CORRECTLY ANSWERED 100%
You need to be able to create rules to filter packets and protect against attacks from the
Internet. What type of device should you use? - correct answer ✔✔Firewall
You have just finished configuring a router on your corporate network that consists of several
subnets. Some users have informed you that they have access to some of the servers, but not
others that they used to have access to. What is the most likely reason for this problem? -
correct answer ✔✔Access control lists
Which of the following is a valid example of an IPv6 link local address?
FF00::100:ABC:4000
FD00:2:17:2BC:0123::2DF3
FC00:123:ABC:1:0:5:4BC:3EF
FE80::1 - correct answer ✔✔FE80::1
You are configuring some new network printers and yuo want to be sure the printers are always
dynamically assigned the same IP address. What shoudl you configure? - correct answer
✔✔DHCP reservation
A technician has run an MMF cable from the IDF to the MDF and is not getting a strong signal.
He needs to check the length of the cable and see if there are any breaks or mismatched
connectors. What should he use?q - correct answer ✔✔OTDR
Which protocol is most likely used to communicate with a SAN over an Ethernet LAN using
standard NICs? - correct answer ✔✔iSCSI
,You are capturing packets with a network sniffer and notice a number of packets that are
flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you
investigate? - correct answer ✔✔Transport
Recent police reports suggest that unsavory individuals have been casing the neighborhood
where your company is located. You want to ensure that an alarm is triggered in the event
someone is detected roaming the premises after business hours. What are you most likely to
deploy? - correct answer ✔✔Motion detection
Which networking model should you use to allow the users on each computer to control access
to their own shared folders and printers without centralized control? - correct answer ✔✔Peer-
to-peer
Toy have been asked to install a device that supports WPA2 and 802.11ac. What device should
you install? - correct answer ✔✔WAP
Which authentication protocol uses PKI to provide mutual authentication? - correct answer
✔✔EAP-TLS
You are planning to configure a voice and video system that will use TCP/IP. You need to study
the protocols and devices you might be using to deploy the system. Which of teh following are
you likely to study? (Choose two.)
SIP
POP3
H.323
Master terminal unit
ICS/SCADA - correct answer ✔✔SIP
H.323
, You are about to deploy a new server that will contain sensitive data about your clients. You
want to test the server to look for problems that might allow an attacker to gain unauthorized
access to the server. The testing should not attempt to exploit weaknesses, only report them.
What type of test should you perform? - correct answer ✔✔Vulnerability scan
The Webmaster for a company installed a certificate on a Web server to provide secure
communication between the Web server and Web browsers. What protocol will be used to
provide a secure channel? - correct answer ✔✔SSL
Which layer of the OSI model should you examine if you want to troubleshoot a problem with
the HTTP protocol? - correct answer ✔✔Application
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a
large room that contains about 15 cubicles where employees work with their mobile devices.
You test connectivity from all locations and find that signal strength is good throughout the
room. Several months later, you are called to troubleshoot connectivity problems at the site.
You find that the large room was divided into two smaller rooms by a floor to ceiling wall with
metal studs. What is the most likely reason for the connectivity problems? - correct answer
✔✔Interference
A startup company has an idea for a new medical records application. The company wants to
develop the application so it can be run on multiple OSs. However, they have limited funds to
build the development environment that is necessary to create and test the application
properly. What service should they consider? - correct answer ✔✔Public PaaS
The default VLAN on a switch has been assigned an IP address of 172.19.0.64/27 with a default
gateway of 172.19.0.94. You can't ping the switch from your workstation that has the address
172.19.0.66/27 but you can ping your default gateway that has the address 172.19.0.94. Why
can'y you ping the switch? - correct answer ✔✔The switch has the wrong IP address