Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Demo: 145 questions
Total 507 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Question 2

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

Options:

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Question 3

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

Options:

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Question 4

A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this connector type?

Options:

A.

ST

B.

BNC

C.

SC

D.

LC

Question 5

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

Options:

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Question 6

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Question 7

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Question 8

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Question 9

A customer calls the help desk to report that resources are no longer reachable. The resources were available before network changes were made. The technician verifies the report, investigates, and discovers that a new logical layout is segmenting the network using tagging. Which of the following appliances most likely needs to be reviewed to restore the connections?

Options:

A.

Access point

B.

Firewall

C.

Switch

D.

Load balancer

Question 10

A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?

Options:

A.

Throughput capacity

B.

Roaming misconfiguration

C.

Channel overlap

D.

Packet loss

Question 11

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

Options:

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Question 12

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

Options:

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Question 13

A network technician is designing a LAN for a new facility. The company is expecting more than 300 devices to connect to the network. Which of the following masks will provide the most efficient subnet?

Options:

A.

255.255.0.0

B.

255.255.192.0

C.

255.255.254.0

D.

255.255.255.254

Question 14

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

Options:

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Question 15

Which of the following is enforced through legislation?

Options:

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Question 16

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 17

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 18

Which of the following helps a network administrator understand security risk from external malicious actors and offers insights on which threats to mitigate?

Options:

A.

Compliance benchmarks

B.

CIA triad

C.

SAML

D.

Honeypot

Question 19

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

Options:

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Question 20

Which of the following most likely requires the use of subinterfaces?

Options:

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question 21

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Question 22

Which of the following uses the longest prefix match to determine an exit interface?

Options:

A.

ARP table

B.

MAC address table

C.

Routing table

D.

Netstat table

Question 23

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 24

Which of the following standards enables the use of an enterprise authentication for network access control?

Options:

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

Question 25

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Question 26

A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration.

Which of the following actions should the company take?

Options:

A.

Restrict users to the 5GHz frequency.

B.

Upgrade to a mesh network.

C.

Migrate from PSK to Enterprise.

D.

Implement WPA2 encryption.

Question 27

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question 28

Which of the following is a difference between EOL and EOS?

Options:

A.

EOL discontinues the product but may offer support.

B.

EOS replaces free support with a subscription model.

C.

EOS only applies to physical products.

D.

EOL still guarantees warranty service.

Question 29

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 30

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

Options:

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question 31

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Question 32

A technician is troubleshooting a user ' s laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 33

Two network switches at different locations are connected via fiber-optic cable at a distance of 10 miles (16 km). The duplex fiber-optic patch cord between the patch panel and switch is accidentally pinched, stopping connectivity between the two switches. A network technician replaces the broken cable with a new, single-mode patch cord. However, connectivity between both switches is still down and the link lights are still off. Which of the following actions should the technician perform first?

Options:

A.

Replace the fiber-optic transceiver in the switch

B.

Log in to the switch to shut down and re-enable the switchport

C.

Transpose the two fiber connectors at one end of the new patch cord

D.

Swap the single-mode fiber patch cord with a multimode fiber patch cord

Question 34

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Question 35

Which of the following does a router use to determine the preferred route?

Options:

A.

Shortest prefix match

B.

Routes learned from EIGRP

C.

Longest prefix match

D.

Routes learned from OSPF

Question 36

A network technician needs to resolve some issues with a customer ' s SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Cable Test Results:

Cable 1:

Cable 2:

Cable 3:

Cable 4:

Options:

Question 37

A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?

Options:

A.

ESP

B.

SSH

C.

GRE

D.

IKE

Question 38

Which of the following would allow a network administrator to analyze attacks coming from the internet without affecting latency?

Options:

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Question 39

Which of the following does a router prioritize first in the route selection process?

Options:

A.

Prefix length

B.

Metric

C.

Administrative distance

D.

Default route

Question 40

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Question 41

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

Options:

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Question 42

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

Options:

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Question 43

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

Options:

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Question 44

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

Options:

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Question 45

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Question 46

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

Options:

A.

Cold

B.

Warm

C.

Active

D.

Hot

Question 47

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

Options:

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Question 48

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 49

Which of the following protocols is used to route traffic on the public internet?

Options:

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Question 50

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 51

Which of the following network cables involves bouncing light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Question 52

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Question 53

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Question 54

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 55

Which of the following explains what happens if a packet is lost in transit when using UDP?

Options:

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Question 56

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question 57

A network technician is configuring the company’s network of 100 Mbps Layer 2 switches. The technician wants increased throughput for the uplinks between switches. The technician connects multiple redundant links between the switches. Which of the following should the technician configure?

Options:

A.

Spanning Tree Protocol

B.

Switch Virtual Interfaces

C.

Native VLAN

D.

First Hop Redundancy Protocol

Question 58

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 59

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

Options:

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

Question 60

A customer wants to cache commonly used content to reduce the number of full page downloads from the internet. Which of the following should the network administrator recommend?

Options:

A.

Proxy server

B.

Load balancer

C.

Open relay

D.

Code repository

Question 61

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Question 62

A user reports issues accessing a file server on a LAN with the IP address 192.168.50.140 at a large facility with incomplete infrastructure documentation. The following are the results of the ping command:

ping -c 10 192.168.50.140

Packets: Sent = 10, Received = 5, Lost = 5 (50% loss)

Round-trip times: Minimum = 3ms, Maximum = 144ms, Average = 42ms

Which of the following should a technician do next to continue troubleshooting the issue at the switch with minimal impact ?

Options:

A.

Perform toning and probe.

B.

Replace the cable.

C.

Visually locate the fault.

D.

Restart the switch.

Question 63

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

Options:

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Question 64

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 65

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Question 66

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

Options:

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Question 67

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Question 68

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

Options:

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Question 69

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Question 70

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

Options:

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Question 71

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Question 72

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

Options:

A.

NAT

B.

VIP

C.

PAT

D.

BGP

Question 73

Which of the following cable types allows the use of QSFP ports without requiring transceivers?

Options:

A.

Multimode

B.

Twinaxial

C.

RG11

D.

Category 6

Question 74

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

Options:

A.

GRE

B.

IKE

C.

ESP

D.

AH

Question 75

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 76

Which of the following devices functions mainly at the data link layer of the OSI model and is used to connect a fiber-optic cable to a network interface?

Options:

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Question 77

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Question 78

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Question 79

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 80

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Question 81

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

Options:

A.

Physical

B.

Network

C.

Session

D.

Transport

Question 82

A company ' s marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 83

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 84

Which of the following attacks forces a switch to send all traffic out of all ports?

Options:

A.

ARP poisoning

B.

Evil twin

C.

MAC flooding

D.

DNS spoofing

Question 85

Which of the following network topologies contains a direct connection between every node in the network?

Options:

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Question 86

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

Options:

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Question 87

A company is concerned that the public can use network wall jacks in publicly available conference rooms to access company servers. Which of the following is the best way to mitigate the vulnerability?

Options:

A.

Create a trusted zone.

B.

Disable unused services.

C.

Use MAC filtering.

D.

Implement 802.1X.

Question 88

A new SQL server is identified as allowing FTP access to all users. Which of the following would a systems administrator most likely do to ensure only the required services are allowed?

Options:

A.

Disable unused ports on the server.

B.

Change default passwords on all servers.

C.

Delete the NGFW rules that allow all FTP traffic.

D.

Configure server ACLs on the switches that the SQL traffic traverses.

Question 89

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

GUI

D.

API

Question 90

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Question 91

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Question 92

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Question 93

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Question 94

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company ' s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company ' s network.

Question 95

Which of the following is an example of a split-tunnel VPN?

Options:

A.

Only public resources are accessed through the user’s internet connection.

B.

Encrypted resources are accessed through separate tunnels.

C.

All corporate and public resources are accessed through routing to on-site servers.

D.

ACLs are used to balance network traffic through different connections.

Question 96

A customer purchases a new UTM device and wants the development team to integrate some of the device’s data-reporting capabilities into the company’s custom internal support software. Which of the following features should the development team use to obtain the device’s data?

Options:

A.

API

B.

SNMPv2c

C.

SIEM

D.

MIB

Question 97

Which of the following network traffic types is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 98

A network administrator ' s device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Question 99

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Question 100

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

Options:

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Question 101

A network administrator is trying to troubleshoot an issue with a newly installed switch that is not connecting to the network. The administrator logs on to the switch and observes collisions on the interface. Which of the following is most likely the issue?

Options:

A.

Wrong speed

B.

Jumbo frames enabled

C.

Incorrect VLAN

D.

Duplex mismatch

Question 102

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Question 103

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Question 104

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

Options:

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Question 105

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Question 106

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Question 107

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

Options:

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Question 108

A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user ' s laptop is lost. Which of the following frequency bands is the laptop most likely using?

Options:

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

900MHz

Question 109

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

Options:

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Question 110

Which of the following would describe a data recovery goal?

Options:

A.

MTBF

B.

RPO

C.

BCP

D.

MTTR

Question 111

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

Options:

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Question 112

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Question 113

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

Options:

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Question 114

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Question 115

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

Options:

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Question 116

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Question 117

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Question 118

Which of the following protocols is used to send networking status messages between clients and servers?

Options:

A.

SSH

B.

DHCP

C.

NTP

D.

SNMP

Question 119

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

Options:

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Question 120

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Question 121

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator ' s needs?

Options:

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Question 122

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user ' s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Question 123

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

Options:

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Question 124

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

Options:

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Question 125

Which of the following network access methods is used to securely access resources, such as a corporate cloud or network, as if they were directly connected?

Options:

A.

Jump box/host

B.

Secure Shell

C.

Client-to-site VPN

D.

GRE tunnel

Question 126

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Question 127

A server administrator needs to add a record to the company ' s DNS server to verify ownership of a web domain. The administrator has the record ' s name and value. Which of the following record types should the administrator use to add the record to the DNS server?

Options:

A.

TXT

B.

A

C.

PTR

D.

CNAME

Question 128

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Question 129

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 130

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Question 131

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Question 132

Which of the following is the best use case of a site-to-site VPN?

Options:

A.

Securing access across an untrusted network

B.

Encrypting data at rest

C.

Filtering traffic between two internal subnets

D.

Hosting public-facing applications that contain company resources

Question 133

A user recently moved a workstation to a different part of the office. The user is able to access the internet and print but is unable to access server resources. Which of the following is the most likely cause of the issue?

Options:

A.

Incorrect default gateway

B.

Wrong VLAN assignment

C.

Error-disabled port

D.

Duplicate IP address

Question 134

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Question 135

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Question 136

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Question 137

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

Options:

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Question 138

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Question 139

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 140

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Question 141

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Question 142

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

Options:

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Question 143

Which of the following is the final step in the ticket management process?

Options:

A.

Escalating to senior management

B.

Performing functional and non-functional testing

C.

Documenting findings, outcomes, and lessons learned

D.

Establishing a detailed action plan

Question 144

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question 145

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

Demo: 145 questions
Total 507 questions