A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?
A. Air flow and cooling B. UPS capability C. Circuit labeling D. Power redundancy
Jane, a network technician is preparing to configure a company’s network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address. Which of the following is an addressing scheme that will work in this situation?
A. Teredo tunneling B. Private C. APIPA D. Classless
A network administrator noticed that when one computer goes down, all the other computers in the office will not work. Which of the following topologies is in use?
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?
A. SOP B. BEP C. AUP D. SLA
Correct Answer: C
Explanation: AUP stands for Acceptable Use Policy. An Acceptable Use Policy defines what a user can or cannot do with his or her computer during business hours. For example, using the company’s Internet connection to look at the sports scores on a sports website may be deemed inappropriate or unacceptable during business hours. Other examples include the use of social media websites such as Facebook or using Instant Messaging clients to chat to your friends.
Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back?
A. The browser on the server B. The server’s NIC drivers C. The server’s IP address D. The antivirus updates
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?
A. Disable the network based firewall B. Implicit deny all traffic on network C. Configure a VLAN on Layer 2 switch D. Add the system to the DMZ
Correct Answer: D
Explanation: By putting the system in the DMZ (demilitarized zone) we increase the security, as the system should be opened for remote access. A DMZ is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. A DMZ often contains servers that should be accessible from the public Internet.
A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network. Which of the following is the BEST security method to implement on the access points?
A. Port forwarding B. MAC filtering C. TLS/TTLS D. IP ACL
Correct Answer: B
Explanation: MAC filtering allows traffic to be permitted or denied based on a device’s MAC address. We make a MAC filtering which contains the MAC addresses of all approved devices that need to access the wireless network. This ensures that only approved devices are given access to the network.
A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem?
A. Damaged cable B. Duplex mismatch C. Incorrect VLAN assignment D. Speed mismatch
Correct Answer: C
Explanation: If a port is accidentally assigned to the wrong VLAN in a switch, it’s as if that client was magically transported to another place in the network. This would explain the inability to communication with the printer, as it is on a different VLAN.
A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to replace it. Which of the following would be the MOST helpful in regaining connectivity?
A. VLAN configuration B. Network diagram C. Configuration backup D. Router image