Ensurepass

QUESTION 141

Which of the following security devices is used in providing packet and MAC address filtering services for the network?

 

A.      Host-based proxy server

B.      Network-based firewall

C.      IDS

D.      IPS

 

Correct Answer: B

 

 

QUESTION 142

Which of the following media types will block EMI?

 

A.      UTP

B.      Serial

C.      STP

D.      Non-plenum

 

Correct Answer: C

 

 

QUESTION 143

Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal.

Which of the following could be done together to solve this problem? (Select TWO).

 

A.      Turn down the signal gain.

B.      Increase the encryption method.

C.      Change the wireless channel.

D.      Replace the WAP’s antennas with directional antennas

E.       Disable the SSID

 

Correct Answer: AD

 

 

QUESTION 144

Kurt, a user, is having difficulty connecting a laptop to the company’s wireless network. The technician determines Kurt’s wireless NIC has failed and replaces it. Which of the following network troubleshooting methodology steps should the technician do NEXT?

 

A.      Implement the solution

B.      Verify full system functionality

C.      Test the theory to determine cause

D.      Establish a plan of action to resolve the problem

 

Correct Answer: B

 

 

QUESTION 145

Which of the following devices will allow Sandy, a user, to see a cached copy of websites?

 

A.      Content switch

B.      DNS server

C.      Proxy server

D.      Load balancer

 

Correct Answer: C

 

 

QUESTION 146

An organization currently has CAT5e cabling throughout its office. Karen, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

 

A.      Improper grounding

B.      TXRX reversed

C.      Incorrect termination

D.      Outdated NIC drivers

 

Correct Answer: C

 

 

QUESTION 147

Which of the following is a purpose of a VLAN?

 

A.      Decreases bandwidth on a network

B.      Segments broadcast traffic

C.      Increases port speed

D.      Allows another connection to the router

 

Correct Answer: B

 

 

QUESTION 148

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

 

A.      PKI

B.      TACACS+

C.      CHAP

D.      SSH

 

Correct Answer: B

 

 

QUESTION 149

Which of the following is used to verify configuration updates on a firewall?

 

A.      Signature identification

B.      Access control lists

C.      Scanning services

D.      Content filtering

 

Correct Answer: A

 

 

QUESTION 150

Which of the following layers of the OSI model would a NIC operate on?

 

A.      Physical

B.      Network

C.      Session

D.      Transport

 

Correct Answer: A

 

 

Comments are closed.