At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?
A. Configure an access list. B. Configure spanning tree protocol. C. Configure port security. D. Configure loop protection.
Explanation: Port security in IT can mean several things. It can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. This can be accomplished by locking down the wiring closet and server vaults and then disconnecting the workstation run from the patch panel (or punch-down block) that leads to a room’s wall jack. Any unneeded or unused wall jacks can (and should) be physically disabled in this manner. Another option is to use a smart patch panel that can monitor the MAC address of any device connected to each and every wall port across a building and detect not just when a new device is connected to an empty port, but also when a valid device is disconnected or replaced by an invalid device.
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?
A. Cable certifier B. Multimeter C. Cable tester D. Toner probe
Correct Answer: D
Explanation: Toner probes are specifically used to trace cables hidden in floors, ceilings, or walls. They can also be used to track cables from the patch panels to their destinations.
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A. Place a switch at the hotel’s patch panel for connecting each room’s cables B. Place a switch on each table to ensure strong connectivity C. Place repeaters between the patch panel and the rooms D. place a switch at the wall jack and run the cables in the room from there
A contractor has removed a wall jack and thrown it away. There is no longer a line number on the network cable. A technician attaches a far end connector and proceeds to several wiring closets to find the patch panel location of the cable. Which of the following tools will the technician need for this job?
A. Toner probe B. Loopback plug C. Cable tester D. Multimeter
Peter, a technician, is troubleshooting an issue with a PC suddenly losing network connectivity. He has confirmed that the cable is plugged in and has swapped it with a known working cable. Peter then pings the IP address of 127.0.0.1 and receives no response. Which of the following could be the cause of the issue? (Select TWO).
A. The computer has the wrong DNS server configured. B. The TCP drivers are corrupted. C. The cable has been unplugged from the patch panel. D. The routing table on the router is corrupted. E. There is RF interference on the cable. F. The NIC is no longer functioning properly.