Question 171: A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?
Question 172: A network technician receives a new firmware update for a network device. The technician wants to ensure the file has not been tampered with. Which of the following techniques should the technician use to ensure the integrity of the file?
A. Cyclic redundancy check
B. System integrity check
C. Hash comparison
D. Root guard
Question 173: An AP is configured to authenticate clients by using their Active Directory username and password. The AP uses UDP to connect to the authentication service, which then queries Active Directory. Which of the following authentication services is being used by the AP in this scenario?
Question 174: Which of the following should be configured on the network to achieve performance for the FCoE storage traffic?
B. DHCP snooping
C. Jumbo frames
D. Virtual IP
Question 175: Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?
B. Frame relay
Question 176: A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?
Question 177: A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day’s upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?
A. Confirm the patch’s MD5 hash prior to the upgrade.
B. Schedule the switches to reboot after an appropriate amount of time.
C. Download each switch’s current configuration before the upgrade.
D. Utilize FTP rather than TFTP to upload the patch.
Question 178: A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?
B. Remote file access
C. Split tunneling
Question 179: The length of an IPv6 address is:
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Question 180: A network technician is troubleshooting a problem with a user’s client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue?
A. Reconfigure the user’s VPN connection in the router to fix profile corruption.
B. Inform the user that provisioning sometimes fails and the connection needs to be attempted again.
C. Review the logs in the VPN client to check for any informational messages.
D. Verify the system has the latest OS patches installed.