1. Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use?
A) A. 3DES encryption B) B. SSL certificate C) C. Digital signatures D) D. MD5 hash
2. A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network?
A) A. Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. B) B. Move the straight-through Ethernet cable connecting the switches to the first port on both switches. C) C. Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. D) D. Add a second cable connecting the switches for redundancy and disabling STP on both switches.
3. A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?
A) A. Loopback adapter B) B. Tone generator C) C. Multi-meter D) D. Punchdown tool
4. A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)(Select 2answers)
A) A. Disabling unused ports B) B. Upgrading firmware C) C. Using secure protocols D) D. File hashing E) E. MAC filtering F) F. Configuring a honeypot
5. Which of the following technologies should be used in high-throughput network to reduce network overhead?
A) A. iSCSI B) B. QoS tags C) C. Port aggregation D) D. Jumbo frames
Leave a comment