Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Network+ > N10-009

N10-009 CompTIA Network+ Certification Exam Question and Answers

Question # 4

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Full Access
Question # 5

A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?

A.

802.1Q tagging

B.

Jumbo frames

C.

Half duplex

D.

Link aggregation

Full Access
Question # 6

Which of the following routing protocols uses an autonomous system number?

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 7

A network administrator changed an external DNS to point customers to a new server. Which of the following tools should the administrator use to test the new server ' s configuration?

A.

ping

B.

tracert

C.

tcpdump

D.

nslookup

Full Access
Question # 8

Which of the following is used to stage copies of a website closer to geographically dispersed users?

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Full Access
Question # 9

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Full Access
Question # 10

A company implements a new network utilizing only IPv6 addressing and needs to connect to the internet. Which of the following must be enabled in order for the internal network to contact servers on the internet?

A.

MPLS

B.

NAT64

C.

GRE

D.

Static routing

Full Access
Question # 11

Which of the following will allow secure, remote access to internal applications?

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Full Access
Question # 12

Which of the following is a major difference between an IPS and IDS?

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

Full Access
Question # 13

A network administrator needs to locate a specific AP using a spectrum analyzer to complete an 802.11ax device migration. Which of the following should display on the analyzer to locate the AP?

A.

SSID

B.

RSSI

C.

Channel number

D.

BSSID

Full Access
Question # 14

Which of the following connector types would most likely be used to connect to an external antenna?

A.

BNC

B.

ST

C.

LC

D.

MPO

Full Access
Question # 15

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Full Access
Question # 16

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Full Access
Question # 17

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Full Access
Question # 18

Which of the following requires network devices to be managed using a different set of IP addresses?

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Full Access
Question # 19

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Full Access
Question # 20

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Full Access
Question # 21

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Full Access
Question # 22

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

A.

4096

B.

8192

C.

32768

D.

36684

Full Access
Question # 23

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?

A.

Signal strength

B.

Duplex mismatch

C.

Power budget

D.

CRC

Full Access
Question # 24

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Full Access
Question # 25

A technician is plugging an Ethernet cable into a switch to bring a new device online, but the device is not showing an active network connection. Previously, another technician turned off unused switchports as part of device hardening. Which of the following describes the port status?

A.

Error disabled

B.

Idle

C.

Suspended

D.

Administratively down

Full Access
Question # 26

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Full Access
Question # 27

A network administrator needs to divide a Class B network into four equal subnets, each with a host range of 1,000 hosts. Which of the following subnet masks should the administrator use?

A.

255.255.0.0

B.

255.255.252.0

C.

255.255.255.0

D.

255.255.255.128

Full Access
Question # 28

Which of the following is the final step in the ticket management process?

A.

Escalating to senior management

B.

Performing functional and non-functional testing

C.

Documenting findings, outcomes, and lessons learned

D.

Establishing a detailed action plan

Full Access
Question # 29

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 30

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Full Access
Question # 31

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Full Access
Question # 32

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Full Access
Question # 33

Which of the following network cables involves bouncing light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 34

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

Full Access
Question # 35

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Full Access
Question # 36

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Full Access
Question # 37

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Full Access
Question # 38

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 39

Which of the following VPN types provides secure remote access to the network resources through a web portal?

A.

Proxy

B.

Clientless

C.

Site-to-site

D.

Direct connect

Full Access
Question # 40

A network technician is adding a new switch to increase capacity on the network. The technician connects the two switches using a single cable. Several hosts are moved to the new switch, but none of the hosts can access the network or internet. Which of the following should the technician do to resolve the issue?

A.

Configure the connecting ports as trunk ports

B.

Install STP cables between the switches

C.

Increase the PoE budget for the switches

D.

Set up link aggregation on the uplink ports

Full Access
Question # 41

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Full Access
Question # 42

A company recently rearranged some users ' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the MOST likely reason?

A.

Ports are error-disabled.

B.

Ports have an incorrect native VLAN.

C.

Ports are having an MDIX issue.

D.

Ports are trunk ports.

Full Access
Question # 43

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Full Access
Question # 44

Which of the following is used to estimate the average life span of a device?

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Full Access
Question # 45

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 46

Which of the following typically uses compromised systems that become part of a bot network?

A.

Evil twin attack

B.

DDoS attack

C.

XML injection

D.

Brute-force password attack

Full Access
Question # 47

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Full Access
Question # 48

A network administrator needs a solution to isolate and potentially identify any threat actors that are attempting to breach the network. Which of the following should the administrator implement to determine the type of attack used?

A.

MFA

B.

Screened subnet

C.

Captive portal

D.

Honeypot

Full Access
Question # 49

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Full Access
Question # 50

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department ' s shared folders?

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Full Access
Question # 51

A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this connector type?

A.

ST

B.

BNC

C.

SC

D.

LC

Full Access
Question # 52

A laptop user gets an error when trying to access the company ' s intranet site. A technician runs ipconfig /all with the following results:

Autoconfiguration IPv4 Address: 169.254.0.5 (Preferred)

Subnet Mask . . . . . . . . . . . : 255.255.0.0

Default Gateway . . . . . . . . . :

DHCP Server . . . . . . . . . . . :

Which of the following is most likely causing the issue?

A.

Short DHCP lease duration

B.

IIS server malfunction

C.

Address pool exhaustion

D.

IDS misconfiguration

Full Access
Question # 53

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Full Access
Question # 54

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

A.

RDP

B.

Telnet

C.

GUI

D.

API

Full Access
Question # 55

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Full Access
Question # 56

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Full Access
Question # 57

A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the distribution switch. Which of the following should the technician use?

A.

Link aggregation

B.

Subinterfaces

C.

Switch virtual interfaces

D.

Half-duplex connections

Full Access
Question # 58

Which of the following protocols is used to route traffic on the public internet?

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Full Access
Question # 59

Which of the following offers the ability to manage access at the cloud VM instance?

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Full Access
Question # 60

Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

Phishing

Full Access
Question # 61

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Full Access
Question # 62

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 63

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.

Port

B.

DNS

C.

MAC

D.

Content

Full Access
Question # 64

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization ' s website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Full Access
Question # 65

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Full Access
Question # 66

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 67

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Full Access
Question # 68

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Full Access
Question # 69

Which of the following services runs on port 636?

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Full Access
Question # 70

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Full Access
Question # 71

A user ' s desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following configurations is required?

A.

Voice VLAN

B.

Native VLAN

C.

Data VLAN

D.

Trunk port

Full Access
Question # 72

As part of a recovery strategy, a network administrator needs to make sure no more than eight hours of data loss occurs. Which of the following DR metrics describes this requirement?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Full Access
Question # 73

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Full Access
Question # 74

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Full Access
Question # 75

A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?

A.

Implement the solution or escalate as necessary

B.

Create a plan of action to resolve the issue and identify potential effects

C.

Establish a theory of probable cause

D.

Document findings, actions, outcomes, and lessons learned throughout the process

Full Access
Question # 76

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Full Access
Question # 77

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Full Access
Question # 78

A network administrator has been monitoring the company ' s servers to ensure that they are available. Which of the following should the administrator use for this task?

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Full Access
Question # 79

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Full Access
Question # 80

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Full Access
Question # 81

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

A.

The patch cord from the wall jack is faulty.

B.

The switchport bandwidth needs to be increased.

C.

Multicast is not configured correctly on the switch.

D.

The NIC is set to half duplex.

Full Access
Question # 82

Which of the following is a use case for a PaaS environment?

A.

Mobile access

B.

E-commerce site

C.

Application development

D.

Cloud-native software

Full Access
Question # 83

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 84

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Full Access
Question # 85

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Full Access
Question # 86

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Full Access
Question # 87

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Full Access
Question # 88

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Full Access
Question # 89

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Full Access
Question # 90

A technician is designing a cloud service solution that will accommodate the company ' s current size, compute capacity, and storage capacity. Which of the following cloud deployment models will fulfill these requirements?

A.

SaaS

B.

PaaS

C.

IaaS

D.

IaC

Full Access
Question # 91

A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?

A.

Access

B.

Core

C.

Leaf

D.

Spine

Full Access
Question # 92

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Full Access
Question # 93

Which of the following indicates a computer has reached end-of-support?

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Full Access
Question # 94

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Full Access
Question # 95

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Full Access
Question # 96

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Full Access
Question # 97

Which of the following ports is used for secure email?

A.

25

B.

110

C.

143

D.

587

Full Access
Question # 98

A network administrator is responding to a request to configure a new IP phone. Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?

A.

Configure full duplex.

B.

Modify QoS.

C.

Enable 802.1Q tagging.

D.

Change the native VLAN.

Full Access
Question # 99

A network administrator is migrating a domain to a different provider. As part of the onboarding process, the new provider requests domain ownership proof. Which of the following records would the administrator most likely need to create?

A.

A

B.

CNAME

C.

PTR

D.

TXT

Full Access
Question # 100

A network engineer is setting up a new VoIP network for a customer. The current network is segmented only for computers and servers. No additional switch ports can be used in the new network. Which of the following does the engineer need to do to configure the network correctly? (Select TWO).

A.

Change network translation definitions

B.

Enable 802.1Q

C.

Implement a routing protocol

D.

Set up voice VLANs

E.

Reconfigure the DNS

F.

Place devices in the perimeter network

Full Access
Question # 101

Which of the following devices functions mainly at the data link layer of the OSI model and is used to connect a fiber-optic cable to a network interface?

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Full Access
Question # 102

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

Full Access
Question # 103

A network administrator deploys new network hardware. While configuring the network monitoring server, the server could authenticate but could not determine the specific status of the hardware. Which of the following would the administrator most likely do to resolve the issue?

A.

Use the public community string

B.

Import the appropriate MIB

C.

Set up a switchport analyzer and forward traffic

D.

Configure SNMPv3 privacy

Full Access
Question # 104

An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?

A.

Hot

B.

Cold

C.

Cluster

D.

Warm

Full Access
Question # 105

A network engineer needs to correlate findings and receive alerts if there are brute force attacks, DDoS attacks, or port scanning happening within their network. Which of the following network monitoring technologies should the engineer implement?

A.

Packet capture

B.

SNMPv3

C.

SIEM

D.

Syslog collector

Full Access
Question # 106

In the troubleshooting methodology, which of the following actions comes after verifying that the initial problem has been resolved?

A.

If necessary, escalating the issue

B.

Attempting to replicate the problem

C.

Documenting findings

D.

Implementing the plan

Full Access
Question # 107

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Full Access
Question # 108

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Full Access
Question # 109

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Full Access
Question # 110

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

Full Access
Question # 111

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Full Access
Question # 112

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO ' s phone need?

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Full Access
Question # 113

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Full Access
Question # 114

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Full Access
Question # 115

A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?

A.

APIPA

B.

Multicast

C.

Class C

D.

Experimental

Full Access
Question # 116

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Full Access
Question # 117

Which of the following explains what happens if a packet is lost in transit when using UDP?

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Full Access
Question # 118

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Full Access
Question # 119

Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?

A.

BGP

B.

STP

C.

OSPF

D.

RIP

Full Access
Question # 120

Which of the following would an adversary do while conducting an evil twin attack?

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Full Access
Question # 121

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Full Access
Question # 122

Which of the following allows a standard user to log in to multiple resources with one account?

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Full Access
Question # 123

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

A.

Implement DNS filtering.

B.

Update ACLs to only allow HTTPS.

C.

Configure new IPS hardware.

D.

Deploy 802.1X security features.

Full Access
Question # 124

Which of the following connector types is most commonly associated with Wi-Fi antennas?

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Full Access
Question # 125

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Full Access
Question # 126

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Full Access
Question # 127

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Full Access
Question # 128

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Full Access
Question # 129

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 130

A network engineer is troubleshooting connectivity for a newly installed server on an existing VLAN. The engineer reviews the following output:

C:\ > ipconfig

IP Address: 192.168.100.225

Mask: 255.255.255.224

Gateway: 192.168.100.254

Router# show ip route

C 192.168.100.0/24 is directly connected, GigabitEthernet0/0

Which of the following describes the issue?

A.

The server has an incorrect subnet mask

B.

There is a duplicate IP address on the network

C.

The DHCP address pool is exhausted

D.

The router is missing a default route

Full Access
Question # 131

A customer purchases a new UTM device and wants the development team to integrate some of the device’s data-reporting capabilities into the company’s custom internal support software. Which of the following features should the development team use to obtain the device’s data?

A.

API

B.

SNMPv2c

C.

SIEM

D.

MIB

Full Access
Question # 132

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Full Access
Question # 133

Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?

A.

OSPF

B.

EIGRP

C.

FHRP

D.

RIP

Full Access
Question # 134

While troubleshooting a VoIP handset connection, a technician ' s laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Full Access
Question # 135

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management

Full Access
Question # 136

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Full Access
Question # 137

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Full Access
Question # 138

Which of the following is the next step to take after successfully testing a root cause theory?

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Full Access
Question # 139

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Full Access
Question # 140

Which of the following allows an organization to map multiple internal devices to a single external-facing IP address?

A.

NAT

B.

BGP

C.

OSPF

D.

FHRP

Full Access
Question # 141

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 142

Which of the following ports is used to transfer data between mail exchange servers?

A.

21

B.

25

C.

53

D.

69

Full Access
Question # 143

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company ' s firewall require to access the internet? (Select TWO).

A.

NTP server

B.

Default gateway

C.

The modem ' s IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Full Access
Question # 144

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Full Access
Question # 145

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 146

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Full Access
Question # 147

Which of the following is the best reason to create a golden configuration?

A.

To provide configuration consistency

B.

To decrease the size of configuration files

C.

To increase security by encrypting configurations

D.

To set up backup configurations for each device

Full Access
Question # 148

Which of the following cloud platform technology characteristics would a quantum computing host most likely prioritize?

A.

Scalability

B.

Elasticity

C.

Multitenancy

D.

Cost

Full Access
Question # 149

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

A.

724

B.

/26

C.

/28

D.

/30

Full Access
Question # 150

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Full Access
Question # 151

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Full Access
Question # 152

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 153

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Full Access
Question # 154

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Full Access
Question # 155

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Full Access
Question # 156

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 157

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Full Access
Question # 158

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Full Access