Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > CompTIA > CompTIA Network+ > N10-009

N10-009 CompTIA Network+ Certification Exam Question and Answers

Question # 4

Which of the following services runs on port 636?

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Full Access
Question # 5

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Full Access
Question # 6

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Full Access
Question # 7

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Full Access
Question # 8

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Full Access
Question # 9

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 10

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Full Access
Question # 11

Which of the following network traffic types is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 12

Which of the following routing protocols is most commonly used to interconnect WANs?

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Full Access
Question # 13

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Full Access
Question # 14

Which of the following routing technologies uses an attribute list for path selection?

A.

BGP

B.

RIP

C.

EIGRP

D.

OSPF

Full Access
Question # 15

After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?

A.

Include backup power for air-conditioning units

B.

Configure door locks to automatically lock during power outages

C.

Increase UPS battery size

D.

Add an IoT-enabled thermostat

Full Access
Question # 16

Which of the following would be violated if an employee accidentally deleted a customer's data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Full Access
Question # 17

A network administrator recently configured an autonomous wireless AP and performed a throughput test via comptiaspeedtester.com. The result was 75 Mbps. When connected to other APs, the results reached 500 Mbps. Which of the following is most likely the reason for this difference?

A.

Channel width configuration

B.

DNS server issues

C.

Authentication failure

D.

Incorrect DHCP settings

Full Access
Question # 18

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Full Access
Question # 19

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Full Access
Question # 20

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Full Access
Question # 21

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Full Access
Question # 22

A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for this task?

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Full Access
Question # 23

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Full Access
Question # 24

A network technician needs to connect a new user to the company’s Wi-Fi network called SSID: business. When attempting to connect, two networks are listed as possible choices: SSID: business and SSID: myaccess. Which of the following attacks is occurring?

A.

On-path

B.

Rogue AP

C.

Evil twin

D.

Tailgating

Full Access
Question # 25

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Full Access
Question # 26

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

A.

724

B.

/26

C.

/28

D.

/30

Full Access
Question # 27

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Full Access
Question # 28

Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?

A.

BGP

B.

STP

C.

OSPF

D.

RIP

Full Access
Question # 29

A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?

A.

Implement the solution or escalate as necessary

B.

Create a plan of action to resolve the issue and identify potential effects

C.

Establish a theory of probable cause

D.

Document findings, actions, outcomes, and lessons learned throughout the process

Full Access
Question # 30

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Full Access
Question # 31

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Full Access
Question # 32

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

Full Access
Question # 33

Which of the following devices functions mainly at the data link layer of the OSI model and is used to connect a fiber-optic cable to a network interface?

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Full Access
Question # 34

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Full Access
Question # 35

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Full Access
Question # 36

Which of the following is the next step to take after successfully testing a root cause theory?

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Full Access
Question # 37

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Full Access
Question # 38

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Full Access
Question # 39

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Full Access
Question # 40

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Full Access
Question # 41

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Full Access
Question # 42

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Full Access
Question # 43

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Full Access
Question # 44

A network technician is configuring the company’s network of 100 Mbps Layer 2 switches. The technician wants increased throughput for the uplinks between switches. The technician connects multiple redundant links between the switches. Which of the following should the technician configure?

A.

Spanning Tree Protocol

B.

Switch Virtual Interfaces

C.

Native VLAN

D.

First Hop Redundancy Protocol

Full Access
Question # 45

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Full Access
Question # 46

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Full Access
Question # 47

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Full Access
Question # 48

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

A.

SOA

B.

MX

C.

CNAME

D.

NS

Full Access
Question # 49

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Full Access
Question # 50

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Full Access
Question # 51

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Full Access
Question # 52

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Full Access
Question # 53

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 <1 ms 2. * <1 ms <1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

A.

Review the router's ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Full Access
Question # 54

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Full Access
Question # 55

Which of the following would an adversary do while conducting an evil twin attack?

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Full Access
Question # 56

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Full Access
Question # 57

A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

A.

Identify the problem

B.

Establish a theory

C.

Document findings

D.

Create a plan of action

Full Access
Question # 58

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Full Access
Question # 59

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Full Access
Question # 60

A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the following subnets should the administrator use?

A.

172.16.0.0/24

B.

172.25.2.0/23

C.

172.30.1.0/22

D.

172.33.0.0/21

Full Access
Question # 61

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Full Access
Question # 62

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Full Access
Question # 63

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

A.

Cold

B.

Warm

C.

Active

D.

Hot

Full Access
Question # 64

Which of the following can be used when a server at a remote site is physically unreachable?

A.

OOB management

B.

Crash cart

C.

Jump box

D.

Console

Full Access
Question # 65

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

A.

RJ45

B.

ST

C.

LC

D.

MPO

Full Access
Question # 66

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Full Access
Question # 67

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Full Access
Question # 68

A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?

A.

802.1Q tagging

B.

Jumbo frames

C.

Half duplex

D.

Link aggregation

Full Access
Question # 69

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

Full Access
Question # 70

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Full Access
Question # 71

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 72

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 73

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Full Access
Question # 74

A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?

A.

Network congestion

B.

Wireless interference

C.

Signal degradation

D.

Client disassociation

Full Access
Question # 75

A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the following should a network technician implement to reduce the network congestion and improve performance?

A.

Load balancing

B.

Port mirroring

C.

Quality of Service

D.

Spanning Tree Protocol

Full Access
Question # 76

Which of the following is the MOST appropriate solution to extend the network to a building located across the street from the main facility?

A.

Multimode fiber

B.

802.11ac wireless bridge

C.

Cat 6 copper

D.

Loopback adapter

Full Access
Question # 77

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Full Access
Question # 78

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Full Access
Question # 79

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Full Access
Question # 80

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Full Access
Question # 81

Which of the following, in addition to a password, can be asked of a user for MFA?

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Full Access
Question # 82

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

Which of the following should the technician most likely do to resolve the issue?

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Full Access
Question # 83

Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?

A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Full Access
Question # 84

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Full Access
Question # 85

Which of the following can also provide a security feature when implemented?

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Full Access
Question # 86

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Full Access
Question # 87

Which of the following would most likely be used to implement encryption in transit when using HTTPS?

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Full Access
Question # 88

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 89

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Full Access
Question # 90

Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?

A.

Split-tunnel

B.

Site-to-site

C.

Full-tunnel client

D.

GRE tunnel

Full Access
Question # 91

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Full Access
Question # 92

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Full Access
Question # 93

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Full Access
Question # 94

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

A.

v1

B.

v2c

C.

v2u

D.

v3

Full Access
Question # 95

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Full Access
Question # 96

Which of the following is used to describe the average duration of an outage for a specific service?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Full Access
Question # 97

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Full Access
Question # 98

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Full Access
Question # 99

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

A.

dig

B.

nmap

C.

tracert

D.

telnet

Full Access
Question # 100

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Full Access
Question # 101

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Full Access
Question # 102

Which of the following ports is a secure protocol?

A.

20

B.

23

C.

443

D.

445

Full Access
Question # 103

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Full Access
Question # 104

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Full Access
Question # 105

After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?

A.

SSO

B.

LDAP

C.

MFA

D.

SAML

Full Access
Question # 106

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 107

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Full Access
Question # 108

Which of the following is used to stage copies of a website closer to geographically dispersed users?

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Full Access
Question # 109

A customer wants to cache commonly used content to reduce the number of full page downloads from the internet. Which of the following should the network administrator recommend?

A.

Proxy server

B.

Load balancer

C.

Open relay

D.

Code repository

Full Access
Question # 110

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Full Access
Question # 111

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Full Access
Question # 112

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Full Access
Question # 113

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

A.

QoS

B.

STP

Full Access
Question # 114

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.

Port

B.

DNS

C.

MAC

D.

Content

Full Access
Question # 115

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Full Access
Question # 116

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Full Access
Question # 117

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Full Access
Question # 118

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Full Access
Question # 119

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Full Access
Question # 120

Which of the following protocols is commonly associated with TCP port 443?

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Full Access
Question # 121

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Full Access
Question # 122

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Full Access
Question # 123

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Full Access
Question # 124

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Full Access
Question # 125

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

A.

Physical

B.

Network

C.

Session

D.

Transport

Full Access
Question # 126

Which of the following is used most often when implementing a secure VPN?

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Full Access