Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Page: 1 / 42
Total 422 questions

CompTIA Network+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Question 2

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

Options:

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Question 3

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Question 4

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Question 5

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

Options:

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Question 6

A network administrator deploys new network hardware. While configuring the network monitoring server, the server could authenticate but could not determine the specific status of the hardware. Which of the following would the administrator most likely do to resolve the issue?

Options:

A.

Use the public community string

B.

Import the appropriate MIB

C.

Set up a switchport analyzer and forward traffic

D.

Configure SNMPv3 privacy

Question 7

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Question 8

A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?

Options:

A.

APIPA

B.

Multicast

C.

Class C

D.

Experimental

Question 9

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 10

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Question 11

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Question 12

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question 13

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Question 14

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 15

Which of the following connectors provides console access to a switch?

Options:

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Question 16

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

Options:

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

Question 17

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 18

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

Options:

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Question 19

Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question 20

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

Which of the following should the technician most likely do to resolve the issue?

Options:

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Question 21

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 22

A company’s Chief Information Security Officer requires that servers and firewalls have accurate timestamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

SNMP

D.

NTP

Question 23

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

Options:

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Question 24

Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?

Options:

A.

Implement the solution

B.

Verify full system functionality

C.

Document findings

D.

Test the theory

Question 25

Which of the following should an installer orient a port-side exhaust to when installing equipment?

Options:

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

Question 26

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question 27

Which of the following would most likely be used to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question 28

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Question 29

Which of the following typically uses compromised systems that become part of a bot network?

Options:

A.

Evil twin attack

B.

DDoS attack

C.

XML injection

D.

Brute-force password attack

Question 30

A network administrator changed an external DNS to point customers to a new server. Which of the following tools should the administrator use to test the new server's configuration?

Options:

A.

ping

B.

tracert

C.

tcpdump

D.

nslookup

Question 31

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Question 32

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

Options:

A.

Physical

B.

Network

C.

Session

D.

Transport

Question 33

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Question 34

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Question 35

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

Options:

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Question 36

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question 37

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

Options:

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Question 38

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Question 39

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

Options:

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Question 40

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

Options:

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Question 41

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 42

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 43

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Question 44

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 45

A company recently rearranged some users' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the MOST likely reason?

Options:

A.

Ports are error-disabled.

B.

Ports have an incorrect native VLAN.

C.

Ports are having an MDIX issue.

D.

Ports are trunk ports.

Question 46

After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?

Options:

A.

Include backup power for air-conditioning units

B.

Configure door locks to automatically lock during power outages

C.

Increase UPS battery size

D.

Add an IoT-enabled thermostat

Question 47

A technician is designing a cloud service solution that will accommodate the company's current size, compute capacity, and storage capacity. Which of the following cloud deployment models will fulfill these requirements?

Options:

A.

SaaS

B.

PaaS

C.

IaaS

D.

IaC

Question 48

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

Options:

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Question 49

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Options:

A.

Changing the default password

B.

Blocking inbound SSH connections

C.

Removing the gateway from the network configuration

D.

Restricting physical access to the switch

Question 50

A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for this task?

Options:

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Question 51

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

Options:

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Question 52

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question 53

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Question 54

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 55

A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?

Options:

A.

Access

B.

Core

C.

Leaf

D.

Spine

Question 56

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Question 57

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

Options:

A.

QoS

B.

STP

Question 58

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

Options:

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Question 59

A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?

Options:

A.

Implement the solution or escalate as necessary

B.

Create a plan of action to resolve the issue and identify potential effects

C.

Establish a theory of probable cause

D.

Document findings, actions, outcomes, and lessons learned throughout the process

Question 60

Which of the following ports is a secure protocol?

Options:

A.

20

B.

23

C.

443

D.

445

Question 61

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

Options:

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Question 62

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

Options:

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Question 63

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Question 64

Which of the following would an adversary do while conducting an evil twin attack?

Options:

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Question 65

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Question 66

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Question 67

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Question 68

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

Options:

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Question 69

Which of the following allows a user to connect to an isolated device on a stand-alone network?

Options:

A.

Jump box

B.

API gateway

C.

Secure Shell (SSH)

D.

Clientless VPN

Question 70

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

Question 71

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

Options:

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Question 72

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 73

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Question 74

A network administrator recently configured an autonomous wireless AP and performed a throughput test via comptiaspeedtester.com. The result was 75 Mbps. When connected to other APs, the results reached 500 Mbps. Which of the following is most likely the reason for this difference?

Options:

A.

Channel width configuration

B.

DNS server issues

C.

Authentication failure

D.

Incorrect DHCP settings

Question 75

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Options:

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Question 76

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Question 77

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 78

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

Options:

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Question 79

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

Options:

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Question 80

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Question 81

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 82

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 83

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Question 84

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Question 85

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Question 86

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 87

A network administrator needs to connect a multimode fiber cable from the MDF to the server room. The administrator connects the cable to Switch 2, but there is no link light. The administrator tests the fiber and finds it does not have any issues. Swapping the connection to Switch 1 in a working port is successful, but the swapped connection does not work on Switch 2. Which of the following should the administrator verify next?

Options:

A.

Fiber length

B.

Transceiver model

C.

Connector type

D.

Port speed

Question 88

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

Options:

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Question 89

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

Options:

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Question 90

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Question 91

A major natural disaster strikes a company's headquarters, causing significant destruction and data loss. The company needs to quickly recover and resume operations. Which of the following will a network administrator need to do first?

Options:

A.

Conduct a damage assessment

B.

Migrate to the cold site

C.

Notify customers of the disaster

D.

Establish a communication plan

Question 92

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 93

Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?

Options:

A.

Split-tunnel

B.

Site-to-site

C.

Full-tunnel client

D.

GRE tunnel

Question 94

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question 95

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

Options:

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Question 96

A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the most secure and compatible?

Options:

A.

WPA3

B.

WPA2

C.

WPA2/WPA3 mixed mode

D.

WPA/WPA2 mixed mode

Question 97

Which of the following most likely determines the size of a rack for installation? (Select two).

Options:

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Question 98

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Question 99

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Question 100

A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?

Options:

A.

Network congestion

B.

Wireless interference

C.

Signal degradation

D.

Client disassociation

Question 101

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Question 102

A network engineer needs to change, update, and control APs remotely, with real-time visibility over HTTPS. Which of the following will best allow these actions?

Options:

A.

Web interface

B.

Command line

C.

SNMP console

D.

API gateway

Question 103

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Question 104

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 105

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Which of the following is the most likely cause of the user's connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Question 106

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Question 107

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

Options:

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Question 108

A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the following subnets should the administrator use?

Options:

A.

172.16.0.0/24

B.

172.25.2.0/23

C.

172.30.1.0/22

D.

172.33.0.0/21

Question 109

Which of the following is the greatest advantage of maintaining a cold DR site compared to other DR sites?

Options:

A.

Redundancy

B.

Availability

C.

Security

D.

Cost

Question 110

A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations:

Core-SW01

vlan 100

name

interface Ethernet 1/1

channel-group 1 mode active

interface Ethernet 1/2

channel-group 1 mode active

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Core-SW02

vlan 100

name

interface Ethernet 1/1

switchport mode trunk

switchport trunk allow vlan 100

interface Ethernet 1/2

switchport mode trunk

switchport trunk allow vlan 100

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Which of the following is the state of the Core-SW01 port-channel interfaces?

Options:

A.

Incrementing CRC errors

B.

Error disabled

C.

Administratively down

D.

Suspended

Question 111

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Question 112

Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?

Options:

A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Question 113

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Question 114

Which of the following connector types would most likely be used to connect to an external antenna?

Options:

A.

BNC

B.

ST

C.

LC

D.

MPO

Question 115

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Question 116

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

Options:

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question 117

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

Options:

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Question 118

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Question 119

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 120

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Question 121

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

Options:

A.

Neighbor adjacency

B.

Link state flooding

C.

Administrative distance

D.

Hop count

Question 122

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

Options:

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Question 123

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

Options:

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Question 124

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

Options:

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Question 125

Which of the following is used to stage copies of a website closer to geographically dispersed users?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Question 126

Which of the following network cables involves bouncing light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Page: 1 / 42
Total 422 questions