1.
A company plan established to resume normal system operations following a disruption in business would be described as which of the following?
2.
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance?
3.
A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue?
4.
There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable reason the vendor made this suggestion?
5.
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?
6.
A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the future?
7.
A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel. The technician has cabled this port to be used with which of the following?
8.
Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?
9.
A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk?
10.
A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php
Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the
freesmartphone.it domain?