A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
A. SSH in tunnel mode B. RDP set to console connection C. EAP-PEAP D. SFTP
A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue?
A. Test a theory to determine the cause B. Escalate to a senior technician C. Identify the symptoms D. Establish a theory of probable cause E. Establish a plan of action
A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?
A. nbtstat –a B. show mac address-table C. show interface status D. show ip access-list E. nslookup hostname
Correct Answer: B
Explanation: The show mac address-table command is used to view the ageing timer, and also the unicast and multicast MAC addresses stored in the MAC address table by the switch. Furthermore, you can view all of the addresses in the table or only the addresses learned or specified on a particular port or VLAN.
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?
A. Leases B. Helper addresses C. Scopes D. Reservations
Correct Answer: D
Explanation: A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address of the network interface card that should receive the IP address. For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?
A. Power levels B. Overcapacity C. Distance limitations D. Channel overlap
A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened?
A. 445 B. 3389 C. 5004 D. 5060
Correct Answer: B
Explanation: RDP (Remote Desktop Protocol) is used for connecting to a remote Windows computer. When using RDP to connect to a remote Windows computer, you can view and control the desktop of the remote computer. RDP uses TCP port 3389.
A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.)
A. Wire stripper B. Cable crimper C. RJ-11 connectors D. RJ-45 connectors E. Multimeter F. Punchdown tool G. Tone generator
The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals?
A. Stateful firewall B. Premise-based IDS C. Host-based IDS D. Cloud-based anti-malware
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate. The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following is the BEST course of action for the network administrator to take?
A. Wait until the maintenance window, and make the requested change B. First document the potential impacts and procedures related to the change C. Send out a notification to the company about the change D. Make the change, noting the requester, and document all network changes
Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?