A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device?
A. IP address
B. Default gateway
C. DNS address
D. Loopback address
An architect designs the building blueprint for a new office. The IT team has to purchase equipment and cabling. Upon inspection of the building layout, it is discovered that no designation was made for network infrastructure wiring, cabling, and services for the building. Which of the following needs to be documented in the blueprint for building connectivity?
B. Server room
D. Mechanical room
A network technician has been notified that an available wireless SSID is using insecure WEP encryption and has been asked to investigate what other options are available on the existing wireless hardware. The technician has found that the WAPs support AES-CCMP. Which of the following should the technician configure?
B. MAC filtering
A technician is called to troubleshoot a client PC that is not connecting to the network. The technician first examines the LEDs on the NIC and connection to the wall jack. Then the technician runs a loopback test on the NIC. Which of the following troubleshooting skills is the technician demonstrating?
A. Inductive reasoning
B. OSI model bottom-to-top
D. Divide and conquer
Users within an office building report wireless connectivity is sporadic. A wireless technician troubleshooting the issue notices there are multiple WAPs visible in the same hallway within 20ft (6m) of one another. Which of the following is causing the issue?
A. Incorrect antenna type
C. Frequency mismatch
D. Signal reflection
A network technician is tasked with troubleshooting intermittent network connectivity issues within an organization. Which of the following are possible network service issues? (Select TWO).
A. Duplicate IP address
C. MAC filtering
D. Exhausted DHCP scope
E. NIC teaming
F. Content filter
Which of the following components should be used to manage multiple virtual machines existing on one host?
B. Virtual router
C. Virtual switch
D. Virtual NIC
Which of the following is aimed at irreversibly damaging and disabling IoT devices?
D. Logic bomb
In troubleshooting network performance issues on a computer, a technician finds that the CAT5e cable was run through a conduit with power lines. There is plenty of spare room in the conduit, and a cable continuity test is successful. Which of the following is the MOST likely issue?
C. Incorrect cable type
E. VLAN misconfiguration
One purpose of network segmentation is to:
A. protect sensitive data from the rest of the network.
B. make file transfers easier for end-users.
C. allow certain services to talk to each other without a choke point
D. hold all hardened baseline images for deployment.
Question 1) A. IP address
Question 2) C. MDF
Question 3) A. WPA2
Question 4) B. OSI model bottom-to-top
Question 5) B.Interference
Question 6) A, D. Duplicate IP address, Exhausted DHCP scope
Question 7) A. THypervisor
Question 8) A. PDoS
Question 9) D. EMI
Question 10) A. protect sensitive data from the rest of the network.