Netzwerk Englisch

Fragen Englisch

Fragen Englisch


Set of flashcards Details

Flashcards 96
Language English
Category General Education
Level Primary School
Created / Updated 08.02.2015 / 07.06.2016
Weblink
https://card2brain.ch/box/netzwerk_englisch
Embed
<iframe src="https://card2brain.ch/box/netzwerk_englisch/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Q18
Users are reporting that some Internet websites are not accessible anymore. Which of thefollowing will allow the network administrator to quickly isolate the remote router that is
causing the network communication issue, so that the problem can be reported to the appropriate responsible party?

Q23
Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?

Q29
Which of the following protocols works at the LOWEST layer of the OSI
model?

Q33
At which of the following layers of the OSI model does ASCII work?

Q38
Which of the following DNS records is used to identify a domain's SMTP server?

Which of the following is a path vector routing protocol?

Which of the following routing protocols utilizes the DUAL algorithm for determining best path?

Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?

Which of the following is always true when a router selects a destination?

Q88
Which of the following connectors is usable in SFP modules?

Q89
A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST
likely cause of the problem?

Q91
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Q105
Some employees are unable to maintain a wireless network connection. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and
Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?

Building ABuilding BBuilding C
Channel: 1Channel: 6Channel: 11
Encryption: WPA2Encryption: OpenEncryption: WPA2
SSID. CorpSSID. GuestSSID. Sales

Q108
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?

Q118
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?

Which of the following technologies can cause interference for 802.11g?

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?

Q178
While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those
ports FIRST?

Q179
Which of the following technologies is used on cellular networks?

Q193
A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Q199
A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?

Q204
A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the
wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?

Q212
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

Q229
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?

Q231
Which of the following is the control when observing network bandwidth patterns over time?

Q234
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent
any further attacks from that IP address?

Q236
Which of the following attacks would allow an intruder to do port mapping on a company's internal server from a separate company server on the Internet?

Q242
Which of the following security appliances are used to only identify traffic on individual systems?

Q253
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party
tampering?

Q254
Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?

Q262
Which of the following would be the BEST solution for an IDS to monitor known attacks?

Q278
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Q279
A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which
of the following would MOST likely be installed?

Q285
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

Q287
Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?

Q297
A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer's IP addresses:
192.168.2.70
192.168.2.100
192.168.2.125
192.168.2.130
When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?

Q320
Which of the following provides RSA encryption at the session layer?

Q322
A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

Q329
Which of the following would be used to run an instance of a Layer 2 device within an application?

Q335
A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access
points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended?