Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA N10-007 CompTIA Network+ N10-007 Exam Practice Test

Page: 1 / 69
Total 688 questions

CompTIA Network+ N10-007 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?

Options:

A.

Insider threat

B.

War driving

C.

Evil twin

D.

Honeypot

Question 2

A new printer was assigned a static IP address within the DHCP scope of a QA subnet. There are 243 workstations on the LAN five servers, and four existing printers on the network. The network administrator configured the network with the following parameters:

192.168.51 -192 168.5 5 static IPs assigned to servers

192.168.5.6 -192 168.5 250 DHCP scope for workstations

192.168.5.251 -192.168.5 254 static IPs assigned to printers

Which of the following should the network administrator perform to minimize the disruption to the users and keep the LAN secure while setting up the new printer?

Options:

A.

Increase the DHCP scope by one address

B.

Create an IP reservation for the printer

C.

Assign a public IP address to the printer.

D.

Reconfigure the subnet mask for the LAN

Question 3

A network team has reopened multiple outages caused by unauthorized access to the IDF. Which of the following would BEST prevent this issue from reoccurring?

Options:

A.

Video surveillance

B.

Badge readers

C.

Motion sensors

D.

Tamper switches

Question 4

A network engineer is deploying a new PBX for a customer. Although all new phones will be IP-based, the office will still use a few POTS-based phones and a fax line. Which of the following will be needed to connect the fax line?

Options:

A.

RJ11

B.

RJ45

C.

DB-9

D.

F-type

Question 5

A user is reporting poor network performance A network technician starts by looking at port statistics on that user's connected switchport. The technician notices there is a high level of collisions on the port. Which of the following is the MOST likely cause?

Options:

A.

The port or user's NIC is set to auto-MDIX

B.

The port and/or user's NIC Is set to half-duplex

C.

The port and/or user's NIC Is set to the wrong MTU.

D.

The port and user's NIC are set to different speeds.

Question 6

A customer has asked a technician to upgrade the wireless router to the fastest speed possible. The technician performs a site survey and notices several older devices will not be able to connect to router that operates In the 5GHz range. Which of the following options should the technician suggest to the customer?

Options:

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11n

Question 7

A technician is installing and configuring a SOHO network from a DOCSIS compliant ISP. Which of the following requires installation at the customer’s site?

Options:

A.

Access point

B.

Bridge

C.

Firewall

D.

Modern

Question 8

A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same

equipment?

Options:

A.

MIMO

B.

TKIP

C.

LTE

D.

SSID

Question 9

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?

Options:

A.

Ethernet collisions

B.

A DDoS attack

C.

A broadcast storm

D.

Routing loops

Question 10

The main purpose of jumbo frames is to increase the:

Options:

A.

timeout value to ensure critical data is received

B.

VLAN ID field to allow for higher-numbered VLANs.

C.

MTU size to pass more data quicker

D.

TTL value to pass data further across the network

Question 11

Which of the following BEST describes a VLAN hopping attack?

Options:

A.

An attacker gains unauthorized access to a network by overflowing the CAM table.

B.

An attacker gains unauthorized access to a network by placing a rogue AP on the network.

C.

An attacker gains unauthorized access to a network by using double-tagged packets.

D.

An attacker gains unauthorized access to a network by scanning and mapping it.

Question 12

A malicious traffic exiting the network on a specific port. The technician is working with the security team to modify the ACL on the company's firewall. Which of the following should be updated immediately?

Options:

A.

Change management documentation

B.

IDP documentation

C.

Standard operating procedures

D.

Incident response policy

E.

Data loss prevention policy

Question 13

A coffee shop wants to provide WiFi to Its customers. The shop wishes to support as many devices as possible, so it wants to support all available frequencies. Which of the following 802.11 standards should the coffee shop utilize to meet this requirement?

Options:

A.

a

B.

b

C.

g

D.

n

Question 14

A network engineer is reviewing a construction proposal for improving the roadways on a campus. The engineer needs to determine if any of the fiber infrastructure between the buildings will need to be relocated. Which of the following will the engineer MOST likely use to make the determination?

Options:

A.

Logical network topology

B.

Network rack diagrams

C.

A physical network diagram

D.

An MDF diagram

Question 15

A network manager is reviewing recent changes after learning the network health metrics are no longer being recorded. The manager discovers the ACL has been updated to the following:

Which of the following lines in the ACL points to the issue?

Options:

A.

Line 1

B.

Line 2

C.

Line 3

D.

Line 4

E.

Line 5

Question 16

A company recently implemented a new VoIP solution to replace copper lines that cost too much to maintain. Users have been complaining of the voice quality when they are on phone calls, and management wants the network team to address the concerns. Which of the following should the network team do to improve the performance and security of the VoIP phones?

Options:

A.

Set up an in-house server to process the voice traffic and install repeaters to boost the voice signals at regular intervals.

B.

Install the VoIP phones in line with the users' workstations so the operating system relieves some of the processing load.

C.

Set up a VLAN for the phones and QoS throughout the network to prioritize the traffic.

D.

Open more ports on the router so the phone traffic does not have to wait for a used port to be released, cutting down on user delay.

Question 17

A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site?

Options:

A.

Enable an IPSec tunnel.

B.

Enable RDP access to the firewall.

C.

Enable port 80 access.

D.

Enable Telnet access to the firewall

Question 18

Which of the following DNS record types assists with the routing of email?

Options:

A.

MX

B.

PTR

C.

SRV

D.

AAAA

Question 19

Which of the following technologies requires a username and password to authenticate to a backbone network?

Options:

A.

PPPoE

B.

MPLS

C.

ATM

D.

SIP

Question 20

A network technician is upgrading the software on a switch, but the switch will no longer boot after the upgrade. Which of the following should the network technician have verified before the upgrade?

Options:

A.

Unnecessary services disabled

B.

Secure protocols in use .

C.

Firmware file hash

D.

Network ports disabled

Question 21

An engineer is rebooting a remote server after applying monthly patches. The patches are large and may take the server down for up to 20 minutes. The engineer wants to know exactly when the server

comes up. The server's static IP address is 192.10.10.54. Which of the following commands can the engineer issue to accomplish this task?

Options:

A.

ping -t 192.10.10.54

B.

tracert -D 192.10.10.54

C.

arp ~a 192.10.10.54

D.

nslookup 192.10.10.54

Question 22

A wireless administrator needs to implement an authentication method that provides individualized, scalable security for the users of a WLAN where roaming is a regular event. PKI is not available. Which of the following BEST addresses the requirements of this topology?

Options:

A.

TLS

B.

MAC filtering

C.

TKIP-RC4

D.

EAP-FAST

Question 23

Which of the following BEST explains why a firewall would be subject to international export controls?

Options:

A.

Protected industry

B.

IP version incompatibility

C.

Differing power standards

D.

Encryption technology

Question 24

Which of the following do ports allow for in TCP/IP communication?

Options:

A.

Multiple connections using a single socket

B.

Multiple pings that can be sent from a computer

C.

Multiple web browsers that can be used on a computer

D.

Multiple connections using a single IP address

Question 25

The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?

Options:

A.

SaaS

B.

PaaS

C.

CaaS

D.

laaS

Question 26

Which of the following policies is MOST commonly used for guest captive portals?

Options:

A.

AUP

B.

DLP

C.

BYOD

D.

NDA

Question 27

A network technician needs to visit a datacenter. To be admitted, the security officer requests to see a driver's license, and then directs the technician to a fingerprint scanner. Which of the following authentication factors is the facility requiring for admittance? (Select TWO).

Options:

A.

Something you have

B.

Something you know

C.

Something you do

D.

Something you are

E.

Somewhere you are

Question 28

A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients?

Options:

A.

Migrate the clients to 802.11a NICs.

B.

Disable 802.11n.

C.

Disable the 2.4GHz radio

D.

Use omnidirectional antennas

Question 29

To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

Options:

A.

WPA2-Personal

B.

WPA2-Enterprise

C.

WPA

D.

WEP

Question 30

A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any risks associated with the wireless signal propagating outside of the facility. Which of the following has the administrator implemented?

Options:

A.

NAC

B.

Implicit deny

C.

WPA2

D.

Geofencing

Question 31

A network technician is attempting to locate a server in a large datacenter that has no connectivity. Which of the following is the BEST reference for the technician to use?

Options:

A.

Port locations

B.

Rack diagrams

C.

Network configuration

D.

Logical diagrams

Question 32

A client moving into a new office wants the IP network set up to accommodate 412 network-connected devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result?

Options:

A.

255.255.0.0

B.

255.255.252.0

C.

255.255.254.0

D.

255.255.255.0

Question 33

Which of the following would MOST likely provide continuous power during a short brownout?

Options:

A.

Uninterruptible power supply

B.

Hot site

C.

Cold site

D.

Generator

E.

Redundant power supplies

Question 34

A network engineer was alerted to a break in a primary fiber-optic data cable. In which of the following OSI layers was this issue found?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Question 35

Which of the following allows for connectionless communications?

Options:

A.

TGP

B.

MAG

C.

UDP

D.

IF

Question 36

A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?

Options:

A.

IDS

B.

IPS

C.

Layer 7 firewall

D.

RADIUS server

Question 37

A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

Options:

A.

File hash

B.

Encryption

C.

FCS

D.

Compression

Question 38

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

Options:

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Question 39

A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:

Options:

A.

use a configuration management server

B.

configure a multilayer switch

C.

install a wireless controller

D.

use a proxy server

Question 40

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

Options:

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Question 41

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?

Options:

A.

The address provided by the ISP has a mask that is too small to be used and needs a larger mask.

B.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

C.

The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.

D.

The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Question 42

A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?

Options:

A.

MAC filtering

B.

WPA-PSK

C.

802.1X

D.

Geofencing

Question 43

A technician is installing a SOHO router. Which of the following should be performed on every installation and periodically maintained to prevent unauthorized access? (Choose two.)

Options:

A.

Disable remote management

B.

Update the router firmware

C.

Disable port forwarding

D.

Use complex passwords

E.

Disable the SSID broadcast

Question 44

Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?

Options:

A.

Spanning port

B.

Port forwarding

C.

Port mirroring

D.

Port tagging

Question 45

Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?

Options:

A.

Switching loop

B.

ARP cache poisoning

C.

Improperly tagged ports

D.

Wrong VLAN assignment

E.

Duplicate IP addresses

Question 46

A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?

Options:

A.

SSH

B.

VNC

C.

RDP

D.

HTTPS

Question 47

A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

Options:

A.

Configure MIMO.

B.

Remove the channel overlap.

C.

Add another AP.

D.

Adjust the security type.

Question 48

A technician restored network connectivity on a user’s laptop. After validating full system functionality, which of the following steps should the technician take NEXT?

Options:

A.

Duplicate the problem, if possible

B.

Determine if anything has changed

C.

Test the theory to determine the cause

D.

Document the findings, actions, and outcomes

Question 49

Which of the following routing conventions is known as a link-state protocol?

Options:

A.

RIP

B.

BGP

C.

EIGRP

D.

OSPF

Question 50

A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?

Options:

A.

MU-MIMO

B.

MIMO

C.

Channel bonding

D.

TDM

E.

Automatic channel selection

Question 51

A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?

Options:

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Question 52

A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?

Options:

A.

Gateway: 10.10.10.1

Netmask: 255.255.255.192

B.

Gateway: 172.15.18.128

Netmask: 255.255.255.224

C.

Gateway: 192.168.1.97

Netmask: 255.255.255.224

D.

Gateway: 224.102.113.65

Netmask: 255.255.255.192

Question 53

A network technician attempts to limit access to a wireless network by using WPA2 and a pre-shared key; however, employees have been sharing this key with others. Which of the following methods should the technician configure on the wireless access point to ensure only corporate systems can connect using the least amount of effort?

Options:

A.

RADIUS

B.

EAP-TLS

C.

Port security

D.

MAC filtering

Question 54

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 55

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

Options:

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Question 56

A technician installed a new fiber optic cable to connect two sites. Although there is a link light on the port at each site, the customer reports traffic is dropping intermittently. Which of the following should the technician do NEXT to troubleshoot the issue?

Options:

A.

Check the interfaces for CRC errors.

B.

Check for a VLAN mismatch.

C.

Check for a TX/RX reverse on the connector.

D.

Check that the pinout is correct.

Question 57

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

Options:

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Question 58

A new DSL circuit was installed to replace the cable service and is not functioning. A network administrator needs to create a cable to connect the circuit. Which of the following connector types should the network administrator use on the cable?

Options:

A.

RJ11

B.

RJ45

C.

DB-25

D.

BNC

Question 59

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Options:

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Question 60

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

Options:

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Question 61

A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

Options:

A.

Non-disclosure policy

B.

Data loss prevention policy

C.

Acceptable use policy

D.

Incident response policy

Question 62

A user wants to secure a network closet and be able to tell if anyone makes changes in the closet. Which of the following would be the BEST detective physical security devices in this situation? (Choose two.)

Options:

A.

Anti-tampering

B.

Badges

C.

Door locks

D.

Key fob

E.

Motion detection

F.

Video surveillance

Question 63

A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?

Options:

A.

Logical diagram

B.

Change management

C.

IDF documentation

D.

Configuration baseline

Question 64

Which of the following statements about the OSI model is true?

Options:

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Question 65

A switch vendor recently released a patch to fix a critical vulnerability found in its switch OS. Which of the following should a network administrator do NEXT according to best practices?

Options:

A.

Test the patch in a test environment.

B.

Put the patch into production immediately.

C.

Put the patch into production with a rollback plan.

D.

Choose a single production switch and pilot the patch.

E.

Put the patch into production at the next maintenance window.

Question 66

A network technician is supporting a library system that w ants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?

Options:

A.

IR

B.

Bluetooth

C.

PAN

D.

RFID

Question 67

A network technician is reviewing the following output from a router:

Which of the following is this an example of?

Options:

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Question 68

First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?

Options:

A.

Firewall configuration documentation

B.

Change management documentation

C.

Network performance baseline

D.

Logical diagram

Question 69

A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with:

Ping request could not find host

Which of the following is the MOST likely misconfiguration?

Options:

A.

Incorrect netmask

B.

DNS

C.

DHCP

D.

SSL certificate

Question 70

A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?

Options:

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n

Question 71

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

Options:

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter

Question 72

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

Options:

A.

Open wireless

B.

Geofencing

C.

Pre-shared key

D.

MAC filtering

Question 73

Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?

Options:

A.

tcp dump

B.

dig

C.

nmap

D.

netstat

Question 74

A network technician Is segmenting network traffic Into various broadcast domains. Which of the following should the network technician utilize?

Options:

A.

VLAN

B.

STP

C.

ACL

D.

BPDU

Question 75

A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?

Options:

A.

Change management

B.

Network diagrams

C.

Inventory report

D.

Labeling report

Question 76

A technician has been asked to install biometric controls at the entrance of a new datacenter. Which of the following would be appropriate authentication methods to meet this requirement? (Choose two.)

Options:

A.

Badge reader

B.

Retina scanner

C.

Random number-generating token

D.

Device proximity sensor

E.

Challenge question

F.

Combination lock

G.

Fingerprint reader

Question 77

A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat .Which of the following policies did the technician violate'?

Options:

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use

Question 78

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

Options:

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Question 79

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the website:

Which of the following is the reason the system cannot connect?

Options:

A.

The DNS server is under maintenance.

B.

A cable is not connected to the NIC.

C.

The domain complia.com is having network issues.

D.

The interface eth0 Is using an APIPA address.

Question 80

A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

Options:

A.

Transport

B.

Network

C.

Session

D.

Application

Question 81

A technician is troubleshooting a server In the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

Options:

A.

nslookup

B.

iptables

C.

pathping

D.

netstat

Question 82

An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?

Options:

A.

Ensure the host-based firewall allows TCP port 3389.

B.

Log in to the border firewall and ensure TCP port 3389 Is allowed.

C.

Check the iptables configuration for TCP port 3389.

D.

Use netstat to determine If there Is a connection to TCP port 3389.

Question 83

Which of the following Is an object held within an MIB?

Options:

A.

OUI

B.

OTDR

C.

OID

D.

SNMP host

E.

SNMP agent

F.

SNMP trap

Question 84

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

Options:

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Question 85

Management requires remote access to network devices when the ISP is down. Which of the following devices would provide the BEST solution?

Options:

A.

Router

B.

Firewall

C.

Bridge

D.

Modem

Question 86

A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch Is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network?

Options:

A.

Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment.

B.

Move the straight-through Ethernet cable connecting the switches to the first port on both switches.

C.

Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end.

D.

Add a second cable connecting the switches for redundancy and disabling STP on both switches.

Question 87

Which of the following ports are used for electronic mail protocols? (Choose three.)

Options:

A.

23

B.

25

C.

110

D.

123

E.

143

F.

161

G.

389

Question 88

Which of the following protocols are used to configure an email client to receive email? (Select TWO).

Options:

A.

IMAP

B.

SMTP

C.

POP

D.

SFTP

E.

TFTP

Question 89

When configuring a new switch in a packet-switched network, which of the following helps protect against network loops?

Options:

A.

Spanning tree

B.

Flood guard

C.

BPDU guard

D.

DHCP snooping

Question 90

Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?

Options:

A.

Ransomware

B.

Phishing

C.

DDoS

D.

Social engineering

E.

Spoofing

Question 91

A small team is overloaded with requests for database resources. The Chief Information Officer (CIO) is concerned the company does not have the resources to deploy and manage these additional services efficiently. Which of the following types of cloud services would be the MOST effective?

Options:

A.

PaaS

B.

IaaS

C.

BaaS

D.

SaaS

Question 92

Which of the following storage network technologies has the HIGHEST throughput?

Options:

A.

FCoE

B.

InfiniBand

C.

iSCSI

D.

OC3

Question 93

A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

Options:

A.

Disable the HTTP port in the host firewall.

B.

Upgrade the firmware on the firewall.

C.

Generate new SSH host keys.

D.

Remove unnecessary testing accounts.

E.

Issue a new self-signed certificate.

Question 94

A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the ceiling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation'?

Options:

A.

Plenum

B.

PVC

C.

Single-mode

D.

Cat 7

Question 95

To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?

Options:

A.

SIP

B.

PAT

C.

NAT

D.

VIP

Question 96

According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).

Options:

A.

Test solutions.

B.

Duplicate the problem

C.

Establish a theory of probable cause

D.

Question users

E.

Implement preventive measures.

F.

Document findings

Question 97

A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?

Options:

A.

Exhausted DHCP scope

B.

Untrusted SSL certificates

C.

Duplicate MAC addresses

D.

Incorrect firewall settings

Question 98

A technician is trying to identify the cause of an issue several wireless users are experiencing at an office. The office is in a square-shaped building, with four 802.11b WAPs with omnidirectional antennas located in the

four corners of the building. Users near the center of the building report sporadic issues connecting to resources. The technician checks the signal strength in the middle of the building and determines it is adequate. Which of the following is causing the reported issue?

Options:

A.

The antenna types are incorrect, and unidirectional should be used.

B.

MAC filtering has not been updated.

C.

There is channel overlap of the access points.

D.

The power levels are set too low on the WAPs.

Question 99

Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?

Options:

A.

Reviewing application logs

B.

Reviewing a baseline report

C.

Reviewing a vulnerability scan

D.

Reviewing SLA requirements

Question 100

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.

Options:

Question 101

A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

Options:

A.

HTTP

B.

Telnet

C.

SSH

D.

TFTP

Question 102

A network technician has provisioned a new Linux instance in public cloud provider’s IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server’s public IP address securely to start a console session. Which of the following remote access methods should the technician use?

Options:

A.

SSH

B.

Telnet

C.

VNC

D.

RDP

Question 103

A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

Options:

A.

VNC application

B.

Kerberos

C.

Geotagging application

D.

Credentials

Page: 1 / 69
Total 688 questions