An organization wants to implement a method of centrally managing logins to network
services. Which of the following protocols should the organization use to allow for
authentication, authorization and auditing?
A.
MS-CHAP
B.
RADIUS
C.
LDAPS
D.
RSTP
MS-CHAP
According to troubleshooting methodology, which of the following should the technician
doNEXT after determining the most likely probable cause of an issue?
A.
Establish a plan of action to resolve the issue and identify potential effects
B.
Verify full system functionality and, if applicable, implement preventive measures
C.
Implement the solution or escalate as necessary
D.
Test the theory to determine the cause
Test the theory to determine the cause
Which of the following policies is MOST commonly used for guest captive portals?
A.
AUP
B.
DLP
C.
BYOD
D.
NDA
AUP
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:
The network engineer observes that all users have lost Internet connectivity. Which of the following describes the issue?
A.
The incorrect subnet mask was configured
B.
The incorrect gateway was configured
C.
The incorrect IPaddress was configured
D.
The incorrect interface was configured
The incorrect subnet mask was configured
At which of the following OSI model layers would a technician find an IP header?
A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
Layer 3
An IT organization needs to optimize speeds for globalcontent distribution and wants to
reduce latency in high-density user locations. Which of the following technologies BEST
meets the organization’s requirements?
A.
Load balancing
B.
Geofencing
C.
Public cloud
D.
Content delivery network
E.
Infrastructure as a service
Content delivery network
A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:
Which of the following methods should the engineer select?
A.
TWP-RC4
B.
CCMP-AES
C.
EAP-TLS
D.
WPA2
EAP-TLS
The network administrator is informed that a user’s email password is frequently hacked by
brute-force programs. Which of the following policies should the network administrator
implements to BEST mitigate this issue? (Choose two.)
A.
Captive portal
B.
Two-factor authentication
C.
Complex passwords
D.
Geofencing
E.
Role-based access
F.
Explicit deny
Two-factor authentication
Complex passwords
A network administrator has been directed to present the network alerts from the past week
to the company's executive staff. Which of the following will provide the BEST collection
and presentation of this data?
A.
A port scan printout
B.
A consolidated report of various network devices
C.
A report from the SIEM tool
D.
A report from a vulnerability scan done yesterday
A report from the SIEM tool
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101
network but gets the following response: U.U.U.U. Which of the following needs to be
configured for these networks to reach each other?
A.
Network address translation
B.
Default gateway
C.
Loopback
D.
Routing protocol
Default gateway
A company wants to implement a large number of WAPs throughout its building and allow
users to be able to move around the building without dropping their connections Which of
the following pieces of equipment would be able to handle this requirement?
A.
A VPN concentrator
B.
A load balancer
C.
A wireless controller
D.
A RADIUS server
A VPN concentrator
A technician is connecting multiple switches to create a large network for a new office. The
switches are unmanaged Layer 2 switches with multiple connections between each pair.
The network is experiencing an extreme amount of latency. Which of the following is MOST
likely occurring?
A.
Ethernet collisions
B.
A DDoS attack
C.
A broadcast storm
D.
Routing loops
A broadcast storm
Page 1 out of 17 Pages |