March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CompTIA N10-007 Dumps

Page: 1 / 26
Total 688 questions

CompTIA Network+ N10-007 Questions and Answers

Question 1

A technician is installing a SOHO router. Which of the following should be performed on every installation and periodically maintained to prevent unauthorized access? (Choose two.)

Options:

A.

Disable remote management

B.

Update the router firmware

C.

Disable port forwarding

D.

Use complex passwords

E.

Disable the SSID broadcast

Question 2

A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

Options:

A.

TXT

B.

A

C.

SRV

D.

CNAME

Question 3

A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?

Options:

A.

Logical diagram

B.

Change management

C.

IDF documentation

D.

Configuration baseline

Question 4

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Options:

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Question 5

A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all

buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?

Options:

A.

The SMTP relays in the datacenter

B.

The MAC address reservations

C.

The IP helper address on the switch

D.

The ARP forwarding on the switch

Question 6

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

Options:

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Question 7

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

Options:

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Question 8

A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

Options:

A.

Router

B.

Layer 3 switch

C.

Proxy server

D.

Firewall

E.

Intrusion detection system

Question 9

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

Options:

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Question 10

A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?

Options:

A.

802.1X

B.

Captive portal

C.

Port security

D.

NAC

Question 11

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Question 12

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

Options:

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Question 13

A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?

Options:

A.

The user ordered Cat5e cable instead of Cat3.

B.

A crossover cable was installed.

C.

The total cable run exceeds the maximum distance.

D.

There is a network speed mismatch between the computer and the switch.

Question 14

A network technician needs to upgrade a production Windows server to the latest service pack. In which of the following should the work plan and recovery procedure be documented?

Options:

A.

IDF/MDF

B.

Change management

C.

SOPs

D.

Inventory management

Question 15

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

Options:

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Question 16

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

Options:

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Question 17

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

Options:

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Question 18

The process of grouping network interfaces together to increase throughput is called:

Options:

A.

VLAN tagging

B.

load balancing

C.

port aggregation

D.

fault tolerance

Question 19

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

Options:

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Question 20

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

Options:

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Question 21

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

Options:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Question 22

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

Options:

A.

Replace the omnidirectional antennas with unidirectional antennas.

B.

Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.

C.

Replace the 802.11 wireless standard and use GSM instead.

D.

Replace the wireless bridges with wireless routers.

Question 23

An email server, which is called “Frederick,” has an IPv6 address of 2001:5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?

Options:

A.

MX

B.

AAAA

C.

SRV

D.

CNAME

E.

TXT

F.

NS

Question 24

A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

Options:

A.

Public cloud

B.

SaaS

C.

PaaS

D.

Hybrid cloud

Question 25

A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection?

Options:

A.

An RG-59 cable with BNC connectors

B.

A multi-mode fiber cable

C.

A straight-through Cat5 UTP cable

D.

A cable with TIA/EIA 568a and 568b on each end

Question 26

First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?

Options:

A.

Firewall configuration documentation

B.

Change management documentation

C.

Network performance baseline

D.

Logical diagram

Question 27

Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

Options:

A.

Multicast

B.

Spanning tree

C.

ICMP

D.

SNMP

Question 28

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

Options:

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Question 29

A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?

Options:

A.

No QoS configured on the network

B.

Signal-to-noise ratio

C.

Interference from the microwave in the breakroom

D.

Rogue AP installed in the office

Question 30

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

Options:

A.

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network.

B.

An IDS will detect traffic anomalies, alert and log them, and block the traffic.

C.

An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic.

D.

An IPS will detect traffic anomalies, alert and log them, and allow them through the network.

E.

An IPS will detect previously unknown traffic signatures, and alert and log them.

F.

An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Question 31

A network technician is installing a new PTZ camera for the security department. The camera is capable of being powered via the Ethernet cable, but it is not powering on. The network technician has tested the cable and received positive results. Which of the following is MOST likely the issue?

Options:

A.

The camera requires PoE+, but the switch is delivering only PoE.

B.

A straight-through cable is being used, but the camera requires a crossover cable.

C.

The camera is configured for the wrong segmented network.

D.

The cable has a bad pinout and needs to be reterminated.

Question 32

A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

Options:

A.

Additional PIN

B.

Security questions

C.

RSA token

D.

Access control lists

Question 33

A company deploys many workers in the field who remotely access files from a server at headquarters.

Leadership is concerned about the risks posed when field workers update these files from unsecured networks. Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.)

Options:

A.

Implement SSL VPN connections from the remote devices to headquarters.

B.

Change file access protocols from SFTP to FTP on the remote devices.

C.

Utilize HTTPS to access the company intranet from remote devices.

D.

Configure WPA2 on the wireless networks at headquarters.

E.

Configure IMAP over port 143 for email access on remote devices.

Question 34

Which of the following should a network administrator deploy to control all preventive security measures?

Options:

A.

UTM

B.

Firewall

C.

IDS

D.

Proxy

Question 35

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

Options:

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Question 36

The IT director has requested that systems administrators be able to RDP to their servers. Internal users should not be able to access external websites that do not use HTTPS. The network technician implements the following ruleset:

10 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 3389

20 deny tcp 192.168.1.0 0.0.0.255 any eq 80

30 permit tcp 192.168.1.0 0.0.0.255 any eq 443

40 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 80

50 deny ip any any

After implementing this change, users on the 192.168.1.0/24 subnet begin reporting they can no longer access internal servers, Which of the following should the network technician do to correct the issue

and satisfy the director's request?

Options:

A.

Move line 20 to appear after line 40.

B.

Move line 30 to appear before line 10.

C.

Remove line 40.

D.

Remove line 50.

Question 37

A network engineer is provisioning a new Linux server in a public cloud. Which of the following types of cloud service should be utilized?

Options:

A.

PaaS

B.

SaaS

C.

DaaS

D.

laaS

Question 38

A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies would allow for the LEAST signal attenuation?

Options:

A.

2.4GHz

B.

5GHz

C.

850MHz

D.

900MHZ

Question 39

The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?

Options:

A.

The brown pair UTP has a short.

B.

The camera requires 802.3at power

C.

The camera requires Cat 7 cabling.

D.

The switchport has PoE disabled.

Question 40

Given the table below:

Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?

Options:

A.

192.168.5.1

B.

192.168.11.0

C.

192.168.11.255

D.

192.168.255.255

Question 41

An ARP request is broadcasted and sends the following request.

''Who is 192.168.1.200? Tell 192.168.1.55''

At which of the following layers of the OSI model does this request operate?

Options:

A.

Application

B.

Data link

C.

Transport

D.

Network

E.

Session

Question 42

A network administrator is concerned about the management traffic between a machine and the corporate router. Which of the following protocols should the administrator use to prevent a security breach?

Options:

A.

VNC

B.

SSH

C.

RDP

D.

SFTP

Question 43

A technician is performing a maintenance task on a weekly basis and wants to ensure the task is property documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?

Options:

A.

Standard operating procedure

B.

Work order

C.

Performance baseline D. Logical diagram

D.

Change management

Question 44

A user in the finance department can access the department printer and file server yet is unable to print to the marketing department’s printer. A technician runs ipconfig and sees the following output:

IPv4 Address. . . . . . . . . . . : 192.168.0.101

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

The technician has verified the user’s PC is in the proper VLAN and sees an UP/UP status on the switchport. Which of the following is MOST likely causing the issue?

Options:

A.

The user’s IP is the broadcast address.

B.

The two printers share the same IP address.

C.

There is an incorrect default gateway on the user’s PC.

D.

The ARP table on the switch has not been cleared.

Question 45

Which of the following describes the function of Layer 3 of the OSI model?

Options:

A.

It provides sequencing and acknowledgments tot connection-oriented communication.

B.

It provides connectionless communication using logical addressing.

C.

It provides error detection through the FCS for frames transmitted.

D.

It provides encryption and compression for data received

Question 46

A network technician has been attempting to gain access to a switch over the network after an extended power outage but has been unsuccessful. The technician runs a network scan and does not find

the switch in the results. The switch is turned on, and the link lights are all green. Which of the following should the technician use to gain access to the switch?

Options:

A.

SSH

B.

OOB

C.

VNC

D.

Telnet

Question 47

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

Options:

A.

Static IP

B.

Default gateway

C.

DNS entries

D.

Local host file

Question 48

Which of the following accurately describes a warm site in datacenter disaster recovery?

Options:

A.

An online standby datacenter that is fully equipped without company data

B.

A backup datacenter location that is ready for equipment to be installed

C.

A backup datacenter location that is fully equipped bot not online

D.

An online, standby datacenter that is fully equipped with all company data

Question 49

A company's sales department is accustomed lo sharing information with other organizations via FTP; however. FTP recently stopped working for the sales employees. Upon further review, it is determined a junior network technician recently applied an ACL without going through the proper change management process. The network administrator found the following ACL:

Which of the following statement Identifies the main Issue?

Options:

A.

An extended ACL is being used rather man a standard ACL.

B.

DNS needs to De allowed before FIP will work.

C.

The ACL contains an Incorrect port number.

D.

The ACL was applied incorrectly to the interface.

Question 50

A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?

Options:

A.

IDF

B.

WAN

C.

LAN

D.

DMZ

Question 51

Which of the following represents where the ISP's WAN connection is handed off to the local network?

Options:

A.

Demilitarized zone

B.

intermediate distribution frame

C.

Extranet

D.

Demarcation point

Question 52

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

Options:

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Question 53

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

Options:

A.

Omni

B.

Directional

C.

Yagi

D.

Parabolic

Question 54

A technician is setting up a surveillance system at a small office. The customer would like to have the network controlled by the office's firewall/router device. The office has a coaxial ISP connection with an ISP provided cable modem. Which of the following should the technician configure on the cable modem to meet the customer requirements?

A Route with NAT

B. PPP

C. PPPoE

D. Bridge mode

Options:

Question 55

A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?

Options:

A.

SNMP

B.

Log review

C.

Vulnerability scanning

D.

SIEM

Question 56

A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP’s network and the start of the customer’s network?

Options:

A.

Router

B.

Hub

C.

Modern

D.

Switch

Question 57

A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away In the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

Options:

A.

Add more access points to the mesh network.

B.

Increase Transmit power levels on the access points

C.

Physically connect more access points.

D.

Change the antenna type on the WAPs.

Question 58

Which of the following properties should be configured to extend logical network separation on an uplink interface to a second switch?

Options:

A.

802.1Q trunking

B.

Multiple untagged ports

C.

Port mirroring

D.

Management VLAN

Question 59

A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?

Options:

A.

10GBaseT

B.

1000BaseT

C.

1000BaseSX

D.

1000BaseLX

Question 60

Two buildings are connected with 802.11a wireless bridges using omnidirectional antennas However, the connection between the two bridges often drops Which of the following would be the BEST solution?

Options:

A.

Change the antennas to unidirectional.

B.

Conduct a site survey to identify sources of noise

C.

Add a second wireless bridge at each building.

D.

Change the bridges to use 802.11g

Question 61

A company’s information security team has requested that wireless devices connect using wireless security that utilizes block-cipher encryption for data in transit. Which of the following wireless security mechanisms should be

configured?

Options:

A.

TKIP-RC4

B.

PEAP

C.

WPA2

D.

EAP-TLS

Question 62

A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?

Options:

A.

DB9

B.

RJ11

C.

RJ45

D.

DB25

Question 63

Which of the following technologies relies on circuit switching?

Options:

A.

DMVPN

B.

MPLS

C.

PPPoE

D.

DOCSIS

Question 64

A server administrator needs to perform a backup of all files on the server but does not have enough time overnight. The administrator can perform a backup of all files on weekends and wants to choose another backup for during the week that will provide the fastest restore if there is a need. Which of the following will provide the FASTEST restoration of files?

Options:

A.

Incremental backups every day, with full backups on the first of each month

B.

Differential backups on weekends and incremental backups on weekdays

C.

Full backups on Saturdays and differential backups on the remaining days of the week

D.

Full backups on Saturdays and incremental backups on the remaining days

E.

Incremental backups on Saturdays and differential backups on the remaining days

Question 65

A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network After verifying the vulnerability with the vendor the network. technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?

Options:

A.

Application fuzzing

B.

Malware signature management

C.

Network traffic analysis with tcpdump

D.

Vulnerability scanning

Question 66

A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site?

Options:

A.

Enable an IPSec tunnel.

B.

Enable RDP access to the firewall.

C.

Enable port 80 access.

D.

Enable Telnet access to the firewall

Question 67

A network administrator is troubleshooting a connectivity issue to a remote switch. The administrator suspects the settings on the switch have been changed, causing the issue. Which of the following should the administrator reference to confirm the change?

Options:

A.

Configuration baseline

B.

Network SOP

C.

Rack diagrams

D.

Inventory management

Question 68

The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?

Options:

A.

SaaS

B.

PaaS

C.

CaaS

D.

laaS

Question 69

A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same

equipment?

Options:

A.

MIMO

B.

TKIP

C.

LTE

D.

SSID

Question 70

A network technician is working to bring a new workstation onto the network. No lights come on when the technician plugs the Ethernet cable into the workstation. The technician checks the connection in the IDF and discovers the data jack is not labeled. Which of the following tools should the technician use to trace the network connection back to the IDF?

Options:

A.

A port scanner

B.

A loopback adapter

C.

An OTDR

D.

A tone generator

Question 71

A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected?

Options:

A.

MX

B.

CNAME

C.

AAAA

D.

SRV

Question 72

Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?

Options:

A.

Ransomware

B.

Phishing

C.

DDoS

D.

Social engineering

E.

Spoofing

Question 73

After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups?

Options:

A.

ipconfig /flushdns

B.

ipconfig /release

C.

ipconfig /renew

D.

ipconfig /all

Question 74

A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions should the technician Implement?

Options:

A.

SaaS

B.

SAN

C.

NAS

D.

laaS

Question 75

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

Options:

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Question 76

A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

VNC

Question 77

A network technician is reading a network diagram and looking for the edge router. Which of the following is MOST likely the symbol used for the router?

Options:

A.

A circle with four outward arrows

B.

A rectangle with two horizontal arrows

C.

A square with two circular arrows

D.

A triangle with three outward arrows

Question 78

Joe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:

Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error.

Which of the following is the MOST likely cause of this error?

Options:

A.

The web server is missing an intermediate certificate.

B.

The website is missing an HTTPS certificate.

C.

TLS is not enabled in the browser.

D.

The SSL certificate has expired.

Question 79

To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?

Options:

A.

SIP

B.

PAT

C.

NAT

D.

VIP

Question 80

The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?

Options:

A.

802.1X

B.

802.1q

C.

802.3at

D.

802.3af

Question 81

Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?

Options:

A.

Duplex/speed mismatch

B.

ACL misconfiguration

C.

Bad port

D.

Crosstalk

Question 82

A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall? (Select TWO).

Options:

A.

20

B.

21

C.

53

D.

67

E.

68

F.

389

Question 83

A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?

Options:

A.

Change management

B.

Network diagrams

C.

Inventory report

D.

Labeling report

Question 84

The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?

Options:

A.

nmap

B.

arp

C.

tcpdump

D.

dig

Question 85

A network technician has deployed an application that can remotely control desktops with different operating systems. The technician needs to be able to use a single client application for this control. Which of the following has the technician utilized?

Options:

A.

RDP

B.

VPN

C.

VNC

D.

SSH

Question 86

Which of the following can be used to prevent unauthorized employees from entering restricted areas?

Options:

A.

Sign-in sheets

B.

Video cameras

C.

Motion sensors

D.

Swipe badges

Question 87

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

Options:

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Question 88

A technician has been asked to install biometric controls at the entrance of a new datacenter. Which of the following would be appropriate authentication methods to meet this requirement? (Choose two.)

Options:

A.

Badge reader

B.

Retina scanner

C.

Random number-generating token

D.

Device proximity sensor

E.

Challenge question

F.

Combination lock

G.

Fingerprint reader

Question 89

Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use?

Options:

A.

3DES encryption

B.

SSL certificate

C.

Digital signatures

D.

MD5 hash

Question 90

A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?

Options:

A.

Exhausted DHCP scope

B.

Untrusted SSL certificates

C.

Duplicate MAC addresses

D.

Incorrect firewall settings

Question 91

A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?

Options:

A.

Remote desktop gateway

B.

Transport mode IPSec

C.

SSH tunneling

D.

TLS VPN

Question 92

A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?

Options:

A.

tracert

B.

netstat

C.

arp

D.

dig

Question 93

Which of the following should be performed on a regular basis to prevent unauthorized access to a company network? (Choose two.)

Options:

A.

Packet analysis

B.

Reviewing baselines

C.

Vulnerability scanning

D.

Patch management

E.

Log archiving

Question 94

A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed?

Options:

A.

1000BaseLX SFP

B.

Duplex GBIC

C.

Duplex SFP+

D.

Bidirectional SFP

Question 95

Due to regulatory requirements, a college bookstore prohibits customers from accessing the wireless network in the building. Which of the following would be the BEST method to prevent customers from accessing the wireless network while in the bookstore?

Options:

A.

Use MAC filtering for authorization to the wireless network.

B.

Require PEAP for authentication to the wireless network.

C.

Implement a Faraday cage within the bookstore premises.

D.

Require a pre-shared key for authentication to the wireless network.

Question 96

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

Options:

A.

Open wireless

B.

Geofencing

C.

Pre-shared key

D.

MAC filtering

Question 97

An NGFW alerts that a web server in the DMZ is sending suspicious traffic. A network administrator finds that port 25 is open, and the traffic is originating from this port. The only purpose of this server is to deliver website traffic. Which of the following should the network administrator recommend to the systems administrator?

Options:

A.

Disable Telnet service on the server.

B.

Disable DHCP service on the server.

C.

Disable the SMTP service on the server

D.

Disable FTP service on the server.

Question 98

A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Select TWO).

Options:

A.

RJ45

B.

DB-9

C.

LC

D.

SFTP

E.

GBIC

F.

SC

Question 99

Which of the following physical security devices is used to prevent unauthorized access into a datacenter?

Options:

A.

Motion detector

B.

Video camera

C.

Asset tracking

D.

Smart card reader

Question 100

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

Options:

A.

Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.

B.

Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.

C.

Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

D.

Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

Question 101

When configuring a new switch in a packet-switched network, which of the following helps protect against network loops?

Options:

A.

Spanning tree

B.

Flood guard

C.

BPDU guard

D.

DHCP snooping

Question 102

A network technician has installed multiple new lightweight access points across the network. Which of the following devices should the technician use to manage the new access points?

Options:

A.

Wireless controller

B.

SSH

C.

DHCP server

D.

Content filter

E.

WiFi analyzer

Question 103

A bookstore uses a Faraday cage to comply with credit card regulations Customers report that their cellular phones have no signal when they are in the bookstore Which of the following is the MOST likely cause?

Options:

A.

The Faraday cage is creating interference within the bookstore

B.

The Faraday cage prevents access by redirecting signals

C.

The Faraday cage is creating latency on the cellular network

D.

The Faraday cage is creating attenuation of the cellular network

Page: 1 / 26
Total 688 questions