Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following should the technician implement to avoid potential occurrences from happening in the future?
A. Block all ICMP request B. Update all antivirus software C. Remove all suspected users from the network D. Upgrade firmware on all network cards
A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility: Network DestinationNetmaskGatewayInterface 192.168.1.0 255.255.255.0192.168.1.254eth0 192.168.1.10255.255.255.255192.168.1.10eth0 127.0.0.1255.0.0.0On-Linlo 127.0.0.0255.0.0.0On-Linklo 255.255.255.255255.255.255.255102.168.1.10eth0 Which of the following is the reason for the computer issue, given the above output?
A. Wrong default gateway netmask B. Incorrect default gateway address C. Default gateway on the wrong interface D. Missing default gateway
Correct Answer: D
Explanation: The output appears to be a result of running the netstat –r command. If the default gateway was present, the first line would show the Network Destination as 0.0.0.0 and the Netmask as 0.0.0.0.
Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or earthquake?
A. UPS and battery backups B. Fire suppression systems C. Building generator D. Hot sites or cold sites E. NAS and tape backups
There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable reason the vendor made this suggestion?
A. It is a rapid version of spanning tree that uses BPDU to detect problems B. It is a regular version of port mirroring that uses hellow packets to detect loops C. It is a simple version of spanning tree that uses BPDU to detect problems D. It is a rapid version of port mirroring that uses BPDU to detect problems
A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector. Which of the following is the issue?
A. Cross-talk B. 568A/568B mismatch C. Tx/Rx reverse D. Split pairs
A technician wants to update the organization’s disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a device failure?
A. Vendor documentation B. Archives/backups C. Proper asset tagging and labeling D. Network Baseline
A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake?
A. Packet analyzer B. Port analyzer C. SNMP traps D. Spectrum analyzer
A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the:
A. MLA. B. SLA. C. SOW. D. MOU.
Correct Answer: B
Explanation: SLA stands for Service Level Agreement. This is a common document in business used to define a minimum standard of service that a customer can expect from a supplier. SLA’s are particularly common in the I.T. sector where a service provider is offering a service to a customer. As a customer, you want your hosted services and Internet or WAN connections to be available all the time. SLAs often guarantee 99.9% uptime for a service. In this question, the service provider is providing WAN links to remote sites with a guaranteed bandwidth on the WAN links. A failure to maintain the connectivity to the remote sites would be a violation of the Service Level Agreement (SLA).
A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST?
A. Remove all user accounts on the server B. Isolate the server logically on the network C. Block all HTTP traffic to the server D. Install the software in a test environment
Correct Answer: D
Explanation: We should test the new version of the application in a test/lab environment first. This way any potential issues with the new software would not affect the production environment. Set up a test lab on an isolated network in your organization. Do not set up your test lab in your production environment.