Question 101: A technician is utilizing SNMPv3 to monitor network statistics. Which of the following actions would occur immediately of a server’s utilization spikes above the prescribed value?
A. A trap message is sent via UDP to the monitoring workstation.
B. The SET function pushes an alert to the MIB database.
C. The object identifier is modified and reported during the next monitoring cycle.
D. A response message is sent from the agent to the manager.
Question 102: 802.11n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect?
B. Range extender
C. VoIP endpoint
D. Access point
Question 103: A Chief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the company’s network devices. Which of the following is the MOST secure way to prevent this?
A. ACL allowing only HTTP
B. ACL allowing only Telnet
C. Out-of-band modem
D. Out-of-band console router
Question 104: The Chief Executive Officer’s (CEO’s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?
Question 105: A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be specifically configured to allow VPN traffic into the network?
Question 106: A network technician is repurposing a switch that has been in storage for some time. The device has been wiped to factory defaults. Which of the following should be done FIRST to ensure the device has been hardened before configuration?
A. Generate new keys.
B. Disable unused ports.
C. Check for updated firmware.
D. Configure the default VLAN.
Question 107: A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?
Question 108: A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
A. Perform antivirus and anti-malware scans of the file.
B. Perform a hash on the file for comparison with the vendor’s hash.
C. Download the file a second time and compare the version numbers.
D. Compare the hash of the file to the previous firmware update.
Question 109: A network technician performs a wireless site survey at a company building and identifies that the cafeteria is not covered by a wireless signal. The cafeteria is located in a medium-size, square-shaped room. Which of the following types of WAP antenna should the technician install in the center of the cafeteria to provide the BEST coverage?
Question 110: An entire enterprise cannot access a specific website. The network technician knows the website was accessible last week. The technician can also ping the website. Which of the following is the technician MOST likely to find upon investigation?
A. The firewall is misconfigured.
B. The network is being hit by a zero-day attack.
C. The SSL certificate is untrusted.
D. The SSL certificate has expired.