Q1. Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?
A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator's password
D. Via SNMP using the default RO community
Answer: B
Q2. Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
A. RS-232
B. 56k modem
C. Bluetooth
D. Codec
E. SIP
Answer: DE
Q3. A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos
Answer: A
Q4. Which of the following protocols must be implemented in order for two switches to share VLAN information?
A. VTP
B. MPLS
C. STP
D. PPTP
Answer: A
Q5. A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?
A. MLA
B. MOU
C. SOW
D. SLA
Answer: C
Q6. The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?
A. Vendor documentation
B. Recent backups
C. Physical IP address
D. Physical network diagram
Answer: B
Q7. When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?
A. Transport layer
B. Physical layer
C. Network layer
D. Session layer
Answer: B
Q8. Network segmentation provides which of the following benefits?
A. Security through isolation
B. Link aggregation
C. Packet flooding through all ports
D. High availability through redundancy
Answer: A
Q9. Which of the following is an example of an IPv4 address?
A. 192:168:1:55
B. 192.168.1.254
C. 00:AB:FA:B1:07:34
D. ::1
Answer: B
Q10. While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
A. Maximum cable length exceeded
B. Dirty connectors
C. RF interference caused by impedance mismatch
D. Bend radius exceeded
Answer: D