Netzwerk Englisch

Fragen Englisch

Fragen Englisch


Set of flashcards Details

Flashcards 96
Language English
Category General Education
Level Primary School
Created / Updated 08.02.2015 / 07.06.2016
Weblink
https://card2brain.ch/box/netzwerk_englisch
Embed
<iframe src="https://card2brain.ch/box/netzwerk_englisch/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Q346
A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance?

Q356
A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

Q362
Which of the following records allows for reverse DNS lookups?

Q380
A technician can increase the bandwidth of an 802.11n cell by:

Q381
Which of the following is a requirement for bridging with 802.11a?

Q389
Which of the following protocols does DNS utilize on port 53?

Q392
Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).

Q399
Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?

Q410
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

Q412
A user has three different subnets in an office. Which of the following can be configured to allow two of the subnets to communicate directly with each other at the switch level?

Q420
Which of the following provides the STRONGEST security for a tunneled connection over the Internet?

Q422
Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?

Q440
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

Q455
A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

Q456
Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?

Q463
Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

Q467
Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

Q475
Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which
action should the technician take to correct Ann's problem?

 

Computer_ASwitch_A
IP: 10.0.0.60Int VLAN10
SM: 255.255.255.0IP address 10.0.0.1/28
GW: 10.0.0.1Speed 100 Duplex Full

Q476
A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the
technician use to complete this objective QUICKEST?

Q488
A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client's
wireless network to help ensure that interference from other wireless networks is at a minimum?

Q496
Ann, a technician, installs a wireless router in a network closet in a large office. She then configures all workstations in various offices on that floor to use the wireless connection. Maximum connection speed at each workstation is 54 Mbps. Some users complain that their
network connection is very slow. Which of the following is MOST likely the problem?

Q501
Which of the following is used to determine whether or not a user's account is authorized to access a server remotely?

Q512
A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to
point out the phone system vulnerability?

Q523
Which of the following is a link state routing protocol?

Q526
Which of the following needs to be configured on a switch to use a packet sniffer?

Q534
Which of the following DNS records allows for reverse lookup of a domain?

Q539
Several users from the same building are reporting connectivity issues. The SFP at that building’s IDF switch is showing a link light, but there is no link light to the corresponding switch’s SFP at the MDF. Which of the following is the MOST likely cause?

Q546
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?

Q557
Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?

Q561
A technician has replaced the Internet gateway router, and now no users can reach the Internet.
The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem?

Q566
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

Q585
An organization wants to perform maintenance on any of its web servers without affecting the
service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?

Q589
Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?

Q593
Which of the following devices can be used to offload outbound web server SSL encryption overhead?

Q595
An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?

Q599
Which of the following refers to the telephone company’s endpoint at a service location?

Q607
A technician notices that the application server’s resources are momentary at full capacity for the amount of incoming and outgoing packets outside the LAN. Which of the following tools
would be used to find out what IPs are connecting to the server and in active mode?

Q612
A technician is configuring a wireless network. Which of the following should the technician setup in order to prevent intruders if the encryption key gets compromised?

Q630
Which of the following would BEST be described as a central connection point for secured client access to a private network from a public network?