1. A customer has submitted a request for a new wireless connection in the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration?
A) A. The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. B) B. The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. C) C. The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. D) D. The LAN and WLAN should be configured in separate zones with a firewall in between.
2. A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?
A) A. Expired IP address B) B. Exhausted dynamic scope C) C. Misconfigured VLSM D) D. Rogue DHCP server
3. A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?
A) A. Change management B) B. Network diagrams C) C. Inventory report D) D. Labeling report
4. A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?
A) A. VLAN routing B) B. Server-based firewall configuration issue C) C. Patch cable type D) D. DHCP scope availability
5. Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?
A) A. Inventory management B) B. Wiring and port location C) C. Configuration baseline D) D. Standard operating procedure
Leave a comment