ESSENTIALS (VERSION 7.0) - SRWEV7
PRACTICE FINAL EXAM 100% SOLVED
, An employee connects wirelessly to the company network using a cell phone. The
employee then configures the cell phone to act as a wireless access point that will allow
new employees to connect to the company network. Which type of security threat best
describes this situation? - ANSWERrogue access point
What are the two methods that a wireless NIC can use to discover an AP? (Choose
two.) - ANSWERtransmitting a probe request
receiving a broadcast beacon frame
What is a result of connecting two or more switches together? - ANSWERThe size of
the broadcast domain is increased.
A small publishing company has a network design such that when a broadcast is sent
on the LAN, 200 devices receive the transmitted broadcast. How can the network
administrator reduce the number of devices that receive broadcast traffic? -
ANSWERSegment the LAN into smaller LANs and route between them.
What are two switch characteristics that could help alleviate network congestion?
(Choose two.) - ANSWERfast internal switching
large frame buffers
A network engineer is configuring a LAN with a redundant first hop to make better use
of the available network resources. Which protocol should the engineer implement? -
ANSWERGLBP
What is an advantage of PVST+? - ANSWERPVST+ optimizes performance on the
network through load sharing.
Which problem is evident if the show ip interface command shows that the interface is
down and the line protocol is down? - ANSWERA cable has not been attached to the
port.
Which command would create a valid IPv6 default route? - ANSWERipv6 route ::/0
2001:db8:acad:2::a
A junior technician was adding a route to a LAN router. A traceroute to a device on the
new network revealed a wrong path and unreachable status. What should be done or
checked? - ANSWERCheck the configuration of the exit interface on the new static
route.
What type of VLAN is configured specifically for network traffic such as SSH, Telnet,
HTTPS, HTTP, and SNMP? - ANSWERmanagement VLAN