A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?
A. The gateway is misconfigured on the new router. B. The subnet mask is incorrect on the new router. C. The gateway is misconfigured on the edge router. D. The SSID is incorrect on the new router.
Correct Answer: A
Explanation: A missing or incorrect default gateway parameter limits communication to the local segment. The question states: “All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet”.
A network administrator received the following email from a user: From: user@company.com To: abuse@company.com Subject: Free smart phone Dear user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php
Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain?
A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list. B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer
A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback?
A. Channel remote module B. Fiber optic modem C. Channel service unit D. Digital subscriber line modem
A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo” command to list information about the existing condition. myClient$ wificard –getinfo agrCtlRSSI:-72 agrExtRSSI:0 state:running op mode: station lastTxRate:178 MaxRate:300 802.11 auth:open link auth:wpa2-psk BSSID:0F:33:AE:F1:02:0A SSID:CafeWireless Channel:149,1 Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
A. The WAP is using RC4 encryption B. The WAP is using 802.11a C. The WAP is using AES encryption D. The WAP is using the 2.4GHz channel E. The WAP is using the 5GHz channel F. The WAP is using 802.11g
Correct Answer: CE
Explanation: WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption protocol, which is an AES based protocol. The output shows that the wireless network operates on channel 149, which is a channel in the 5GHz band.
Which of the following protocols must be implemented in order for two switches to share VLAN information?
A. VTP B. MPLS C. STP D. PPTP
Correct Answer: A
Explanation: The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).
Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?
A. 110 block B. MDF C. DSU D. CSU
Correct Answer: B
Explanation: MDF stands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel rack accessible from both sides. On one side of the rack is cabling that connects the service provider’s network. The other side of the rack is for the connections to the customer’s equipment.
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?
A. Compromised system B. Smurf attack C. SQL injection attack D. Man-in-the-middle
Correct Answer: A
Explanation: As the extra unexplainable traffic comes from an internal host on your network we can assume that this host has been compromised. If your system has been compromised, somebody is probably using your machine–possibly to scan and find other machines to compromise
A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?
A. Tone generator B. Multimeter C. OTDR D. Loopback adapter
In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company B uses the following scheme: Subnet 1: 192.168.1.50/28 The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to connect these networks?
The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 983881 packets output, 768588 bytes 0 output errors, 0 collisions, 0 resets
A. Set the loopback address B. Change the IP address C. Change the slash notation D. Change duplex to full
Correct Answer: D
Explanation: From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled. Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.