Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CompTIA N10-009 Dumps

Page: 1 / 51
Total 511 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

Which of the following network access methods is used to securely access resources, such as a corporate cloud or network, as if they were directly connected?

Options:

A.

Jump box/host

B.

Secure Shell

C.

Client-to-site VPN

D.

GRE tunnel

Question 2

An organization wants better network visibility. The organization ' s requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Question 3

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Question 4

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company ' s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company ' s network.

Question 5

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Question 6

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Question 7

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

Options:

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Question 8

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

Options:

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Question 9

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

as

Which of the following is the most likely cause of the user ' s connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Question 10

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 11

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

Options:

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Question 12

Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?

Options:

A.

OSPF

B.

EIGRP

C.

FHRP

D.

RIP

Question 13

A network administrator is responding to a request to configure a new IP phone. Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?

Options:

A.

Configure full duplex.

B.

Modify QoS.

C.

Enable 802.1Q tagging.

D.

Change the native VLAN.

Question 14

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

Options:

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Question 15

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 16

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

as

as

Options:

Question 17

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Question 18

Which of the following would most likely be used to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question 19

Which of the following protocols is used to route traffic on the public internet?

Options:

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Question 20

An imaging workstation at a hospital is experiencing intermittent connectivity loss. Which of the following would most likely be used to resolve the issue at the least expense?

Options:

A.

Single-mode fiber

B.

Twinaxial cable

C.

Spanning tree

D.

Shielded twisted pair

Question 21

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

Options:

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Question 22

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Question 23

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Question 24

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Question 25

A user ' s home mesh wireless network is experiencing latency issues. A technician has:

•Performed a speed test.

•Rebooted the devices.

•Performed a site survey.

•Performed a wireless packet capture.

The technician reviews the following information:

as

The technician notices in the packet capture that frames were retransmitted. Which of the following is the most likely cause of the user ' s network issue?

Options:

A.

The SSIDs should not be the same.

B.

The network has too much overlap.

C.

The devices are incompatible with the mesh network.

D.

The nodes are underpowered.

Question 26

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Question 27

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Question 28

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Question 29

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

Options:

A.

GRE

B.

IKE

C.

ESP

D.

AH

Question 30

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

Options:

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Question 31

A network technician is troubleshooting a web application ' s poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

Options:

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Question 32

Which of the following does a hash provide?

Options:

A.

Non-repudiation

B.

Integrity

C.

Confidentiality

D.

Availability

Question 33

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Question 34

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 35

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 36

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Question 37

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

as

as

as

as

as

as

as

Options:

Question 38

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Question 39

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Question 40

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Question 41

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

Options:

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Question 42

Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?

Options:

A.

BGP

B.

STP

C.

OSPF

D.

RIP

Question 43

A network administrator ' s device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Question 44

Which of the following best describes the purpose of a UPS and PDU in a network installation?

Options:

A.

To support voltage requirements for devices in an IDF

B.

To manage power consumption in the MDF

C.

To connect multiple devices to a single network connection

D.

To regulate temperature in the MDF and IDF

Question 45

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Question 46

Which of the following protocols uses the Dijkstra ' s Link State Algorithm to establish routes inside its routing table?

Options:

A.

OSPF

B.

EIGRP

C.

BGP

D.

RIP

Question 47

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

Options:

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Question 48

Which of the following is a major difference between an IPS and IDS?

Options:

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

Question 49

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Question 50

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question 51

A company is implementing a new internal network in which all devices use IPv6 addresses. Which of the following routing protocols will be best for this setup?

Options:

A.

EIGRP

B.

OSPFv3

C.

BGP4

D.

iBGP

Question 52

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Question 53

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Question 54

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

Options:

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Question 55

A technician is designing a cloud service solution that will accommodate the company ' s current size, compute capacity, and storage capacity. Which of the following cloud deployment models will fulfill these requirements?

Options:

A.

SaaS

B.

PaaS

C.

IaaS

D.

IaC

Question 56

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Question 57

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers ' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Question 58

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Question 59

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Question 60

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Question 61

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

Options:

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Question 62

Which of the following impacts the availability of a web-based customer portal?

Options:

A.

MAC flooding

B.

ARP spoofing

C.

DoS

D.

Rogue devices

Question 63

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Question 64

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

Options:

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Question 65

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

Options:

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Question 66

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 67

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

Options:

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Question 68

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

Options:

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Question 69

Users at an organization report that the wireless network is not working in some areas of the building. Users report that other wireless network SSIDs are visible when searching for the network, but the organization ' s network is not displayed. Which of the following is the most likely cause?

Options:

A.

Interference or channel overlap

B.

Insufficient wireless coverage

C.

Roaming misconfiguration

D.

Client disassociation issues

Question 70

Which of the following is the MOST appropriate solution to extend the network to a building located across the street from the main facility?

Options:

A.

Multimode fiber

B.

802.11ac wireless bridge

C.

Cat 6 copper

D.

Loopback adapter

Question 71

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Question 72

Which of the following would most likely be used as a replacement for a traditional VPN for remote users?

Options:

A.

SD-WAN

B.

SASE

C.

Site-to-site VPN

D.

Reverse proxy

Question 73

Which of the following is the best way to keep devices on during a loss of power?

Options:

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Question 74

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Question 75

Which of the following does a router prioritize first in the route selection process?

Options:

A.

Prefix length

B.

Metric

C.

Administrative distance

D.

Default route

Question 76

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question 77

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

Options:

Question 78

A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?

Options:

A.

Network congestion

B.

Wireless interference

C.

Signal degradation

D.

Client disassociation

Question 79

A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?

Options:

A.

APIPA

B.

Multicast

C.

Class C

D.

Experimental

Question 80

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Question 81

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Question 82

Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question 83

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

Options:

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Question 84

A network administrator configures a new network discovery tool and is concerned that it might disrupt business operations. Which of the following scan types should the administrator configure?

Options:

A.

Authenticated

B.

Ad hoc

C.

Unauthenticated

D.

Scheduled

Question 85

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Question 86

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 87

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

Options:

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Question 88

In the troubleshooting methodology, which of the following actions comes after verifying that the initial problem has been resolved?

Options:

A.

If necessary, escalating the issue

B.

Attempting to replicate the problem

C.

Documenting findings

D.

Implementing the plan

Question 89

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Question 90

A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?

Options:

A.

Create a plan of action

B.

Implement a solution

C.

Identify the problem

D.

Test the theory

Question 91

A customer wants to separate the finance department from the marketing department. The network administrator suggests segmenting the existing Class C network into two sections and readdressing all devices appropriately. Which of the following subnet masks should the network administrator use?

Options:

A.

/24

B.

/25

C.

/26

D.

/27

Question 92

Which of the following offers the ability to manage access at the cloud VM instance?

Options:

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Question 93

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 94

Which of the following does BGP use for loop avoidance?

Options:

A.

Autonomous system path

B.

Peer autonomous system

C.

Autonomous system length

D.

Public autonomous system

Question 95

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question 96

Two network switches at different locations are connected via fiber-optic cable at a distance of 10 miles (16 km). The duplex fiber-optic patch cord between the patch panel and switch is accidentally pinched, stopping connectivity between the two switches. A network technician replaces the broken cable with a new, single-mode patch cord. However, connectivity between both switches is still down and the link lights are still off. Which of the following actions should the technician perform first?

Options:

A.

Replace the fiber-optic transceiver in the switch

B.

Log in to the switch to shut down and re-enable the switchport

C.

Transpose the two fiber connectors at one end of the new patch cord

D.

Swap the single-mode fiber patch cord with a multimode fiber patch cord

Question 97

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Question 98

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Question 99

Which of the following ports is used to transfer data between mail exchange servers?

Options:

A.

21

B.

25

C.

53

D.

69

Question 100

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

Options:

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Question 101

In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?

Options:

A.

Subinterfaces

B.

VXLAN

C.

Layer 3 switch

D.

VIR

Question 102

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

Options:

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Question 103

A company recently experienced outages of one of its critical, customer-facing applications. The root cause was an overutilized network router, but the Chief Technology Officer is concerned that the support staff was unaware of the issue until notified by customers. Which of the following is the best way to address this issue in the future?

Options:

A.

Packet capture

B.

SNMP

C.

Syslog collector

D.

SIEM

Question 104

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

Options:

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Question 105

A company implements a new network utilizing only IPv6 addressing and needs to connect to the internet. Which of the following must be enabled in order for the internal network to contact servers on the internet?

Options:

A.

MPLS

B.

NAT64

C.

GRE

D.

Static routing

Question 106

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

Options:

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Question 107

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

Options:

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Question 108

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Question 109

After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?

Options:

A.

SSO

B.

LDAP

C.

MFA

D.

SAML

Question 110

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 111

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 112

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

Options:

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Question 113

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

Question 114

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Question 115

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Question 116

Which of the following is the best example of a networking appliance that connects different network segments and directs allowed traffic between specific segments?

Options:

A.

Firewall

B.

IDS

C.

Unmanaged switch

D.

(Not provided)

Question 117

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

Options:

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Question 118

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

as

Which of the following should the technician most likely do to resolve the issue?

Options:

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Question 119

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Question 120

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Question 121

A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

Options:

A.

Identify the problem

B.

Establish a theory

C.

Document findings

D.

Create a plan of action

Question 122

Which of the following network traffic types is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 123

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

Options:

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Question 124

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

Options:

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Question 125

A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?

Options:

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Question 126

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements > ?

Options:

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Question 127

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Question 128

A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?

Options:

A.

Incorrect default gateway

B.

Faulty Ethernet cable

C.

Wrong duplex settings

D.

VLAN mismatch

Question 129

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

Options:

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

Question 130

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Question 131

Which of the following typically uses compromised systems that become part of a bot network?

Options:

A.

Evil twin attack

B.

DDoS attack

C.

XML injection

D.

Brute-force password attack

Question 132

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question 133

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Question 134

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Options:

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Question 135

Which of the following types of network architecture typically uses leased lines to provide dedicated, private connections between multiple satellite offices and a head office?

Options:

A.

Mesh

B.

Point to point

C.

Hub and spoke

D.

Star

Question 136

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

Options:

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Question 137

Which of the following OSI model layers manages the exchange of HTTP information?

Options:

A.

Session

B.

Data link

C.

Network

D.

Application

Question 138

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Question 139

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Question 140

A company’s VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN. Which of the following should be configured?

Options:

A.

802.1Q tagging

B.

Jumbo frames

C.

Native VLAN

D.

Link aggregation

Question 141

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Question 142

Three new employees report that they are unable to access company resources, but they can connect to each other’s devices. Which of the following would most likely need to be modified to resolve the issue?

Options:

A.

The routing table on the gateway

B.

The DNS configuration on the router

C.

The pool on the DHCP server

D.

The firewall on the workstation

Question 143

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 144

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

Options:

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Question 145

A network architect is implementing an off-premises computing facility and needs to ensure that operations will not be impacted by major outages. Which of the following should the architect consider?

Options:

A.

Hot site

B.

DCI

C.

Direct Connect

D.

Active-passive approach

Question 146

Which of the following allows a standard user to log in to multiple resources with one account?

Options:

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Question 147

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Question 148

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

Options:

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

Question 149

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 150

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Question 151

A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine the issue? (Select two).

Options:

A.

nslookup

B.

tcpdump

C.

arp

D.

dig

E.

tracert

F.

route print

Question 152

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Question 153

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Page: 1 / 51
Total 511 questions