Certified Electronics Technician
You need to be able to create rules to filter packets and protect against attacks from the
Internet. What type of device should you use? - correct answer ✔✔Firewall
You have just finished configuring a router on your corporate network that consists of several
subnets. Some users have informed you that they have access to some of the servers, but not
others that they used to have access to. What is the most likely reason for this problem? -
correct answer ✔✔Access control lists
Which of the following is a valid example of an IPv6 link local address?
FF00::100:ABC:4000
FD00:2:17:2BC:0123::2DF3
FC00:123:ABC:1:0:5:4BC:3EF
FE80::1 - correct answer ✔✔FE80::1
You are configuring some new network printers and yuo want to be sure the printers are always
dynamically assigned the same IP address. What shoudl you configure? - correct answer
✔✔DHCP reservation
A technician has run an MMF cable from the IDF to the MDF and is not getting a strong signal.
He needs to check the length of the cable and see if there are any breaks or mismatched
connectors. What should he use?q - correct answer ✔✔OTDR
Which protocol is most likely used to communicate with a SAN over an Ethernet LAN using
standard NICs? - correct answer ✔✔iSCSI
, You are capturing packets with a network sniffer and notice a number of packets that are
flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you
investigate? - correct answer ✔✔Transport
Recent police reports suggest that unsavory individuals have been casing the neighborhood
where your company is located. You want to ensure that an alarm is triggered in the event
someone is detected roaming the premises after business hours. What are you most likely to
deploy? - correct answer ✔✔Motion detection
Which networking model should you use to allow the users on each computer to control access
to their own shared folders and printers without centralized control? - correct answer ✔✔Peer-
to-peer
Toy have been asked to install a device that supports WPA2 and 802.11ac. What device should
you install? - correct answer ✔✔WAP
Which authentication protocol uses PKI to provide mutual authentication? - correct answer
✔✔EAP-TLS
You are planning to configure a voice and video system that will use TCP/IP. You need to study
the protocols and devices you might be using to deploy the system. Which of teh following are
you likely to study? (Choose two.)
SIP
POP3
H.323
Master terminal unit
ICS/SCADA - correct answer ✔✔SIP
H.323