Which of the following security devices is used in providing packet and MAC address filtering services for the network?


A.      Host-based proxy server

B.      Network-based firewall

C.      IDS

D.      IPS


Correct Answer: B




Which of the following media types will block EMI?


A.      UTP

B.      Serial

C.      STP

D.      Non-plenum


Correct Answer: C




Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal.

Which of the following could be done together to solve this problem? (Select TWO).


A.      Turn down the signal gain.

B.      Increase the encryption method.

C.      Change the wireless channel.

D.      Replace the WAP’s antennas with directional antennas

E.       Disable the SSID


Correct Answer: AD




Kurt, a user, is having difficulty connecting a laptop to the company’s wireless network. The technician determines Kurt’s wireless NIC has failed and replaces it. Which of the following network troubleshooting methodology steps should the technician do NEXT?


A.      Implement the solution

B.      Verify full system functionality

C.      Test the theory to determine cause

D.      Establish a plan of action to resolve the problem


Correct Answer: B




Which of the following devices will allow Sandy, a user, to see a cached copy of websites?


A.      Content switch

B.      DNS server

C.      Proxy server

D.      Load balancer


Correct Answer: C




An organization currently has CAT5e cabling throughout its office. Karen, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?


A.      Improper grounding

B.      TXRX reversed

C.      Incorrect termination

D.      Outdated NIC drivers


Correct Answer: C




Which of the following is a purpose of a VLAN?


A.      Decreases bandwidth on a network

B.      Segments broadcast traffic

C.      Increases port speed

D.      Allows another connection to the router


Correct Answer: B




Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?


A.      PKI

B.      TACACS+

C.      CHAP

D.      SSH


Correct Answer: B




Which of the following is used to verify configuration updates on a firewall?


A.      Signature identification

B.      Access control lists

C.      Scanning services

D.      Content filtering


Correct Answer: A




Which of the following layers of the OSI model would a NIC operate on?


A.      Physical

B.      Network

C.      Session

D.      Transport


Correct Answer: A



Comments are closed.