ERASED TEST, YOU MAY BE INTERESTED ON CompTIA Network + October 2024 v1
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
CompTIA Network + October 2024 v1 Description: N10-009 CompTIA Network+ Author: Rabelani Other tests from this author Creation Date: 07/10/2024 Category: Computers Number of questions: 98 |
Share the Test:
New Comment
No comments about this test.
Content:
A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.
INSTRUCTIONS
Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the
correct settings:
· Ensure each device accesses only its
correctly associated network.
· Disable all unused switchports.
. Require fault-tolerant connections
between the switches.
. Only make necessary changes to
complete the above requirements. Port 1 Configuration (Uplink to Core Switch)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN150, VLAN220
Port 2 Configuration (Uplink to Core Switch)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN150, VLAN220
Port 3 Configuration (Server Connection)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN90 (Servers)
Port 4 Configuration (Server Connection)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN90 (Servers)
Port 5 Configuration (Wired Users and WLAN)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN120, VLAN150
Port 6 Configuration (Wired Users and WLAN)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN120, VLAN150
Port 7 Configuration (Voice and Wired Users)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN220
Port 8 Configuration (Voice, Printers, and Wired Users)
Status: Enabled
LACP: Enabled
Speed: 1000
Duplex: Full
VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN220
Port 1 Configuration (Unused)
Status: Disabled
LACP: Disabled
Port 2 Configuration (Unused)
Status: Disabled
LACP: Disabled
Port 3 Configuration (Connection to Device)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN1 (Default)
Port 4 Configuration (Connection to Device)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN1 (Default)
Port 5 Configuration (Connection to Device)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN1 (Default)
Port 6 Configuration (Connection to Device)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN1 (Default)
Port 7 Configuration (Connection to Device)
Status: Enabled
LACP: Disabled
Speed: 1000
Duplex: Full
VLAN Configuration: Untagged for VLAN1 (Default)
Ports 1 and 2 on Switch 1 are configured as trunk ports with VLAN tagging enabled for all necessary VLANs.
Ports 3 and 4 on Switch 1 are configured for server connections with VLAN 90 untagged.
Ports 5, 6, 7, and 8 on Switch 1 are configured for devices needing access to multiple VLANs.
Unused ports on Switch 3 are disabled.
Ports 3, 4, 5, 6, and 7 on Switch 3 are enabled for default VLAN1.
Core Switch Ports should be configured as needed for uplinks to Switch 1.
Ensure LACP is enabled for redundancy on trunk ports between switches.
By following these configurations, each device will access only its correctly associated network, unused switch ports will be disabled, and fault-tolerant connections will be established between the switches. JomZ01 Most Recent 1 week, 1 day ago
Switch 1
Ports 1 & 2: Port Enabled | LACP Enabled | VLAN 60/90/120/150/220 Tagged
Ports 3 & 4: Port Enabled | LACP Disabled | VLAN 90 Untagged
Ports 5 & 6: Port Enabled | LACP Enabled | VLAN 60/120/150 Tagged
Ports 7 & 8: Port Enabled | LACP Enabled | VLAN 60/90/120/220 Tagged
Switch 3
Ports 1 & 2: Port Enabled | LACP Enabled | VLAN 60/90/120/220 Tagged
Port 3: Port Disabled
Port 4: Port Enabled | LACP Disabled | VLAN 220 Tagged | VLAN 120 Untagged
Port 5: Port Disabled
Port 6: Port Enabled | LACP Disabled | VLAN 120 Untagged
Port 7: Port Enabled | LACP Disabled | VLAN60 Untagged
Port 8: Port Enabled | LACP Disabled | VLAN90 Untagged
I made the answer based on how I understand it:
Port Enabled - There is a device connected
Port Disabled - There is NO device connected
LACP Enabled - Switch to Switch connections
VLAN Tagged - Switch to Switch connections
VLAN Untagged - End devices (PCs, printers, servers) Switch 1-Ports 1 & 2 >Port Enabled >LACP Enabled >VLAN60/90/120/150/220 Tagged
Switch 1-Ports 3 & 4 >Port Enabled >LACP Disabled >VLAN90 Untagged
Switch 1-Ports 5 & 6 >Port Enabled >LACP Enabled >VLAN60/120/150 Tagged
Switch 1-Ports 7 & 8 >Port Enabled >LACP Enabled >VLAN60/90/120/220 Tagged
Switch 3-Ports 1 & 2 >Port Enabled >LACP Enabled >VLAN60/90/120/220 Tagged
Switch 3-Ports 3 & 5 >Port Disabled
Switch 3-Port 4 >Port Enabled >LACP Disabled >VLAN120/220 Untagged
Switch 3-Port 6 >Port Enabled >LACP Disabled >VLAN120 Untagged
Switch 3-Port 7 >Port Enabled >LACP Disabled >VLAN60 Untagged
Switch 3-Port 8 >Port Enabled >LACP Disabled >VLAN90 Untagged JomZ01 Most Recent 1 week, 1 day ago
Switch 1
Ports 1 & 2: Port Enabled | LACP Enabled | VLAN 60/90/120/150/220 Tagged
Ports 3 & 4: Port Enabled | LACP Disabled | VLAN 90 Untagged
Ports 5 & 6: Port Enabled | LACP Enabled | VLAN 60/120/150 Tagged
Ports 7 & 8: Port Enabled | LACP Enabled | VLAN 60/90/120/220 Tagged
Switch 3
Ports 1 & 2: Port Enabled | LACP Enabled | VLAN 60/90/120/220 Tagged
Port 3: Port Disabled
Port 4: Port Enabled | LACP Disabled | VLAN 220 Tagged | VLAN 120 Untagged
Port 5: Port Disabled
Port 6: Port Enabled | LACP Disabled | VLAN 120 Untagged
Port 7: Port Enabled | LACP Disabled | VLAN60 Untagged
Port 8: Port Enabled | LACP Disabled | VLAN90 Untagged
Switch 1 Port 1 Configuration (Uplink to Core Switch)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN150, VLAN220
Switch 1 Port 2 Configuration (Uplink to Core Switch)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN150, VLAN220
Switch 1 Port 3 Configuration (Server Connection)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN90 (Servers)
Switch 1 Port 4 Configuration (Server Connection)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN90 (Servers)
Switch 1 Port 5 Configuration (Wired Users and WLAN)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN120, VLAN150
Switch 1 Port 6 Configuration (Wired Users and WLAN)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN120, VLAN150
Switch 1 Port 7 Configuration (Voice and Wired Users)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN220
Switch 1 Port 8 Configuration (Voice, Printers, and Wired Users)
* Status: Enabled
* LACP: Enabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Tagged for VLAN60, VLAN90, VLAN120, VLAN220 Switch
Switch 3 Port 1 Configuration (Unused)
* Status: Disabled
* LACP: Disabled
Switch 3 Port 2 Configuration (Unused)
* Status: Disabled
* LACP: Disabled
Switch 3 Port 3 Configuration (Connection to Device)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN1 (Default)
Switch 3 Port 4 Configuration (Connection to Device)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN1 (Default)
Switch 3 Port 5 Configuration (Connection to Device)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN1 (Default)
Switch 3 Port 6 Configuration (Connection to Device)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN1 (Default)
Switch 3 Port 7 Configuration (Connection to Device)
* Status: Enabled
* LACP: Disabled
* Speed: 1000
* Duplex: Full
* VLAN Configuration: Untagged for VLAN1 (Default)
. A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution? Mesh Ad hoc Point-to-point Infrastructure. A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use? 255.255.0.0 255.255.254.0 255.255.255.0 255.255.255.128. A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage? 802.11ac 802.11ax 802.11n 802.11g. A network administrator is configuring a wireless network with an ESSI Which of the following is a user benefit of ESSID compared to SSID? Stronger wireless connection Increased throughput Advanced security Roaming between access points. A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal? GRE IKE ESP AH. After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first? Inspect the connectors for any wires that are touching or exposed. Restore default settings on the connected devices. Terminate the connections again. Check for radio frequency interference in the area. Which of the following allows a remote user to connect to the network? Command-line interface API gateway Client-to-site VPN Jump box. Which of the following connectors provides console access to a switch? ST RJ45 BNC SFP. A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.) Least privilege network access Dynamic inventeries Central policy management Zero-touch provisioning Configuration drift prevention Subnet range limits. Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue? Network tap Cable tester Visual fault locator Toner and probe. Which of the following devices can operate in multiple layers of the OSI model? Hub Switch Transceiver Modem. A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see? 4096 8192 32768 36684. An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source? TXT AAAA CNAME MX. A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution? Extranet Trusted VPN Public. Which of the following is a characteristic of the application layer? Preventing a loop within a LAN Improving reconvergence times Exchanging router updates with a different ISP Sharing routes with a Layer 3 switch. Which of the following is a cost-effective advantage of a split-tunnel VPN? Web traffic is filtered through a web filter. More bandwidth is required on the company's internet connection. Monitoring detects insecure machines on the company’s network. Cloud-based traffic flows outside of the company's network. Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units? MTTR MTBF RPO RTO. A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task? ACLs Port security Content filtering NAC. A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port? Toner Laptop Cable tester Visual fault locator. Which of the following is used to describe the average duration of an outage for a specific service? RPO MTTR RTO MTBF. A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task? Neighbor adjacency Link state flooding Administrative distance Hop count. Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building? Patch UPS MDF Rack. Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified? Establish a theory. Implement the solution. Create a plan of action. Verify functionality. Which of the following does a full-tunnel VPN provide? Lower bandwidth requirements The ability to reset local computer passwords Corporate Inspection of all networktraffic Access to blocked sites. Which of the following are the best device-hardening techniques for network security? (Select two). Disabling unused ports Performing regular scanning of unauthorized devices Monitoring system logs for irregularities Enabling logical security such as SSO Changing default passwords Ensuring least privilege concepts are in place. Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal? Pre-shared key Autonomous access point Captive portal WPA2 encryption. A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order? MAC security Content filtering Screened subnet Perimeter network. A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application? 172.16.0.0/24 192.168.0.0/24 224.0.0.0/24 240.0.0.0/24. A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task? 802.1X Access control list Port security MAC filtering. Which of the following should a network administrator configure when adding OT devices to an organization’s architecture? Honeynet Data-at-rest encryption Time-based authentication Network segmentation. An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement? SD-WAN VXLAN VPN NFV. Which of the following network traffic type is sent to all nodes on the network? Unicast Broadcast Multicast Anycast. A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation? The web server Is In a different subnet. The router interface is a broadcast address. The IP address space is a class A network. The subnet is in a private address space. A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum? 11MHz 20MHz 40MHz 80MHz 160MHz. A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause? The PoE power budget is exceeded. Port security is violated. The signal is degraded The Ethernet cable is not working. A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement? Multitenancy VPC NFV SaaS. A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application? netstat nslookup ping tracert. A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement? Jumbo frames 802.1Q tagging Native VLAN Link aggregation. Which of the following steps in the troubleshooting methodology includes checking logs for recent changes? Identify the problem. Document the findings and outcomes. Test the theory to determine cause. Establish a plan of action. Which of the following is a characteristic of the application layer? It relies upon other layers for packet delivery. It checks independently for packet loss. It encrypts data in transit. It performs address translation. A network administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case? A physical interface used for trunking logical ports A physical interface used for management access A logical interface used for the routing of VLANs A logical interface used when the number of physical ports is insufficent. A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements? SIEM Syslog NetFlow SNMPv3. A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB. Removing any spliters connecte to the line Switching the devices to wireless Moving the devices closer to the modern Lowering the network speed. Which of the following fiber connector types is the most likely to be used on a network interface card? LC SC ST MPO. A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches: Switch 1 Port State Cost 1 Forward 2 2 Forward 2 Switch 2 Port State Cost 1 Forward 2 2 Forward 2 Which of the following best describes the issue? The port cost should not be equal. The ports should use link aggregation. A root bridge needs to be identified. The switch should be configured for RSTP. Which of the following network Topologies contains a direct connection between every node in the network? Mesh Hub-and-spoke Star Point-to-point. Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication? Datagram Segment Frames Packets. Which of the following describes the best reason for using BGP? Preventing a loop within a LAN Improving reconvergence times Exchanging router updates with a different ISP Sharing routes with a Layer 3 switch. A network technician needs to resolve some issues with a customer's SOHO network. The customer reports that some of the PCs are not connecting to the network, while others appear to be working as intended. INSTRUCTIONS Troubleshoot all the network components. Review the cable test results first, then diagnose by clicking on the appropriate PC, server, and Layer 2 switch. Identify any components with a problem and recommend a solution to correct each problem. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Server1 - no problem PC1 - no problem PC2 - Cable short detected/replace cable PC3 - no problem PC4 - no problem PC5 - connector on backward PC6 - no problem Server1 - no problem PC1 - no problem PC2 - open cable detected/replace cable PC3 - no problem PC4 - wrong vlan/change vlan assignment PC5 - connector on backward/replace cable PC6 - no problem Server1 - no problem PC1 - no problem PC2 - Open Cable detected/replace cable PC3 - no problem PC4 - Wrong VLAN / Change VLAN Assignment PC5 - connector on backward PC6 - no problem. You have been tasked with implementing an ACL on the router that will: 1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments 2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments. 3. Prohibit any traffic that has not been specifically allowed. INSTRUCTIONS Use the drop-downs to complete the ACL If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. SSH Allow SSH Allow SSH Allow SMB Allow Any Deny RDP Deny VNC Deny Any Allow Any Deny SSH Allow Telnet Allow SSH Allow SMB Allow Any Deny RDP Allow Any Allow Any Allow Any Allow RDP Allow SSH Allow RDP Allow SMB Allow Any Deny SSH Deny RDP Deny Any Allow Any Deny. SIMULATION - Users are unable to access files on their department share located on file server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2. INSTRUCTIONS - Click on each router to review output, identify any issues, and configure the appropriate solution. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Router A: Problem found: No Destination Prefix: Destination Mask: Interface: Router B: Problem Found: Yes Destination Prefix: 10.0.1.0 Destination Mask: 255.255.255.0 Interface: Gi2 Router C: Problem Found: No Destination Prefix: Destination Mask: Interface: Router A: Problem found: Yes Destination Prefix: 10.0.5.0 Destination Mask: 255.255.255.0 Interface: Gi1 Router B: Problem Found: Yes Destination Prefix: 10.0.5.0 Destination Mask: 255.255.255.0 Interface: Gi1 Router C: Problem Found: No Destination Prefix: Destination Mask: Interface: Router A: Problem found: Yes Destination Prefix: 10.0.5.0 Destination Mask: 255.255.255.0 Interface: Gi1 Router B: Problem Found: Yes Destination Prefix: 10.0.1.0 Destination Mask: 255.255.255.0 Interface: Gi2 Router C: Problem Found: Yes Destination Prefix: 10.0.5.0 Destination Mask: 255.255.255.0 Interface: Gi2. SIMULATION - After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues. INSTRUCTIONS - Click on each tab at the top of the screen. Select a widget to view information, then use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Which WAN Station should be preferred for VOIP traffic? Which device is experiencing Connectivity issues? Which workstation IP is Generating the most traffic ? Which WAN Station should be preferred for VOIP traffic? = WAN2 Which device is experiencing Connectivity issues? = Router A Which workstation IP is Generating the most traffic ? = 206.208.133.9 Which WAN Station should be preferred for VOIP traffic? = WAN1 Which device is experiencing Connectivity issues? = Router A Which workstation IP is Generating the most traffic ? = 206.208.133.9. Which of the following technologies are X.509 certificates most commonly associated with? PKI VLAN tagging LDAP MFA. A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack? Sides Top Front Rear. A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server? Dig Nmap Tracert nslookup. A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal? Hot Cold Warm Passive. A support agent receives a report that a remote user's wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user's coaxial modern has a signal power of -97dB. Removing any spliters connecte to the line Switching the devices to wireless Moving the devices closer to the modern Lowering the network speed. Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication? Datagram Segment Frames Packets. A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement? Multitenancy VPC NFV SaaS. An engineer was asked to update an MX record for an upcoming project. Which of the following server types is MOST likely to be in scope for the project? Email Web File Database . A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project? Single-mode Coaxial Cat 6a Twinaxial . A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected? Isolating the guest network Securing SNMP MAC filtering Disabling unneeded switchports . A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue? Standard operating procedures Configuration baseline documents Work instructions Change management documentation. A network administrator is troubleshooting a client's device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which Of the following tools would be the BEST option for the network administrator to use to further troubleshoot? Tone generator Multimeter Optical time-domain reflectometer Cable tester . A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access? CDMA CSMA/CD CSMA/CA GSM . Which of the following devices Is used to configure and centrally manage access points Installed at different locations? Wireless controller Load balancer Proxy server VPN concentrator. After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue? TTL MX TXT SOA . A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low. Which Of the following is the MOST appropriate mechanism to handle this issue? Traffic shaping Flow control NetFIow Link aggregation . Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Select TWO). T1A-568-A - TIA-568-B TIA-568-B - TIA-568-B RJ11 RJ45 F-type . Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model? VPN VRRP vSwitch VIP . A technician is equipped with a tablet, a smartphone, and a laptop to troubleshoot a switch with the help of support over the phone. However, the technician is having issues interconnecting all these tools in troubleshooting the switch. Which Of the following should the technician use to gain connectivity? PAN WAN LAN MAN . While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch. While reviewing the interface information in the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors. The technician moves the computer to another switchport and experiences the same issues. Which of the following is MOST likely the cause of the low data rate and port errors? Bad switch ports Duplex issues Cable length Incorrect pinout . A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall? Secure SNMP Port security Implicit deny DHCP snooping . A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server? Load balancing Multipathing NIC teaming Clustering . Which of the following is a requirement when certifying a network cabling as Cat 7? Ensure the patch panel is certified for the same category. Limit 10Gb transmissions to 180ft (55m). Use F-type connectors on the network terminations. Ensure the termination standard is TIA/EIA-568-A. . A company has wireless APS that were deployed with 802.11g. A network engineer has noticed more frequent reports of wireless performance issues during the lunch hour in comparison to the rest of the day. The engineer thinks bandwidth consumption will increase while users are on their breaks, but network utilization logs do not show increased bandwidth numbers. Which Of the following would MOST likely resolve this issue? Adding more wireless APS Increasing power settings to expand coverage Configuring the APS to be compatible with 802.1la Changing the wireless channel used . An administrator would like to allow Windows clients from outside me office to access workstations without using third-party software. Which or the following access methods would meet this requirement? Remote desktop gateway Spit tunnel Site-to-site VPN VNC . An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics In the switch's CLI, the administrator discovers the uplink Is at 100% utilization However, the administrator is unsure how to Identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic? SNMP Traps Syslog NetFlow . A new company recently moved into an empty office space Within days, users in the next office began noticing increased latency and packet drops with their Wi-Fi-connected devices. Which of the following is the MOST likely reason for this issue? Channel overlap Distance from the AP Bandwidth latency RF attenuation Network congestion . A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize? Omni Directional Yagi Parabolic . A network engineer is designing a new secure wireless network. The engineer has been given the following requirements: * 1 Must not use plaintext passwords * 2 Must be certificate based * 3. Must be vendor neutral Which of the following methods should the engineer select? TWP-RC4 CCMP-AES EAP-TLS WPA2. Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring? Jitter Bandwidth Latency Giants . A user reports that a new VoIP phone works properly but the computer that is connected to the phone cannot access any network resources. Which of the following MOST Likely needs to be configured correctly to provide network connectivity to the computer? Port duplex settings Port aggregation ARP settings VLAN tags MDIX settings . A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors? A bad wire on the Cat 5e cable The wrong VLAN assignment to the switchport A misconfigured QoS setting on the router Both sides of the switch trunk set to full duplex . Which of the following records can be used to track the number of changes on a DNS zone? SOA SRV PTR NS. A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully? Ensure an implicit permit rule is enabled Configure the log settings on the firewalls to the central syslog server Update the firewalls with current firmware and software Use the same complex passwords on all firewalls. A network administrator is implementing process changes based on recommendations following a recent penetration test. The testers used a method to gain access to the network that involved exploiting a publicly available and fixed remote code execution vulnerability in the VPN appliance. Which of the following should the administrator do to BEST prevent this from happening again? Change default passwords on internet-facing hardware. Implement robust ACLs with explicit deny-all entries. Create private VLANs for management plane traffic. Routinely upgrade all network equipment firmware. An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements? Load balancing Geofencing Public cloud Content delivery network Infrastructure as a service. Which of the following describes when an active exploit is used to gain access to a network? Penetration testing Vulnerability testing Risk assessment Posture assessment Baseline testing. Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations? 2 4 19 100. Which of the following ports is used for secure email? 25 110 143 587. Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers. IAM MFA RADIUS SAML. SIMULATION - You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: ✑ The SSIDs need to be configured as CorpNet with a key of S3cr3t! ✑ The wireless signals should not interfere with each other ✑ The subnet the Access Points and switch are on should only support 30 devices maximum ✑ The Access Points should be configured to only support TKIP clients at a maximum speed INSTRUCTONS - Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Access Point Name AP1 - IP Address 192.168.1.3 - Gateway 192.168.1.2 - SSID corpnet - SSID Broadcast yes - Mode G - Channel 1 - Speed Auto - Duplex Auto - WPA - Passphrase S3cr3t! Exhibit 2 as follows - Access Point Name AP2 - IP Address 192.168.1.4 - Gateway 192.168.1.2 - SSID corpnet - SSID Broadcast yes - Mode G - Channel 6 - Speed Auto - Duplex Auto - WPA - Passphrase S3cr3t! Exhibit 3 as follows - Access Point Name AP3 - IP Address 192.168.1.5 - Gateway 192.168.1.2 - SSID corpnet - SSID Broadcast yes - Mode G - Channel 11 - Speed Auto - Duplex Auto - WPA - Passphrase S3cr3t! AP1 192.168.1.3 /27 Gateway: 192.168.1.1 Mode: G SSD: CorpNet *** This is Case Sensitive, Whatever is on the test for SSID thats how it should be ** Key: S3cr3t! Security Settings: WPA Speed: Auto/Auto AP2 192.168.1.4 /27 Gateway: 192.168.1.1 Mode: G SSD: CorpNet *** This is Case Sensitive, Whatever is on the test for SSID thats how it should be ** Key: S3cr3t! Security Settings: WPA Speed: Auto/Auto AP3 192.168.1.5 /27 Gateway: 192.168.1.1 Mode: G SSD: CorpNet *** This is Case Sensitive, Whatever is on the test for SSID thats how it should be ** Key: S3cr3t! Security Settings: WPA Speed: Auto/Auto. Which of the following most likely determines the size of a rack for installation? (Select two). KVM size Switch depth Hard drive size Cooling fan speed Outlet amperage Server height. A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause? The switch failed. The default gateway is wrong. The port Is shut down. The VLAN assignment is incorrect. A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue? Too much wireless reflection Too much wireless absorption Too many wireless repeaters Too many client connections. A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use? 724 /26 /28 /30. |
Report abuse