) Fibre Channel
B) SCSI
C) T1/E1
D) FCoE

Correct Answer

verifed

verified

A company needs to create a new website for the delivery of secure content to and from specific customers. The Chief Information Officer (CIO) states as a requirement the creation of a secure connection between the client's machine and the website every time the content is accessed. This should be accomplished without requiring the installation of any client software. Which of the following should be used in this scenario?


A) Site-to-site VPN
B) GRE
C) MPLS
D) SSL

Correct Answer

verifed

verified

A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this?


A) Change management
B) Rack diagram
C) Network configuration
D) Network diagram

Correct Answer

verifed

verified

Which of the following are DNS record types? (Choose three.)


A) CNAME
B) NTP
C) PTR
D) LDAP
E) DHCP
F) TTL
G) SRV
H) SSH

Correct Answer

verifed

verified

Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?


A) Remote access
B) NDA
C) SLA
D) BYOD
E) Incident response

Correct Answer

verifed

verified

A network engineer is adding a switch uplink to an existing IDF. Upon inspection, the engineer finds that there are only two strands of single-mode fiber in the IDF, and both strands are in use. Which of the following solutions should the engineer use to provide an additional switch uplink without installing new fiber optic cabling?


A) Install bidirectional transceivers.
B) Install SFP+ transceivers.
C) Install media converters.
D) Install duplex transceivers.

Correct Answer

verifed

verified

Showing 561 - 580 of 829

Related Exams

Show Answer