A technician is installing a SOHO router. Which of the following should be performed on every installation and periodically maintained to prevent unauthorized access? (Choose two.)
A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?
A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?
A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?
A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all
buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?
A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?
A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?
A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?
A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?
A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?
A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?
Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?
A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?
A network technician needs to upgrade a production Windows server to the latest service pack. In which of the following should the work plan and recovery procedure be documented?
A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?
Which of the following provides information about how often some devices fail so the IT department can take proactive measures?
In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?
The process of grouping network interfaces together to increase throughput is called:
A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?
A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?
Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:
A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?
An email server, which is called “Frederick,” has an IPv6 address of 2001:5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?
A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?
A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection?
First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?
Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?
A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?
A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?
Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)
A network technician is installing a new PTZ camera for the security department. The camera is capable of being powered via the Ethernet cable, but it is not powering on. The network technician has tested the cable and received positive results. Which of the following is MOST likely the issue?
A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?
A company deploys many workers in the field who remotely access files from a server at headquarters.
Leadership is concerned about the risks posed when field workers update these files from unsecured networks. Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.)
Which of the following should a network administrator deploy to control all preventive security measures?
A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?
The IT director has requested that systems administrators be able to RDP to their servers. Internal users should not be able to access external websites that do not use HTTPS. The network technician implements the following ruleset:
10 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 3389
20 deny tcp 192.168.1.0 0.0.0.255 any eq 80
30 permit tcp 192.168.1.0 0.0.0.255 any eq 443
40 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 80
50 deny ip any any
After implementing this change, users on the 192.168.1.0/24 subnet begin reporting they can no longer access internal servers, Which of the following should the network technician do to correct the issue
and satisfy the director's request?
A network engineer is provisioning a new Linux server in a public cloud. Which of the following types of cloud service should be utilized?
A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies would allow for the LEAST signal attenuation?
The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?
Given the table below:
Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?
An ARP request is broadcasted and sends the following request.
''Who is 192.168.1.200? Tell 192.168.1.55''
At which of the following layers of the OSI model does this request operate?
A network administrator is concerned about the management traffic between a machine and the corporate router. Which of the following protocols should the administrator use to prevent a security breach?
A technician is performing a maintenance task on a weekly basis and wants to ensure the task is property documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?
A user in the finance department can access the department printer and file server yet is unable to print to the marketing department’s printer. A technician runs ipconfig and sees the following output:
IPv4 Address. . . . . . . . . . . : 192.168.0.101
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
The technician has verified the user’s PC is in the proper VLAN and sees an UP/UP status on the switchport. Which of the following is MOST likely causing the issue?
Which of the following describes the function of Layer 3 of the OSI model?
A network technician has been attempting to gain access to a switch over the network after an extended power outage but has been unsuccessful. The technician runs a network scan and does not find
the switch in the results. The switch is turned on, and the link lights are all green. Which of the following should the technician use to gain access to the switch?
A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?
Which of the following accurately describes a warm site in datacenter disaster recovery?
A company's sales department is accustomed lo sharing information with other organizations via FTP; however. FTP recently stopped working for the sales employees. Upon further review, it is determined a junior network technician recently applied an ACL without going through the proper change management process. The network administrator found the following ACL:
Which of the following statement Identifies the main Issue?
A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?
Which of the following represents where the ISP's WAN connection is handed off to the local network?
A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?
A technician is setting up a surveillance system at a small office. The customer would like to have the network controlled by the office's firewall/router device. The office has a coaxial ISP connection with an ISP provided cable modem. Which of the following should the technician configure on the cable modem to meet the customer requirements?
A Route with NAT
B. PPP
C. PPPoE
D. Bridge mode
A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?
A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP’s network and the start of the customer’s network?
A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away In the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?
Which of the following properties should be configured to extend logical network separation on an uplink interface to a second switch?
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?
Two buildings are connected with 802.11a wireless bridges using omnidirectional antennas However, the connection between the two bridges often drops Which of the following would be the BEST solution?
A company’s information security team has requested that wireless devices connect using wireless security that utilizes block-cipher encryption for data in transit. Which of the following wireless security mechanisms should be
configured?
A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?
Which of the following technologies relies on circuit switching?
A server administrator needs to perform a backup of all files on the server but does not have enough time overnight. The administrator can perform a backup of all files on weekends and wants to choose another backup for during the week that will provide the fastest restore if there is a need. Which of the following will provide the FASTEST restoration of files?
A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network After verifying the vulnerability with the vendor the network. technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?
A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site?
A network administrator is troubleshooting a connectivity issue to a remote switch. The administrator suspects the settings on the switch have been changed, causing the issue. Which of the following should the administrator reference to confirm the change?
The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?
A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same
equipment?
A network technician is working to bring a new workstation onto the network. No lights come on when the technician plugs the Ethernet cable into the workstation. The technician checks the connection in the IDF and discovers the data jack is not labeled. Which of the following tools should the technician use to trace the network connection back to the IDF?
A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected?
Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?
After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups?
A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions should the technician Implement?
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?
A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?
A network technician is reading a network diagram and looking for the edge router. Which of the following is MOST likely the symbol used for the router?
Joe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:
Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error.
Which of the following is the MOST likely cause of this error?
To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?
The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?
Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?
A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall? (Select TWO).
A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?
The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?
A network technician has deployed an application that can remotely control desktops with different operating systems. The technician needs to be able to use a single client application for this control. Which of the following has the technician utilized?
Which of the following can be used to prevent unauthorized employees from entering restricted areas?
A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?
A technician has been asked to install biometric controls at the entrance of a new datacenter. Which of the following would be appropriate authentication methods to meet this requirement? (Choose two.)
Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use?
A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?
A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?
A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?
Which of the following should be performed on a regular basis to prevent unauthorized access to a company network? (Choose two.)
A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed?
Due to regulatory requirements, a college bookstore prohibits customers from accessing the wireless network in the building. Which of the following would be the BEST method to prevent customers from accessing the wireless network while in the bookstore?
A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?
An NGFW alerts that a web server in the DMZ is sending suspicious traffic. A network administrator finds that port 25 is open, and the traffic is originating from this port. The only purpose of this server is to deliver website traffic. Which of the following should the network administrator recommend to the systems administrator?
A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Select TWO).
Which of the following physical security devices is used to prevent unauthorized access into a datacenter?
A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?
When configuring a new switch in a packet-switched network, which of the following helps protect against network loops?
A network technician has installed multiple new lightweight access points across the network. Which of the following devices should the technician use to manage the new access points?
A bookstore uses a Faraday cage to comply with credit card regulations Customers report that their cellular phones have no signal when they are in the bookstore Which of the following is the MOST likely cause?