Q1. A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST?
A. Compatibility requirements
B. Environment limitations
C. Cable length
D. Equipment limitations
Answer: B
Q2. A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup?
A. iSCSI SAN
B. FCoE SAN
C. NAS
D. USB flash drive
Answer: C
Q3. Which of the following WAN technologies is associated with high latency?
A. T1
B. Satellite
C. Cable
D. OCx
Answer: B
Q4. A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats?
A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP
Answer: D
Q5. A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?
A. APIPA
B. MAC
C. Static
D. Public
Answer: A
Q6. A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?
A. Configure an automated patching server
B. Virtualize the servers and take daily snapshots
C. Configure a honeypot for application testing
D. Configure a test lab for updates
Answer: D
Q7. Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?
A. CSMA/CD
B. OSPF
C. DOCSIS
D. BGP
Answer: A
Q8. Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?
A. SOP
B. BEP
C. AUP
D. SLA
Answer: C
Q9. A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?
A. Document the findings and action taken.
B. Establish a plan to locate the rogue DHCP server.
C. Remove the rogue DHCP server from the network.
D. Identify the root cause of the problem.
Answer: B
Q10. Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
A. BGP
B. OSPF
C. IS-IS
D. MPLS
Answer: D