Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Network+ > N10-009

N10-009 CompTIA Network+ Certification Exam Question and Answers

Question # 4

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Full Access
Question # 5

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Full Access
Question # 6

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 7

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Full Access
Question # 8

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Full Access
Question # 9

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

A.

v1

B.

v2c

C.

v2u

D.

v3

Full Access
Question # 10

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Full Access
Question # 11

Which of the following is the most cost-efficient way to host email services?

A.

PaaS

B.

IaaS

C.

VPC

D.

SaaS

Full Access
Question # 12

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Full Access
Question # 13

Which of the following will allow secure, remote access to internal applications?

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Full Access
Question # 14

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

A.

Physical

B.

Network

C.

Session

D.

Transport

Full Access
Question # 15

Which of the following is used to stage copies of a website closer to geographically dispersed users?

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Full Access
Question # 16

Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue?

A.

Spanning Tree

B.

Enhanced Interior Gateway Routing Protocol (EIGRP)

C.

Cisco Discovery Protocol (CDP)

D.

Link Layer Discovery Protocol (LLDP)

E.

Border Gateway Protocol (BGP)

Full Access
Question # 17

A user recently moved a workstation to a different part of the office. The user is able to access the internet and print but is unable to access server resources. Which of the following is the most likely cause of the issue?

A.

Incorrect default gateway

B.

Wrong VLAN assignment

C.

Error-disabled port

D.

Duplicate IP address

Full Access
Question # 18

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Full Access
Question # 19

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 20

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Full Access
Question # 21

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Full Access
Question # 22

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Full Access
Question # 23

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Full Access
Question # 24

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user's issue?

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Full Access
Question # 25

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Full Access
Question # 26

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

Full Access
Question # 27

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Full Access
Question # 28

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Full Access
Question # 29

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Full Access
Question # 30

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Full Access
Question # 31

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Full Access
Question # 32

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Full Access
Question # 33

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Full Access
Question # 34

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Full Access
Question # 35

A media company is implementing a global streaming service. Which of the following should the company apply to each regional point of presence in order to comply with local laws?

A.

ACL

B.

Port security

C.

Key management

D.

Content filtering

Full Access
Question # 36

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

Subnet: 10.8.100.1/24

Scope: 10.8.100.50 – 10.8.100.150

Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

A.

Increase the scope to 10.8.100.35 – 10.8.100.150

B.

Increase the scope to 10.8.100.40 – 10.8.100.150

C.

Increase the scope to 10.8.100.40 – 10.8.100.175

D.

Increase the scope to 10.8.100.50 – 10.8.100.175

Full Access
Question # 37

A server administrator needs to add a record to the company's DNS server to verify ownership of a web domain. The administrator has the record's name and value. Which of the following record types should the administrator use to add the record to the DNS server?

A.

TXT

B.

A

C.

PTR

D.

CNAME

Full Access
Question # 38

Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Full Access
Question # 39

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Full Access
Question # 40

A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?

A.

Create a plan of action

B.

Implement a solution

C.

Identify the problem

D.

Test the theory

Full Access
Question # 41

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

A.

The patch cord from the wall jack is faulty.

B.

The switchport bandwidth needs to be increased.

C.

Multicast is not configured correctly on the switch.

D.

The NIC is set to half duplex.

Full Access
Question # 42

A company recently rearranged some users' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the MOST likely reason?

A.

Ports are error-disabled.

B.

Ports have an incorrect native VLAN.

C.

Ports are having an MDIX issue.

D.

Ports are trunk ports.

Full Access
Question # 43

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Full Access
Question # 44

Which of the following would most likely be used as a replacement for a traditional VPN for remote users?

A.

SD-WAN

B.

SASE

C.

Site-to-site VPN

D.

Reverse proxy

Full Access
Question # 45

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Full Access
Question # 46

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Full Access
Question # 47

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Full Access
Question # 48

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Full Access
Question # 49

A network technician is designing a LAN for a new facility. The company is expecting more than 300 devices to connect to the network. Which of the following masks will provide the most efficient subnet?

A.

255.255.0.0

B.

255.255.192.0

C.

255.255.254.0

D.

255.255.255.254

Full Access
Question # 50

Which of the following network ports is used when a client accesses an SFTP server?

A.

22

B.

80

C.

443

D.

3389

Full Access
Question # 51

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization's website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Full Access
Question # 52

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

Full Access
Question # 53

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Full Access
Question # 54

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Full Access
Question # 55

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Full Access
Question # 56

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Full Access
Question # 57

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

A.

Private

B.

Community

C.

Public

D.

Hybrid

Full Access
Question # 58

Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?

A.

Implement the solution

B.

Verify full system functionality

C.

Document findings

D.

Test the theory

Full Access
Question # 59

A network administrator configures a new network discovery tool and is concerned that it might disrupt business operations. Which of the following scan types should the administrator configure?

A.

Authenticated

B.

Ad hoc

C.

Unauthenticated

D.

Scheduled

Full Access
Question # 60

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Full Access
Question # 61

Which of the following ports should a network administrator enable for encrypted login to a network switch?

A.

22

B.

23

C.

80

D.

123

Full Access
Question # 62

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Full Access
Question # 63

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Full Access
Question # 64

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Full Access
Question # 65

Which of the following is used to estimate the average life span of a device?

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Full Access
Question # 66

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Full Access
Question # 67

Which of the following OSI model layers manages the exchange of HTTP information?

A.

Session

B.

Data link

C.

Network

D.

Application

Full Access
Question # 68

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Full Access
Question # 69

Which of the following is the best way to keep devices on during a loss of power?

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Full Access
Question # 70

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

Full Access
Question # 71

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Full Access
Question # 72

An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?

A.

On-path

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Full Access
Question # 73

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Full Access
Question # 74

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

A.

110

B.

143

C.

587

D.

636

Full Access
Question # 75

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Full Access
Question # 76

A network administrator is extending a network beyond the primary equipment location. Which of the following is where the administrator should install additional network switches?

A.

MDF

B.

VPC

C.

VXLAN

D.

IDF

Full Access
Question # 77

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Full Access
Question # 78

Which of the following best describes the purpose of a UPS and PDU in a network installation?

A.

To support voltage requirements for devices in an IDF

B.

To manage power consumption in the MDF

C.

To connect multiple devices to a single network connection

D.

To regulate temperature in the MDF and IDF

Full Access
Question # 79

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Full Access
Question # 80

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Full Access
Question # 81

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Full Access
Question # 82

A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations:

Core-SW01

vlan 100

name

interface Ethernet 1/1

channel-group 1 mode active

interface Ethernet 1/2

channel-group 1 mode active

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Core-SW02

vlan 100

name

interface Ethernet 1/1

switchport mode trunk

switchport trunk allow vlan 100

interface Ethernet 1/2

switchport mode trunk

switchport trunk allow vlan 100

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Which of the following is the state of the Core-SW01 port-channel interfaces?

A.

Incrementing CRC errors

B.

Error disabled

C.

Administratively down

D.

Suspended

Full Access
Question # 83

A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

A.

Identify the problem

B.

Establish a theory

C.

Document findings

D.

Create a plan of action

Full Access
Question # 84

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Full Access
Question # 85

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Full Access
Question # 86

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Full Access
Question # 87

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

Full Access
Question # 88

A data center administrator is evaluating the use of jumbo frames within a storage environment. Which of the following describes the best reason to use jumbo frames in the storage environment?

A.

To reduce device overhead

B.

To report on the current root switch in the STP

C.

To improve routing convergence

D.

To increase drive throughput

Full Access
Question # 89

Which of the following cable types allows the use of QSFP ports without requiring transceivers?

A.

Multimode

B.

Twinaxial

C.

RG11

D.

Category 6

Full Access
Question # 90

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

A.

QoS

B.

STP

Full Access
Question # 91

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Full Access
Question # 92

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Full Access
Question # 93

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Full Access
Question # 94

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Full Access
Question # 95

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

A.

Physical

B.

Network

C.

Transport

D.

Application

Full Access
Question # 96

A company's network is experiencing high levels of suspicious network traffic. The security team finds that the traffic is coming from an unknown, foreign IP address. Which of the following is the most cost-efficient way to mitigate this threat?

A.

ACL

B.

IDS

C.

NAT

D.

DoS prevention

Full Access
Question # 97

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Full Access
Question # 98

A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?

A.

Captive portal

B.

Acceptable use policy

C.

Network access control

D.

DNS filtering

Full Access
Question # 99

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Full Access
Question # 100

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Full Access
Question # 101

Which of the following is the best use case of a site-to-site VPN?

A.

Securing access across an untrusted network

B.

Encrypting data at rest

C.

Filtering traffic between two internal subnets

D.

Hosting public-facing applications that contain company resources

Full Access
Question # 102

Which of the following is the most secure way to provide site-to-site connectivity?

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Full Access
Question # 103

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Full Access
Question # 104

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Full Access
Question # 105

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Full Access
Question # 106

Which of the following is a characteristic of the application layer?

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Full Access
Question # 107

Which of the following could provide a lightweight and private connection to a remote box?

A.

Site-to-site VPN

B.

Telnet

C.

Console

D.

Secure Shell

Full Access
Question # 108

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Full Access
Question # 109

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Full Access
Question # 110

Which of the following would be violated if an employee accidentally deleted a customer's data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Full Access
Question # 111

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Full Access
Question # 112

Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?

A.

BGP

B.

STP

C.

OSPF

D.

RIP

Full Access
Question # 113

Which of the following is used most often when implementing a secure VPN?

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Full Access
Question # 114

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Full Access
Question # 115

A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com. Which of the following should be done to reach the correct website?

A.

Modify the CNAME record

B.

Update the PTR record

C.

Change the NTP settings

D.

Delete the TXT record

Full Access
Question # 116

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Full Access
Question # 117

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Full Access
Question # 118

Which of the following routing protocols uses an autonomous system number?

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 119

Which of the following network topologies contains a direct connection between every node in the network?

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Full Access
Question # 120

Which of the following should an installer orient a port-side exhaust to when installing equipment?

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

Full Access
Question # 121

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Full Access
Question # 122

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Full Access
Question # 123

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Full Access
Question # 124

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Full Access
Question # 125

A network administrator is troubleshooting a connection issue and needs to determine the path that a packet will take. Which of the following commands accomplishes this task?

A.

netstat

B.

traceroute

C.

ping

D.

nslookup

E.

ipconfig

Full Access
Question # 126

Which of the following indicates a computer has reached end-of-support?

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Full Access
Question # 127

An organization wants better network visibility. The organization's requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Full Access
Question # 128

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Full Access
Question # 129

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Full Access
Question # 130

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Full Access
Question # 131

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Full Access
Question # 132

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Full Access
Question # 133

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

A.

Implement DNS filtering.

B.

Update ACLs to only allow HTTPS.

C.

Configure new IPS hardware.

D.

Deploy 802.1X security features.

Full Access
Question # 134

A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration.

Which of the following actions should the company take?

A.

Restrict users to the 5GHz frequency.

B.

Upgrade to a mesh network.

C.

Migrate from PSK to Enterprise.

D.

Implement WPA2 encryption.

Full Access
Question # 135

A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this connector type?

A.

ST

B.

BNC

C.

SC

D.

LC

Full Access
Question # 136

A network engineer is setting up a new VoIP network for a customer. The current network is segmented only for computers and servers. No additional switch ports can be used in the new network. Which of the following does the engineer need to do to configure the network correctly? (Select TWO).

A.

Change network translation definitions

B.

Enable 802.1Q

C.

Implement a routing protocol

D.

Set up voice VLANs

E.

Reconfigure the DNS

F.

Place devices in the perimeter network

Full Access
Question # 137

Which of the following protocol ports should be used to securely transfer a file?

A.

22

B.

69

C.

80

D.

3389

Full Access
Question # 138

Which of the following does BGP use for loop avoidance?

A.

Autonomous system path

B.

Peer autonomous system

C.

Autonomous system length

D.

Public autonomous system

Full Access
Question # 139

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?

A.

Signal strength

B.

Duplex mismatch

C.

Power budget

D.

CRC

Full Access
Question # 140

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 141

A network administrator receives a ticket from a user. The user reports that they cannot access any websites and that they have already checked everything on their computer. Which of the following is the first action the administrator should take?

A.

Divide and conquer.

B.

Establish a theory of probable cause.

C.

Question the user.

D.

Document the findings.

Full Access
Question # 142

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Full Access
Question # 143

A user's home mesh wireless network is experiencing latency issues. A technician has:

•Performed a speed test.

•Rebooted the devices.

•Performed a site survey.

•Performed a wireless packet capture.

The technician reviews the following information:

The technician notices in the packet capture that frames were retransmitted. Which of the following is the most likely cause of the user's network issue?

A.

The SSIDs should not be the same.

B.

The network has too much overlap.

C.

The devices are incompatible with the mesh network.

D.

The nodes are underpowered.

Full Access
Question # 144

Which of the following network cables involves bounding light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 145

A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Full Access
Question # 146

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

Full Access
Question # 147

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

A.

GRE

B.

IKE

C.

ESP

D.

AH

Full Access
Question # 148

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Full Access
Question # 149

A user's desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following configurations is required?

A.

Voice VLAN

B.

Native VLAN

C.

Data VLAN

D.

Trunk port

Full Access
Question # 150

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Full Access
Question # 151

Which of the following would describe a data recovery goal?

A.

MTBF

B.

RPO

C.

BCP

D.

MTTR

Full Access