Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Network+ > N10-009

N10-009 CompTIA Network+ Certification Exam Question and Answers

Question # 4

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

Full Access
Question # 5

A network administrator deploys new network hardware. While configuring the network monitoring server, the server could authenticate but could not determine the specific status of the hardware. Which of the following would the administrator most likely do to resolve the issue?

A.

Use the public community string

B.

Import the appropriate MIB

C.

Set up a switchport analyzer and forward traffic

D.

Configure SNMPv3 privacy

Full Access
Question # 6

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Full Access
Question # 7

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Full Access
Question # 8

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Full Access
Question # 9

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

A.

QoS

B.

STP

Full Access
Question # 10

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Full Access
Question # 11

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Full Access
Question # 12

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Full Access
Question # 13

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Full Access
Question # 14

A company ' s marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

A.

SOA

B.

MX

C.

CNAME

D.

NS

Full Access
Question # 15

Which of the following routing protocols is most commonly used to interconnect WANs?

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Full Access
Question # 16

Which of the following explains what happens if a packet is lost in transit when using UDP?

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Full Access
Question # 17

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Full Access
Question # 18

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Full Access
Question # 19

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Full Access
Question # 20

Which of the following network ports is used when a client accesses an SFTP server?

A.

22

B.

80

C.

443

D.

3389

Full Access
Question # 21

Which of the following protocols is used to send networking status messages between clients and servers?

A.

SSH

B.

DHCP

C.

NTP

D.

SNMP

Full Access
Question # 22

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 23

A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?

A.

Coaxial cable

B.

9.8ft (3m) cable

C.

Plenum cable

D.

STP cable

Full Access
Question # 24

Which of the following is used to describe the average duration of an outage for a specific service?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Full Access
Question # 25

After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?

A.

VLAN hopping

B.

Evil twin

C.

DNS poisoning

D.

ARP spoofing

Full Access
Question # 26

A network administrator is trying to troubleshoot an issue with a newly installed switch that is not connecting to the network. The administrator logs on to the switch and observes collisions on the interface. Which of the following is most likely the issue?

A.

Wrong speed

B.

Jumbo frames enabled

C.

Incorrect VLAN

D.

Duplex mismatch

Full Access
Question # 27

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Full Access
Question # 28

Which of the following network cables involves bouncing light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 29

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Full Access
Question # 30

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 31

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 32

Which of the following does BGP use for loop avoidance?

A.

Autonomous system path

B.

Peer autonomous system

C.

Autonomous system length

D.

Public autonomous system

Full Access
Question # 33

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 34

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Full Access
Question # 35

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Full Access
Question # 36

Which of the following best describes the purpose of a UPS and PDU in a network installation?

A.

To support voltage requirements for devices in an IDF

B.

To manage power consumption in the MDF

C.

To connect multiple devices to a single network connection

D.

To regulate temperature in the MDF and IDF

Full Access
Question # 37

Which of the following protocols is commonly associated with TCP port 443?

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Full Access
Question # 38

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Full Access
Question # 39

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Full Access
Question # 40

A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations:

Core-SW01

vlan 100

name

interface Ethernet 1/1

channel-group 1 mode active

interface Ethernet 1/2

channel-group 1 mode active

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Core-SW02

vlan 100

name

interface Ethernet 1/1

switchport mode trunk

switchport trunk allow vlan 100

interface Ethernet 1/2

switchport mode trunk

switchport trunk allow vlan 100

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Which of the following is the state of the Core-SW01 port-channel interfaces?

A.

Incrementing CRC errors

B.

Error disabled

C.

Administratively down

D.

Suspended

Full Access
Question # 41

Which of the following is used to stage copies of a website closer to geographically dispersed users?

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Full Access
Question # 42

A network engineer wants to implement an 802.1X architecture in which BYOD devices must access a trusted wireless network securely. Which of the following should the engineer implement?

A.

ACL

B.

MAC filtering

C.

Port security

D.

NAC

Full Access
Question # 43

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Full Access
Question # 44

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Full Access
Question # 45

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Full Access
Question # 46

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Full Access
Question # 47

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company ' s firewall require to access the internet? (Select TWO).

A.

NTP server

B.

Default gateway

C.

The modem ' s IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Full Access
Question # 48

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

A.

Neighbor adjacency

B.

Link state flooding

C.

Administrative distance

D.

Hop count

Full Access
Question # 49

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user ' s identity?

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Full Access
Question # 50

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

A.

dig

B.

nmap

C.

tracert

D.

telnet

Full Access
Question # 51

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Full Access
Question # 52

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Full Access
Question # 53

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Full Access
Question # 54

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Full Access
Question # 55

A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage?

A.

MAC filtering

B.

Administrative distance

C.

Bluetooth beacon signals

D.

IP address blocks

Full Access
Question # 56

A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this connector type?

A.

ST

B.

BNC

C.

SC

D.

LC

Full Access
Question # 57

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 58

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization ' s website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Full Access
Question # 59

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 60

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Full Access
Question # 61

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Full Access
Question # 62

A media company is implementing a global streaming service. Which of the following should the company apply to each regional point of presence in order to comply with local laws?

A.

ACL

B.

Port security

C.

Key management

D.

Content filtering

Full Access
Question # 63

A network technician is troubleshooting a web application ' s poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Full Access
Question # 64

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Full Access
Question # 65

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Full Access
Question # 66

As part of a recovery strategy, a network administrator needs to make sure no more than eight hours of data loss occurs. Which of the following DR metrics describes this requirement?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Full Access
Question # 67

A company security policy requires all network traffic from remote employees ' corporate laptops to use the company’s VPN. Which of the following network access methods best describes this scenario?

A.

Clientless VPN

B.

Full-tunnel

C.

Site-to-site tunnel

D.

Split-tunnel

Full Access
Question # 68

Which of the following network cables involves bounding light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 69

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Full Access
Question # 70

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Full Access
Question # 71

Which of the following IP transmission types encrypts all of the transmitted data?

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Full Access
Question # 72

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

A.

10.0.50.128/25

B.

10.7.142.128/27

C.

10.152.4.192/26

D.

10.192.1.64/28

Full Access
Question # 73

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Full Access
Question # 74

During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization ' s help desk. Which of the following attacks is the assessor using?

A.

Social engineering

B.

Tailgating

C.

Shoulder surfing

D.

Smishing

E.

Evil twin

Full Access
Question # 75

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Full Access
Question # 76

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Full Access
Question # 77

Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?

A.

OSPF

B.

EIGRP

C.

FHRP

D.

RIP

Full Access
Question # 78

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Full Access
Question # 79

Which of the following facilities is the best example of a warm site in the event of information system disruption?

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Full Access
Question # 80

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Full Access
Question # 81

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements > ?

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Full Access
Question # 82

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Full Access
Question # 83

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Full Access
Question # 84

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Full Access
Question # 85

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Full Access
Question # 86

Which of the following network traffic types is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 87

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP ' s connection speed?

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Full Access
Question # 88

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 89

Which of the following requires network devices to be managed using a different set of IP addresses?

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Full Access
Question # 90

Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?

A.

SSO

B.

MFA

C.

SAML

D.

RADIUS

Full Access
Question # 91

Which of the following allows for interactive, secure remote management of a network infrastructure device?

A.

SSH

B.

VNC

C.

RDP

D.

SNMP

Full Access
Question # 92

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Full Access
Question # 93

Which of the following would an adversary do while conducting an evil twin attack?

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Full Access
Question # 94

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Full Access
Question # 95

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Full Access
Question # 96

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 97

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

A.

Physical

B.

Network

C.

Session

D.

Transport

Full Access
Question # 98

A new network is being created to support 126 users . Which of the following CIDR ranges provides the most efficient use of space?

A.

10.2.2.0/23

B.

10.2.2.0/24

C.

10.2.2.0/25

D.

10.2.2.0/26

Full Access
Question # 99

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Full Access
Question # 100

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Full Access
Question # 101

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 < 1 ms 2. * < 1 ms < 1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

A.

Review the router ' s ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Full Access
Question # 102

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 103

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Full Access
Question # 104

Which of the following best describes a characteristic of a DNS poisoning attack?

A.

DNS address records are edited and changed on a DNS server.

B.

An attacker sets up a malicious DNS server in place of a legitimate server.

C.

DNS client requests are intercepted and false responses are returned.

D.

False DNS records are injected into cache on a DNS server.

Full Access
Question # 105

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

A.

RJ45

B.

ST

C.

LC

D.

MPO

Full Access
Question # 106

Which of the following does a router use to determine the preferred route?

A.

Shortest prefix match

B.

Routes learned from EIGRP

C.

Longest prefix match

D.

Routes learned from OSPF

Full Access
Question # 107

Which of the following network devices converts wireless signals to electronic signals?

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Full Access
Question # 108

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Full Access
Question # 109

Which of the following is a use case for a PaaS environment?

A.

Mobile access

B.

E-commerce site

C.

Application development

D.

Cloud-native software

Full Access
Question # 110

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

A.

/23

B.

/25

C.

/29

D.

/32

Full Access
Question # 111

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Full Access
Question # 112

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Full Access
Question # 113

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Full Access
Question # 114

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Full Access
Question # 115

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Full Access
Question # 116

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Full Access
Question # 117

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Full Access
Question # 118

Which of the following is a characteristic of the application layer?

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Full Access
Question # 119

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

Subnet: 10.8.100.1/24

Scope: 10.8.100.50 – 10.8.100.150

Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

A.

Increase the scope to 10.8.100.35 – 10.8.100.150

B.

Increase the scope to 10.8.100.40 – 10.8.100.150

C.

Increase the scope to 10.8.100.40 – 10.8.100.175

D.

Increase the scope to 10.8.100.50 – 10.8.100.175

Full Access
Question # 120

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Full Access
Question # 121

A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Full Access
Question # 122

A network technician needs to resolve some issues with a customer ' s SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Cable Test Results:

Cable 1:

Cable 2:

Cable 3:

Cable 4:

Full Access
Question # 123

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Full Access
Question # 124

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

Full Access
Question # 125

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Full Access
Question # 126

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Full Access
Question # 127

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Full Access
Question # 128

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Full Access
Question # 129

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Full Access
Question # 130

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 131

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Full Access
Question # 132

Which of the following VPN types provides secure remote access to the network resources through a web portal?

A.

Proxy

B.

Clientless

C.

Site-to-site

D.

Direct connect

Full Access
Question # 133

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Full Access
Question # 134

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Full Access
Question # 135

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Full Access
Question # 136

A user reports issues accessing a file server on a LAN with the IP address 192.168.50.140 at a large facility with incomplete infrastructure documentation. The following are the results of the ping command:

ping -c 10 192.168.50.140

Packets: Sent = 10, Received = 5, Lost = 5 (50% loss)

Round-trip times: Minimum = 3ms, Maximum = 144ms, Average = 42ms

Which of the following should a technician do next to continue troubleshooting the issue at the switch with minimal impact ?

A.

Perform toning and probe.

B.

Replace the cable.

C.

Visually locate the fault.

D.

Restart the switch.

Full Access
Question # 137

Which of the following most likely determines the size of a rack for installation? (Select two).

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Full Access
Question # 138

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Full Access
Question # 139

Which of the following is the most cost-efficient way to host email services?

A.

PaaS

B.

IaaS

C.

VPC

D.

SaaS

Full Access
Question # 140

A network administrator is troubleshooting a connection issue and needs to determine the path that a packet will take. Which of the following commands accomplishes this task?

A.

netstat

B.

traceroute

C.

ping

D.

nslookup

E.

ipconfig

Full Access
Question # 141

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 142

A network engineer needs to change, update, and control APs remotely, with real-time visibility over HTTPS. Which of the following will best allow these actions?

A.

Web interface

B.

Command line

C.

SNMP console

D.

API gateway

Full Access
Question # 143

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Full Access
Question # 144

Which of the following protocols uses the Dijkstra ' s Link State Algorithm to establish routes inside its routing table?

A.

OSPF

B.

EIGRP

C.

BGP

D.

RIP

Full Access
Question # 145

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 146

A network engineer connects a business to a new ISP. A simple ping test to 8.8.8.8 is successful. However, users complain of extreme slowness to any website and periods of no connectivity. Which of the following is the most likely cause?

A.

Incorrect default gateway

B.

VLAN mismatch

C.

Subnet mask configuration

D.

Duplicate ISP IP address

Full Access
Question # 147

Which of the following Layer 1 devices is responsible for the termination of fiber-optic connections on an SFP-capable switch?

A.

Transceiver

B.

Modem

C.

Ethernet NIC

D.

Repeater

Full Access
Question # 148

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 149

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Full Access
Question # 150

Which of the following is most likely responsible for the security and handling of personal data in Europe?

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Full Access
Question # 151

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Full Access
Question # 152

Which of the following attacks utilizes a network packet that contains multiple network tags?

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Full Access
Question # 153

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Full Access