Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA N10-009 Dumps Questions Answers

Page: 1 / 32
Total 462 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Question 2

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Question 3

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 4

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Question 5

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Question 6

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

Options:

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Question 7

A network administrator receives a ticket from a user. The user reports that they cannot access any websites and that they have already checked everything on their computer. Which of the following is the first action the administrator should take?

Options:

A.

Divide and conquer.

B.

Establish a theory of probable cause.

C.

Question the user.

D.

Document the findings.

Question 8

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question 9

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

Options:

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Question 10

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 11

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Question 12

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

    Subnet: 10.8.100.1/24

    Scope: 10.8.100.50 – 10.8.100.150

    Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

    IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

Options:

A.

Increase the scope to 10.8.100.35 – 10.8.100.150

B.

Increase the scope to 10.8.100.40 – 10.8.100.150

C.

Increase the scope to 10.8.100.40 – 10.8.100.175

D.

Increase the scope to 10.8.100.50 – 10.8.100.175

Question 13

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

Options:

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Question 14

An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?

Options:

A.

On-path

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Question 15

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

Options:

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Question 16

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Question 17

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Question 18

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Question 19

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

Options:

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Question 20

A company's Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

NTP

D.

SNMP

Question 21

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 22

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Question 23

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 24

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Question 25

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

Options:

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Question 26

Which of the following allows for the interception of traffic between the source and destination?

Options:

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Question 27

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question 28

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Question 29

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Question 30

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 31

Which of the following ports creates a secure connection to a directory service?

Options:

A.

22

B.

389

C.

445

D.

636

Question 32

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Question 33

A company’s Chief Information Security Officer requires that servers and firewalls have accurate timestamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

SNMP

D.

NTP

Question 34

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Question 35

A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?

Options:

A.

Coaxial cable

B.

9.8ft (3m) cable

C.

Plenum cable

D.

STP cable

Question 36

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Question 37

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 38

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

Options:

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Question 39

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Question 40

After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?

Options:

A.

Include backup power for air-conditioning units

B.

Configure door locks to automatically lock during power outages

C.

Increase UPS battery size

D.

Add an IoT-enabled thermostat

Question 41

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

Options:

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Question 42

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question 43

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Question 44

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

Options:

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Question 45

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

Options:

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

Question 46

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Question 47

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

Options:

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Question 48

A network technician is designing a LAN for a new facility. The company is expecting more than 300 devices to connect to the network. Which of the following masks will provide the most efficient subnet?

Options:

A.

255.255.0.0

B.

255.255.192.0

C.

255.255.254.0

D.

255.255.255.254

Question 49

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

Options:

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Question 50

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

Options:

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Question 51

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

Options:

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

Question 52

A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage?

Options:

A.

MAC filtering

B.

Administrative distance

C.

Bluetooth beacon signals

D.

IP address blocks

Question 53

Which of the following network traffic types is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 54

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

Options:

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Question 55

Which of the following allows for interactive, secure remote management of a network infrastructure device?

Options:

A.

SSH

B.

VNC

C.

RDP

D.

SNMP

Question 56

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Question 57

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Question 58

Which of the following objectives does an evil twin achieve?

Options:

A.

DNS poisoning

B.

Login credentials

C.

ARP spoofing

D.

Denial of service

Question 59

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question 60

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute over a maximum of 30 hops

10.1.1.1 <1 ms 2. * <1 ms <1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router's ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Question 61

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Question 62

Which of the following network topologies contains a direct connection between every node in the network?

Options:

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Question 63

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Question 64

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Question 65

Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?

Options:

A.

OSPF

B.

EIGRP

C.

BGP

D.

RIP

Question 66

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Question 67

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

Options:

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Question 68

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 69

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

Options:

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Question 70

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

Options:

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Question 71

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Question 72

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 73

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Question 74

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

Options:

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Question 75

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Question 76

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

Options:

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Question 77

Which of the following most directly secures sensitive information on a network?

Options:

A.

Data-in-transit encryption

B.

Principle of least privilege

C.

Role-based access controls

D.

Multifactor authentication

Question 78

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Question 79

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

Options:

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Question 80

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Question 81

Which of the following explains what happens if a packet is lost in transit when using UDP?

Options:

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Question 82

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

Options:

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Question 83

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

Options:

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Question 84

A Linux server is running a log collector that needs to be hardened. A network administrator executes netstat to find open ports on the server. Which of the following ports should be disabled?

Options:

A.

22

B.

80

C.

162

D.

514

Question 85

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 86

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

Options:

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Question 87

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Question 88

A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user's laptop is lost. Which of the following frequency bands is the laptop most likely using?

Options:

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

900MHz

Question 89

Which of the following is a documented set of requirements, such as quality, availability, and responsibilities delivered by a vendor?

Options:

A.

MOU

B.

EOL

C.

EOS

D.

SLA

Question 90

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

Options:

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Question 91

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 92

A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for this task?

Options:

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Question 93

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Question 94

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Question 95

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 96

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

Options:

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Question 97

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Question 98

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Which of the following is the most likely cause of the user's connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Question 99

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 100

Which of the following is the best way to securely access a network appliance from an external location?

Options:

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Question 101

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

Options:

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Question 102

Which of the following network cables involves bouncing light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Question 103

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Question 104

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Question 105

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Question 106

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Question 107

Which of the following allows a standard user to log in to multiple resources with one account?

Options:

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Question 108

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 109

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

Options:

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Question 110

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Question 111

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Question 112

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

Options:

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

Question 113

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Question 114

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Question 115

Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue?

Options:

A.

Spanning Tree

B.

Enhanced Interior Gateway Routing Protocol (EIGRP)

C.

Cisco Discovery Protocol (CDP)

D.

Link Layer Discovery Protocol (LLDP)

E.

Border Gateway Protocol (BGP)

Question 116

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Question 117

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

Options:

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Question 118

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Question 119

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user's issue?

Options:

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Question 120

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Question 121

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Question 122

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Question 123

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

Options:

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Question 124

A user recently moved a workstation to a different part of the office. The user is able to access the internet and print but is unable to access server resources. Which of the following is the most likely cause of the issue?

Options:

A.

Incorrect default gateway

B.

Wrong VLAN assignment

C.

Error-disabled port

D.

Duplicate IP address

Question 125

Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

Phishing

Question 126

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 127

A new staff member is unable to connect to the network. An IT support staff member finds the following:

    The IP configuration is correct.

    The TCP/IP stack is working on the workstation.

    The gateway is unreachable.

Which of the following would the IT support staff member most likely check next?

Options:

A.

The DHCP configuration on the workstation

B.

The port's VLAN assignment on the switch

C.

The DHCP configuration on the router

D.

The default gateway on the switch

Question 128

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Page: 1 / 32
Total 462 questions