Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCT N

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CT N

Description:
test for me

Author:
AVATAR

Creation Date:
29/06/2022

Category:
Others

Number of questions: 189
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber 10GBaseT 1000BaseT 1000BaseSX 1000BaseLX.
A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients? Migrate the clients to 802.11a NICs. Disable 802.11n. Disable the 2.4GHz radio. Use omnidirectional antennas.
A network technician has just opened ports 5060 and 5061 on the network firewall. With which of the following protocols are these ports associated? DHCP DNS SIP SMB.
Which of the following physical security measures will BEST identify authorized individuals who should be allowed access? Retina scanner Proximity card reader Smart card Mechanical lock Fail-secure PIN lock.
Which of the following is a cloud delivery model that includes the use of physical servers on site while the application is managed locally and in the cloud? IaaS Hybrid Public Private Saas.
A recent audit found that passwords are being sent in a cleartext manner during CLI authentication. The network team has been tasked to manage all network devices using secure methods. Which of the following will the network team MOST likely enable on the network devices? SSH SFTP HTTPS SNMP.
A customer is unable to determine a company's IPv6 address when performing a command that translates FQDN to an IP. Which of the following DNS records needs to be updated? A MX CNAME AAAA.
A medical office is experiencing connectivity issues with wireless devices. Whenever the neighboring radiology office is in operation, the wireless connection at the medical office slows down and drops frequently. Which of the following would be BEST to change to reduce the connectivity issues? (Choose two.) The wireless bandwidth setting The wireless frequency band The wireless operating channel The wireless encryption type The wireless security key The wireless transmit power.
A network administrator logs in to a multilayer switch while troubleshooting an end user connectivity issue. The administrator has the MAC address of the end user device but needs to find the IP address. Which of the following would the network administrator use to find the IP address of the end user device? Mac address table Routing table ARP table Cam table.
A network technician has installed a new router/firewall on the network. The technician wants to ensure clients are able to access the Internet. Which of the following would need to be open on the router/firewall to allow this type of activity? RTP DNS FTP SMB.
A network technician is upgrading a router's firmware. After downloading the file, the technician is instructed to run one of the commands below, obtain the output, and compare it with a value found on the vendor's website. The commands are as follows: generate SHA1 value <name of the firmware> generate MD5 value <name of the firmware> Which of the following procedures was the technician instructed to perform? Verify the integrity of the downloaded file. Verify the file was decompressed. Verify the encryption algorithm of the file. Verify the file was scanned against threats.
An IT director wants to strengthen the process for how wireless users authenticate after a recent security audit in which an evil-twin attack compromised domain administrator accounts. Which of the following will the director MOST likely implement? WPA2-PSK TKIP-RC4 PEAP EAP-TLS.
A PC cannot reach a server in the same VLAN with IP address 10.10.5.0. The PC has the following information IP address: 10.10.0.255 - Net mask: 255.255.252.0 - Gateway: 10.10.1.1 - Which of the following is the reason for this issue? The server IP address ends in a network address. The gateway address is incorrect The server address is not in the same subnet as the PC address The IP address is configured to be the broadcast address.
A company currently has an inexpensive Internet service package that occasionally renews the internal router's lease information. The company uses a service that translates its FQDN for website forwarding and uploads information from the router on every change. This has caused occasional downtime for users who access the website while the change is propagated, and the company would like to eliminate this issue. Which of the following should a technician suggest the company use to resolve the issue? EUI-64 addressing APIPA addressing Static IP CIDR notation.
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance? Fault tolerance Quality of service Load balancing Port aggregation.
A network administrator needs to use a dedicated management workstation to access the network equipment. Which of the following would allow the administrator to manage the workstation via a GUI? VPN SSH SFTP RDP.
A customer called the help desk to report general slowness on the network. According to the customer, the network is entirely unusable for a videoconference that is scheduled for that morning. Which of the following should the network administrator do FIRST to investigate the issue? Reference the baseline to determine the expected performance Remotely restart the local routing and switching equipment Instruct the customer to reinstall the videoconferencing software. Contact the software vendor for a server status update.
Which of the following needs to be configured on a Layer 2 interface to allow multiple VLANs to pass through? QoS Tagging Port aggregation Port mirroring.
A senior network engineer wrote a script to verify the hash of each new configuration file deployed to network devices. Which of the following is the network engineer trying to ensure? File encryption Patch level File integrity Device hardening.
A network engineer is troubleshooting an issue after installing a new switch in the datacenter. The cables are not labeled, and the engineer has forgotten into which port the switch was plugged. Which of the following should the engineer review to find out this information? Physical diagram Logical diagram Change management documentation Performance baseline documentation.
A technician recently installed a new home router for a customer. The WiFi password was only applied to devices that were locked down with parental controls. The day after the installation, the customer reported the connection had become slow. The technician reviewed the logs, which indicated a large influx of video streaming. After the customer changed the WiFi password, the streaming stopped, and the performance returned to normal. However, later that night, the same connection slowdown occurred. Which of the following should the technician recommend to the customer to fix this issue? (Choose two.) Upgrade the firmware. Change the default credentials. Generate a new key pair. Use complex passwords. Turn off port forwarding Install an IDS. Add a WAP.
A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage. However, users in the offices adjacent to the warehouse have noticed a large amount of signal overlap from the new network. Additionally, warehouse employees report difficulty connecting to the wireless network from the other side of the building; however, they have no issues when they are near the antenna. Which of the following is MOST likely the cause? The wireless signal is being refracted by the warehouse's windows. The antenna's power level was set too high and is overlapping. An omnidirectional antenna was used instead of a unidirectional antenna The wireless access points are using channels from the 5GHz spectrum.
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure, remote printing? SSH VPN Telnet SSL.
A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP's network and the start of the customer's network? Router Hub Modem Switch.
A network technician is setting up a newly installed Internet connection at a SOHO that will support up to ten devices on the network. The company is required to provide its own router to connect to the Internet. The ISP has assigned an IP address of 173.28.199.67/32 to the office. Which of the following does the network technician need to perform to ensure all devices on the network can access the Internet? Configure the local machines to get an IP address from the ISP automatically. Configure each host with a static IP address within the 173.28.199.0 block. Configure the router's static IP and create a NAT for the local network address of 10.10.10.0/24. Configure each host to use its link local addresses for network discovery.
A network analyst is troubleshooting a connectivity issue between switch A and switch B. The switches are configured with the following subnets: Clients in VLANs 10 and 16 can communicate between switch A and switch B, but clients in VLAN 13 can communicate only with other clients on the same switch. Which of the following is the MOST likely cause? 802.1Q mismatch Performance bottleneck Incorrect netmask Port security.
A network technician directly connected two laptops together via 802.11 protocol. Under which of the following network topologies are the laptops operating? (Choose two.) Bus Ad hoc Point-to-point Point-to-multipoint Star Mesh Ring.
A network technician installed a new workstation in an empty office for a new employee. The workstation will not connect to the network resources. The NIC and switch connection LED are both green, and the workstation reports an IP address of 169.254.10.1. Which of the following is the MOST likely cause of the issue? The switchport is on the default VLAN. The BDPU guard is enabled on the switch The DCHP relay is misconfigured The switchport is administratively down.
Company A has leased a second office located two floors below its main office. Company B is located on the floor in between Company A's office and is performing research on electromagnetic fields. The core switch at the MDF is connected to the switch at the IDF with a 131ft (40m) Cat 6 UTP cable. Both gigabit switches support Cat 7a and have SFP ports available. Company A's second office has reported intermittent issues with slow and sometimes dropped connections to the main office network. Which of the following steps will MOST likely resolve the connectivity issues? (Choose two.) Connect the switches using an 802.11ac bridge Connect the switches with a fiber cable via SFP. Connect the switches with a Cat 6 STP cable. Connect the switches with a Cat 7a UTP cable. Connect the switches using a plenum-rated Cat 7a UTP cable. Connect the switches using a gigabit powerline adapter.
Which of the following is used to protect the servers when a datacenter fails over from a primary power source to a secondary power source? A redundant power circuit A dual power supply A battery backup A generator.
Which of the following OSI layers is represented by a physical address that is assigned by the manufacturer? Data link Transport Network Session Physical.
A technician needs a way to allow clients to access a new application server on the network. Which of the following should the technician set up to achieve this objective? (Choose two.) DHCP DNS Server DNS SRV record DNS reverse zone DHCP scope option DHCP IP reservation Cloud-hosted DNS.
A company wants to inspect secure web traffic from users within the network. All the company's internal devices have trusted certificates installed. Which of the following should the company implement? A load balancer A DNS server A proxy server A layer 3 swtich.
Which of the following DNS records would a network technician create to connect to a server by its hostname? PTR TXT A SPF.
A company recently moved to a new building that was designed with WiFi only. During the first month, users reported good WiFi coverage. However, after the first month, users began reporting slow speeds and constant disconnects. Upon investigation, an engineer determines the SNR is currently 10dB compared to a baseline SNR of 42dB. Which of the following is MOST likely causing the WiFi issues? Latency Jitter Channel overlap Interference.
An organization wants to implement a device that will protect its server farm by looking for anomalous traffic and alerting an administrator to take action. Which of the following would be the BEST device for an organization? An IPS appliance A proxy server An IDS appliance A content filter server.
A technician needs to design a switched LAN that contains multiple departments that should not be able to access the same resources. Which of the following protocols should be utilized to allow the switches to forward traffic? 802.1q 802.1X 802.3af 802.3at.
A customer has asked a technician to install a single device that can perform firewall and routing functions, act as an early warning system and report breaches, and perform real-time packet inspection using heuristic analysis. Which of the following devices should the technician suggest? An AAA server A load balancer A UTM appliance A multilayer switch A proxy server.
Which of the following would be the BEST way to track all the networks that are in use at an organization? DHCP IPAM Scope options Lookup zone.
A Chief Financial Officer (CFO) was having difficulty connecting a tablet to the wireless network in a home office and called the network administrator for help. The CFO could not remember the SSID passkey, so the network administrator recommended using the push-button authentication on the wireless router. Which of the following security technologies did the CFO use? WPA WPS WAP WAF.
An administrator implemented a wireless network in a warehouse for an employee to scan inventory as it arrives and is shipped out. The scanners are proprietary devices that connect to the wireless network, but they have no configuration options beyond connecting via DHCP. Which of the following should the administrator implement to harden the wireless network without negatively affecting the scanners' ability to connect? Secure the wireless network using PEAP authentication for connecting devices Implement a two-factor authentication method for the wireless network. Allow only devices with statically assigned IP addresses to connect to the network. Configure the wireless network to allow connections based on hardware address only.
Which of the following network security practices is focused on securing endpoints? Switchport protection Device hardening Network segmentation Connection encryption.
A technician is installing new equipment in a datacenter and needs to identify the appropriate power and network connections. Which of the following should the technician use? Network configuration Logical topology Rack diagrams Work instructions.
A network team has reported multiple outages caused by unauthorized access to the IDF. Which of the following would BEST prevent this issue from reoccurring? Video surveillance Badge readers Motion sensors Tamper switches.
Which of the following attacks uses publicly accessible DNS servers to maximize the payload that is sent to a victim's network PDos Amplified DDos Brute force DSN poisoning.
An administrator is working on an email migration project and needs to verify if the new MX records have propagated across the public DNS servers. Which of the following is the MOST appropriate software tool for the administrator to use? iptables nslookup pathping netstat.
A network technician needs to correlate security events to analyze a suspected intrusion. Which of the following should the technician use? SNMP Log review Vulnerability review SIEM.
A wireless administrator needs to implement an authentication method that provides individualized, scalable security for the users of a WLAN where roaming is a regular event. PKI is not available. Which of the following BEST addresses the requirements of this topology? TLS MAC filtering TKIP-RS4 EAP-FAST.
A network administrator is troubleshooting an issue with UDP. Which of the following layers of the OSI model is the administrator troubleshooting? Layer 2 Layer 3 Layer 4 Layer 5.
A customer recently changed Internet service providers and moved the web, email, and DNS services and the Internet connection. The customer is now having issues receiving email from businesses that have service through the customer's old Internet provider. Which of the following is the BEST solution? Contact the current Internet provider and change the A record of the mail server. Contact the old Internet provider and forward the domain. Contact the old Internet provider and change the MX record Contact the current Internet provider and change the SMTP server.
Which of the following protocols are MOST likely used for enterprise wireless network authentication that is both centralized and secure? (Choose two.) Radius Kerberos LDAP TACACS+ SSO.
A technician who works for a cloud service provider is replacing a firewall and needs to ensure the downtime for clients does not exceed established thresholds. Which of the following MOST likely contains this information? Standard operating procedures Performance baseline assessment Service-level agreement Network configuration diagram .
Which of the following advanced network devices can be used to manage and prioritize the application traffic going in and out of a network? Packetshaper Switch Wireless controller NIPS.
An office's wireless multifunction printer is being serviced and an older model is available temporarily. This model connects via Ethernet but does not have wireless capabilities. The location of the printer does not allow for an Ethernet connection to the switch. Which of the following solutions can be used to bring this printer online? (Choose two.) Connect a powerline network base to the switch and the receiver on the printer Connect a UTM device to the network port on the printer. Install a wireless range extender between the switch and the printer. Install a wireless controller between the switch and the printer. Connect a wireless media converter to the network port on the printer. Connect a multilayer switch to the network port on the printer. .
A network director is creating a document that outlines what employees can and cannot do when they are connected to the corporate VPN. Which of the following is the director creating? Remote access policy Data loss prevention policy Bring your own device policy Non-disclosure agreement.
A technician is troubleshooting a wireless connectivity issue. While standing under the access point, the wireless signal is strong; however, when moving a short distance away, the signal becomes very weak. Which of the following is the MOST likely cause of the wireless issue? Antenna type Reflection Absorption Attenuation Refraction.
A network technician has been attempting to gain access to a switch over the network after an extended power outage but has been unsuccessful. The technician runs a network scan and does not find the switch in the results. The switch is turned on, and the link lights are all green. Which of the following should the technician use to gain access to the switch? SSH OOB VNC Telnet.
A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections. Which of the following pieces of equipment would be able to handle this requirement? A VPN concentrator A load balancer A wireless controller A RADIUS server.
Which of the following storage types provides inexpensive stand-alone network storage that can be made accessible to all users? SAS SSD NAS SAN.
A network administrator has a switch with 1Gbps uplink but believes that a bottleneck exists to the switch during peak usage. To eliminate the bottleneck, the administrator wants to increase the uplink speed to 10Gbps. Which of the following transceiver types should the administrator install? SFP+ QSFP SFP GBIC.
A technician is redesigning a SOHO network on a single router and three switches that are configured in a hierarchical design. The new design must separate the marketing department's large amount of print traffic from the rest of the network. However, it must still allow sharing with the rest of the company. The technician has created a marketing VLAN. Which of the following configurations is necessary to complete the design? A default VLAN for the rest of the company Subinterfaces of the router A bridge between the VLANs A print server to cache files.
A new network technician has received reports that the company network is performing slowly. Being unfamiliar with the company network performance, which of the following should the technician use to verify if the issue is an irregular occurrence based on company use? A bandwidth test SNMP logs A protocol analyzer A network baseline.
A customer wants to implement a storage server at home for family movies. Which of the following technologies would be BEST for the customer's needs? SAN Cloud storage RTSP NAS.
A network administrator is purchasing cellular hotspots for staff members who travel frequently. Many of these staff members travel internationally, and maximum compatibility with multiple cellular carriers is necessary. Which of the following wireless technologies should the hotspots support? Z-wave CDMA GSM GPS.
A network administrator wants to implement a switch management AAA method that will allow for per-user, command-level, granular permissions. Which of the following methods would BEST support the goals of the administrator? RADIUS LDAP Certificate TACACS+.
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey? Physical diagram Heat map Asset list Device map.
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize? Omni Directional Yagi Parabolic.
A website administrator is concerned the companyגTM€s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities? Implement file integrity monitoring. Change the default credentials. Use SSL encryption. Update the web-server software.
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN? Secure web access to internal corporate resources Upgrade security via the use of an NFV technology Grant out-of-band access for partners accessing corporate resources. Increase VPN availability by using a SDWAN technology.
A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actorגTM€s actions was logged. The administrator notes that the server receiving and storing the events was not compromised by any attack and is properly communicating with all network devices. Which of the following can the administrator employ to improve network access accountability Activate the audit logs on the network server and resources. Configure SNMP on the network server Deploy a central SIEM server into the network Collect traffic statistics from the servers using NetFlow data.
A company is implementing a new firewall. The firewall is configured to allow only TCP ports 80 and 443 to exit the network and allow the same traffic back into the network using inbound stateful packet filtering. Users are not able to access URLs of common websites they visit. Which of the following is the MOST likely cause of the issue? Stateful packet filtering only allows connections that originate outside the network to enter. Web browsing uses UDP and not TCP ports 80 and 443. The firewall does not allow UDP port 53 to enter and exit the network TCP 80 and 443 should be allowed inbound and stateful inspection should be allowed outbound.
A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address? Two days Three days Six days Seven days.
Which of the following storage types allows for the connection of storage devices that are located several miles apart? SFTP Infiniband eSata iSCSI.
A company recently upgraded a legacy firewall to an NGFW. Which of the following can be deployed without extra hardware to restrict access to offending websites? A UTM appliance Content filtering An IPS A proxy server.
A network engineer is creating a method for customers to access the companyגTM€s application in a web browser. Which of the following cloud models should the customers use to access the application? PaaS SaaS MaaS IaaS.
Which of the following technologies requires a username and password to authenticate to a backbone network? PPPoE MPLS ATM SIP.
Several network changes were made to a companyגTM€s firewall, and users have no longer been able to access websites by name. A technician suspects there is a port misconfiguration. Which of the following ports was misconfigured? 23 53 69 161 445.
A technician is wiring a new digital subscriber line in the corporate MDF. Which of the following marks the termination point? GBIS RG-6 110 block MT-RJ.
A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation: ✑ Researched and decided that 802.11ac would be the best technology ✑ Ensured the switch supports PoE+ ✑ Purchased an AP for each floor and spare APs in case of failure ✑ Put each AP into non-overlapping channels Which of the following is the MOST likely reason users are experiencing poor performance? 802.11ac is not the proper wireless technology for a multistory building. A comprehensive site survey of each floor was not conducted Users were not consulted to find out what type of wireless cards they had. APs in non-overlapping channels are not able to provide proper redundancy.
An administrator needs to connect to a server to install security patches. The administrator requests that port 3389 be allowed through the firewall. Which of the following access methods is the administrator looking to use? SSH Telnet SFTP RDP.
A network administrator has discovered a low-end managed switch connected to the companyגTM€s LAN. While reading about the deviceגTM€s specifications on the manufacturerגTM€s website, the administrator discovers the switch does not support a command-line interface for administration. Which of the following remote access methods should the administrator use to log in to the switch? Install a VNC plugin on the web browser Connect to the HTTPS management interface Replace the managed switch with an unmanaged switch. Establish an SSH session.
A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment? MIMO TKIP LTE SSID.
A Chief Information Officer (CIO) wants to control the category of sites that employees access when using the Internet web browser. This objective must be achieved to be compliant with corporate policy and avoid some security and legal risks. Which of the following devices would BEST accomplish this task? (Choose two.) IDS Proxy server Content filter Virtual firewall Hypervisor Load balancer.
Which of the following is BEST described as a technology that allows for the segmentation of networks into different broadcast domains throughout the network? DMZ VLAN VLSM CSMA.
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall? Secure SNMP Port security Implicit deny DHCP snooping.
A help desk technician is assisting a user who is experiencing issues with video conferencing when a laptop is undocked. During meetings, the audio becomes garbled, and the video sometimes pauses for brief periods. Which of the following is the MOST probable cause of these issues? Overcapacity Channel overlap Frequency mismatch Latency.
A network technician installs a new Layer 3 switch in the accounting office. Which of the following should the technician configure on the switch to enhance network security? Spanning tree Access control list QoS settings Duplex settings.
A technician is planning a network wiring installation and must ensure all cabling meets the installation requirements for air handling spaces in the celling in case of a fire. Which of the following characteristics does plenum cabling have to meet this requirement? Outer jacket made of PVC Outer jacket with metal shielding Low-smoke material jacket Fiber-optic glass core.
A customer wants to install a network that can utilize 802.1X authentication protocols. The customer uses a Windows laptop and does not want to install any additional software; therefore, a technician needs to configure the network to work with what is available natively. Which of the following should the technician configure for the 802.1X network? PEAP LDAP EAP-FAST NAC.
Which of the following accurately describes a warm site in datacenter disaster recovery? An online standby datacenter that is fully equipped without company data A backup datacenter location that is ready for equipment to be installed A backup datacenter location that is fully equipped bot not online An online, standby datacenter that is fully equipped with all company data.
A new network technician is responsible for bringing a building onto the corporate network. The technician is not aware of the proper settings for the new switches. Which of the following should the technician reference to find these settings? IDF/MDF documentation Change management plan Configuration baseline Standard operating procedures.
Which of the following technologies is MOST likely used to provide connectivity to multiple IoT devices within a room without access to the WLAN? IR 802.11 Bluetooth NFC.
A wireless engineer installs a new 802.11g access point in a new part of a building. Users begin reporting slow connections, even with a strong signal. The engineer uses a packet analyzer and sees retransmitted and malformed packets, as well as some malformed WiMax packets. Which of the following issues is described? Refraction Interference Latency Overcapacity.
An organization has migrated the internal network from a static IP addressing scheme to use DHCP. After fully deploying the DHCP solution, users within the web deployment team are unable to access the web server that is hosted in the DMZ. After reviewing the logs, the network technician sees multiple deny entries from the internal network to the DMZ. Which of the following is the MOST likely cause? The DNS entries are incorrect for the web development team. The server IP addresses in the DMZ have changed after migrating to DHCP. The OSPF configuration was not updated to route the new dynamic address spaces. The ACL does not accurately reflect current addresses for the web development team. .
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policyגTM€s requirements? Recover all systems to a loss of 48 hours of data. Limit the network downtime to a maximum of 48 hours per year Recover all systems within 48 hours Require 48 hours of system backup maintenance.
Which of the following DNS record types assists with the routing of email? MX PTR SRV AAAA.
A recent vulnerability was discovered in the code a company is running on its network devices. The vendor has released a security patch to address the vulnerability. To ensure an unaltered version of the patch is downloaded, which of the following should the network technician validate before installing the patch? Date the patch was created Version of the patch Hash values of the patch Change log for the patch.
A network administrator received a ticket about intermittent poor performance of a manufacturing device. The engineer who submitted the ticket states the issue occurs when the device is sending or receiving larger volumes of network traffic. The physical copper path between the device and the switch tests successfully. Which of the following should the network administrator do NEXT? Verify the speed/duplex settings. Replace the switch uplink transceivers. Enable port aggregation. Change to shielded patch cables. Enable quality of service.
A network technician is planning to upgrade an end-of-life network switch and wants to reuse as much of the existing infrastructure as possible. The end-of-life switch uses a GBIC, but the new switch will use an SFP. Which of the following will the network technician MOST likely need to perform before completing the upgrade? Reterminate the fiber with ST connectors. Reterminate the fiber with SC connectors. Reterminate the fiber with LC connectors. Reroute the fiber through a media converter.
A network engineer is planning to connect a legacy network switch to a core switch for redundancy. The proposed cable will run in the celling above high-voltage industrial equipment and f RG-6 connectors A patch panel A GBIC transceiver A media converter.
A network administrator is investigating an issue with VoIP calls that are not establishing properly. After troubleshooting, the administrator is able to determine the SIP responses are not being received by the gateway. Which of the following did the administrator use to determine this information? netstat A spectrum analyzer tracert A packet analyzer.
A Chief Information Officer (CIO) is reviewing a proposal to provide access security for the IT departmentגTM€s restricted area. Which of the following is a preventive measure that should be implemented? Motion detection Cameras Biometric lock Asset tags.
Which of the following attacks blocks access to resources by flooding that resource with invalid requests? On-path attack IP spoofing attack DoS attack DNS poisoning attack.
Which of the following technologies is used to translate one public IP address to multiple private IP addresses? NAT ARP DHCP DNS.
A systems administrator is running a VoIP network and is experiencing jitter and high latency. Which of the following would BEST help the administrator determine the cause of these issues? Enabling RADIUS on the network. Configuring SNMP traps on the network. Implementing LDAP on the network. Establishing NTP on the network.
A network technician needs to install network devices in a new building. The building will be a part of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building? Firewall Switch Modem IDS.
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch? NIC teaming Load balancer RAID array PDU's.
A technician has started a major network project to upgrade to a higher throughput standard. The technician will need to install new patch panels and breakout boxes to support this infrastructure. Which of the following layers of the OSI model is the technician addressing at this stage of the upgrade? Physical Transport Network Data link.
A network administrator needs to extend an organizationגTM€s network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use? 10BASE-T 100BASE-T 1000BASE-LX 1000BASE-SX.
A network administrator migrated the data for the corporate email service from one provider to another. All DNS records were successfully changed and verified. However, many hours later, users are still receiving new emails on the old providerגTM€s server. Which of the following should the administrator perform NEXT to troubleshoot the issue? Add a secondary MX server to the DNS records. Remove old SPF records from the DNS host. Create a DMARC record that includes the old server. Check the TTL value on the MX records.
Which of the following technologies can be implemented on network devices to increase throughput in network storage systems? Trunking Frame relay Jumbo frames Infiniband.
An administrator recently implemented new SOHO routers for a companyגTM€s teleworking employees. Before deploying the routers, the administrator changed the default credentials and disabled unnecessary services. Within a few days of deployment, hackers gained access to the routers. Which of the following is the MOST important thing the administrator forgot to do? Disable unused physical router ports. Generate new encryption keys. Upgrade the router firmware Create a database of file hashes on the router. .
A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal? nslookup netstat -a ipconfig -a arp -a.
A network technician has established an internal HTTP connection from a browser to the web server to access an organizationגTM€s intranet services. In which of the following layers of the OSI model is the HTTP protocol found? Session Data link Network Application.
A technician needs to manage a Linux-based system from the GUI remotely. Which of the following technologies should the technician deploy? RDP SSH VNC Telnet.
Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port? BYOD NDA SLA AUP.
A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site? Enable an IPSec tunnel Enable RDP access to the firewall Enable port 80 access Enable Telnet access to the firewall.
A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction? Geofencing WPA2-PSK EAP-TLS VLAN tagging.
Users at an office site notice the wireless network is unavailable for a short period after a brownout. Which of the following technologies is MOST cost effective to sustain network equipment during a brief power event? UPS Dual power supplies Generator Redundant circuits.
A network administrator needs to keep track of the locations of installed network equipment. Which of the following would be the BEST method to accomplish this task? Tamper detection Asset tags Video surveillance Motion detection.
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology? An increase in network securing using encryption and packet encapsulation A network expansion caused by an increase in the number of branch locations to the headquarters A mandatory requirement to increase the deployment of an SDWAN network. An improvement in network efficiency by increasing the useful packet payload.
A network technician is troubleshooting a connection issue and determines the domain name resolution is not getting out past the firewall. Which of the following ports should the technician check to see if it is being blocked by the ACLs? 23 53 110 389.
A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site? Packet sniffer Bandwidth tester Port scanner Protocol analyzer.
Which of the following DNS record types can help limit spam? SPF SRV A MX.
A network technician is attempting to resolve an issue for two users. The users unplugged and moved their laptops to a different cubicle to work together. The NIC LED is lit on both laptops, but the users are not able to access the network resources. Which of the following is MOST likely preventing access? Port security Auto-MDIX BPDU guard DHCP snooping.
A network administrator has implemented file integrity monitoring on all relevant devices. This will provide the ability to detect whenever the files are: reinstalled executed read written.
A technician is helping to secure a wireless network at a home office and is looking to prevent unauthorized devices from connecting to the network. Which of the following would be BEST for the technician to do? (Choose two.) Configure MAC filtering. Configure guest network isolation. Enable plug and play Disable the SSID broadcast. Configure a captive portal. Disable unneeded ports.
While troubleshooting a connectivity issue, a network technician successfully pinged the loopback address and external DNS server but was unable to ping the websiteגTM€s URL. Which of the following tools should the technician use to determine where the network issue is located? nmap netstat nslookup ipconfig tracert.
The following instructions were published about the proper network configuration for a videoconferencing device: ג€Configure a valid static RFC1918 address accordingly to your network. Check the option to use a connection over NATג.€ Which of the following is a valid IP address configuration for the device? FE80::1 100.64.0.1 169.254.1.2 172.19.0.2 224.0.0.12.
A network administrator is configuring a server to be placed on the network. The end users will be accessing an application via a web browser that requires them to log into the application. Which of the following protocols would allow a secure connection? SCP SSH HTTPS SFTP.
Which of the following IEEE standards explains the characteristics of how PoE should operate in a switched network? 802.11ac 802.1q 802.1X 802.3af.
A network technician recently installed a new Layer 2 switch. After scanning the device, the network administrator mentions there is traffic on port 23. Which of the following should the network technician have done during the installation? Disabled Telnet and enabled SSH Created an ACL to block port 23 Disabled DHCP snooping Changes the native VLAN.
The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue? The brown pair UTP has a short. The camera requires 802.3at power. The camera requires Cat 7 cabling. The switchport has PoE disabled.
Which of the following technologies relies on circuit switching? DMVPN MPLS PPPoE DOCSIS.
A network engineer is provisioning a new Linux server in a public cloud. Which of the following types of cloud service should be utilized? PaaS SaaS DaaS IaaS.
A company has decided to move its datacenter to an IaaS provider. The company stakeholders are concerned about their ISP being a single point of failure. Which of the following will the network administrator MOST likely recommend to mitigate this risk? Adopt a multicloud strategy to ensure access in case of an outage Contract a secondary ISP to provide another connection. Lease additional office space for use in the event of a disaster. Get an additional Internet connection from the current ISP.
A network technician is configuring a new web server at the company office. The network manager has instructed the technician to implement it in such a way so it is isolated from the local network and still able to be reached from an external network. Which of the following BEST describes where the technician should set up the new server? Private VLAN IDF DMZ Native VLAN.
A network technician is installing a new SOHO wireless router for a client. After configuring and securing the wireless network, the technician begins hardening the wireless router. Which of the following should the network technician do FIRST? Enable content filtering Back up the configuration of the device. Configure an ACL for managing the device. Filter MAC addresses.
A network engineer is deploying a new PBX for a customer. Although all new phones will be IP-based, the office will still use a few POTS-based phones and a fax line. Which of the following will be needed to connect the fax line? RJ11 RJ45 DB-9 F-type.
A network technician needs to extend a Cat 6a connection. A device is being moved to another building that is too far away for the existing cable to reach. There is dark fiber between the buildings, and the devices must be directly connected to each other using RJ45 terminations. Which of the following is needed to ensure the connection? A media converter A crossover cable A patch panel A switch.
A network administrator is installing a new IDS device that will collect logs and alert the administrator of breaches. -The network infrastructure includes a modern, a firewall, and core and access switches. -The modem is ISP provided and only forwards packets from the data circuit. -The firewall handles stateful packet inspection, the ACL, and application layer filtering. Which of the following describes where the administrator should install the IDS device on the network to collect the MOST relevant information? In front of the modem and firewall Between the modem and firewall Behind the firewall on the core switch After the access switch.
A large metropolitan city is looking to standardize the ability for police department laptops to connect to the city government's VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers. Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs? 5G LTE WIFI 4 WIFI 5 WIFI 6.
A network technician has been asked to provide daily reports on network saturation. Which of the following would BEST reflect these statistics? Average bandwidth usage Error rate on trunk ports Packet drops to the ISP Processor utilization for the Internet router.
A network technician wants to ensure the backup configuration files for the network devices are not being altered after they are stored. Which of the following tasks should the network technician perform to achieve this goal? Compute the checksum of the backup file and document it separately Store the backup files on a thumb drive and keep it in a desk drawer. Encrypt the drive the files are stored on using AES-256 Upload the backup files to a cloud storage service.
A network technician has just implemented a new wireless network that requires clients to use a WEP key for access. The technician is now required to make changes to ensure the network uses the strongest encryption available. After the changes are implemented, several users report being unable to connect. Which of the following is the MOST likely cause? RADIUS server failure Security type mismatch Wrong passphrase Incorrect SSID.
At which of the following OSI model layers does the Layer 2 Tunneling Protocol operate? Application Session Transport Data link.
Which of the following can be used to decrease latency during periods of high utilization of a firewall? Hot site NIC teaming HA pair VRRP.
Which of the following is the physical topology for an Ethernet LAN? Bus Ring Mesh Star.
A hydroelectric company wants to manage sensors at a dam remotely. The control station at this dam is several miles off the main road in a densely forested area. Which of the following should the company implement to connect remotely to the sensors? Cable broadband DSL Internet Cellular modem ISDN Internet.
Which of the following technologies provides a failover mechanism for the default gateway? FHRP LACP OSPF STP.
A network engineer is adding a second router to the company's topology to connect a new wing of the building. The second router will be in the same server room as the first router and does not support auto-MDX. Which of the following describes how the routers should be connected to each other? Connect the second router to the first router with a crossover cable. Use a straight-through cable to connect the two routers together. Connect the two routers with vendor-specific console cables. Connect the AUX ports directly between the two routers.
A company has multiple site-to-site VPN connections using a pre-shared key. The Chief Information Security Officer (CISO) is concerned about the long-term security of the tunnels and has asked the network technicians to develop a plan to ensure the best security of the tunnels. Which of the following should the network technicians implement? Purchase dedicated MPLS circuits between each of the sites. Request a change of IP addresses from the ISP semiannually. Perform annual key rotations on the site-to-site VPNs. Terminate tunnels when they are not actively being used.
A network technician is required to install a network device to provide service to an office area. The office area has 23 users and two printers that must be able to connect to the file server in a different building. Which of the following network devices should the technician use? Media converter Switch Bridge Wireless range extender.
A new application is being deployed. The application team has asked the network team to monitor network performance and create alerts if fluctuations in the round-trip time for that traffic occur. Which of the following should the network team monitor to meet this requirement? Bandwidth Latency Loss Jitter.
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications? Link Aggregation Control Protocol Dynamic routing Quality of service Network load balancer Static IP addresses.
A customer has requested Ethernet cabling for a new office building. A technician is dispatched to perform a site survey and does not note any special considerations for the installation. Which of the following cable types will the technician MOST likely recommend for this installation? Metallic sheathed Fiber optic Unshielded twisted pair Coaxial.
A technician is called to a customer site because the modem has failed and needs to be replaced. The technician connects the existing firewall to a modem taken from another customer site and ensures the users can reach the Internet. That night, a remote vendor tries to transfer a file to the customer's server using FTP but is unable to make the connection. There were no issues the previous night. Which of the following is the MOST likely cause of the problem? The firewall rules in the router were not reconfigured for use with the newer ISP protocols. The modern may have its own built-in firewall that is interfering with the communications. The ISP cannot route traffic from the new modern because it came from another ISP. The NAT that converts the public IP to the internal private IP of the server is using an incorrect port.
A junior technician deployed new computers in a company, and users are reporting issues with file transfers to network shares being slower than with the previous computers. The network administrator verifies the switch's gigabit ports are set to autonegotiate. Which of the following should the administrator perform NEXT to determine the issue? Change the default gateway on the new computers Update the drivers for the NIC cards Move the computers to a different VLAN Determine if the NIC speed on the computers is configured correctly.
A network engineer is surveying the existing wireless infrastructure to propose additional changes to increase throughput. The SSID is already on an uncongested 5GHz frequency. Which of the following should the engineer configure? Channel bonding 802.11a Dual-band frequency An omnidirectional antenna.
A network technician is installing a new fiber-optic connection between two buildings on a campus network. When the network technician connects the fiber at the second location, the interface link light does not light up. Which of the following should the technician do NEXT? Reverse the fiber pair Check the duplex on each interface. Install a fiber distribution panel. Configure a media converter for each switch.
A malicious user sent double-tagged frames on an 802.1Q-enabled port and immediately gained access to additional network resources. Which of the following attacks did the malicious user successfully execute? Evil twin Man-in-the-middle DNS poisoning VLAN hopping.
Which of the following should a technician use to keep the STP topology predictable and consistent? Root guard Flood guard Dynamic ARP inspection Ingress ACLs.
A rural municipality has built an external public WiFi meshed network using omnidirectional antennas. After the initial build, the performance meets expectations, and the municipality enters a six-month pilot program in the fall. By the end of the pilot program in the spring, the performance has fallen dramatically. The pilot has a static number of users with no increases in usage from beginning to end. Which of the following would be the MOST likely reason for the performance issues? Too many users in the pilot creating overcapacity issues Buildings creating reflection issues Omnidirectional antennas being insufficient for outdoor use Foliage creating absorption issues.
A client utilizes mobile tablets to view high-resolution images and videos via WiFi within a corporate office building. The previous administrator installed multiple high-density APs with WiFi 5, providing maximum coverage, but the measured performance is still below expected levels. Which of the following would provide the BEST solution? Channel bonding EIRP power settings Antenna polarization A directional antenna.
A software company is hosting a seminar at a local conference center to unveil its latest software release. As the clients begin to arrive and connect their mobile devices to the wireless network, users begin to report connectivity and throughput issues. Which of the following should the network technicians do to resolve the reported issues quickly? Call the ISP to increase the bandwidth Provision and deploy additional WAP Run Cat 6 cable to each of the WAPs. Upgrade the wireless network to the newest standard.
A network administrator needs to bring a new building online that houses multiple departments. The departments vary in size, with the smallest having 25 hosts and the largest having 140 hosts. When designing the addressing scheme for the new building, which of the following should the network administrator use lo limit the number of wasted IP addresses? Public ip's Private ip's DHCP VLSM Reserved ip's.
A network technician needs to implement a network security control on a switch. The solution needs to be non-invasive and prevent guests and unauthorized users from accessing the company's network. Which of the following would BEST meet these requirements? Upgrading the firmware Disabling unused ports Reconfiguring the router access list Patching and updating.
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data? Packet capture IPerf NetFlow analyzer Internet speed test.
Which of the following would an organization MOST likely have employees sign before granting access to confidential data? An AUP A BYOD policy An NDA A PUA.
A customer wants a technician to implement a solution that will allow its critical on-site servers to continue to function in the event of an extended power outage. Which of the following should the technician recommend? Warm site Load balancer Power generator Hot site.
A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented? RIPv2 BGP EIGRP OSPF.
Which of the following technologies would allow a technician to install and run multiple guest operating systems on host hardware? PXE Clustering Hypervisor SAN.
Which of the following VPN technologies should a network technician utilize to tunnel IPv6 traffic and multicast over an IPv4 WAN link? AH DTLS SSL GRE.
A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue? The nearest APs are configured for 802.11g An incorrect channel assignment is on the nearest APs The power level is too high for the AP on the far side Interference exists around the AP on the far side.
A new employee is learning how to use multiple company applications. Upon logging in to one application, the employee notices the other applications do not require authentication. Which of the following explains the reason why this is happening? Kerberos is being used to authenticate The employee logged in to a captive portal. Single sign-on is being used. Local authentication was performed.
As part of a new datacenter upgrade project, the security manager has asked for additional physical security to prevent asset theft. Which of the following technologies should be implemented? Video surveillance Motion detection alarms Asset tracking tags Locks on devices.
A network administrator has been directed to present the network alerts from the past week to the companyגTM€s executive staff. Which of the following will provide the BEST collection and presentation of this data? A port scan printout A consolidated report of various network devices A report from the SIEM tool A report from a vulnerability scan done yesterday.
A network technician is assisting a user who cannot connect to a wireless connection. The user is connecting to the correct SSID and has the correct pre-shared key. The technician verifies the WAP is working, and other clients are connected to it from the same location. Which of the following should the technician investigate? Channel overlap Wireless frequenc AP power levels Encryption type.
Which of the following BEST explains why a network engineer would use a wireless mesh network when connecting sensors to a sensor gateway? It creates various paths to a particular destination It increases the overall throughput of the links connecting the devices. It provides redundancy if the sensor network experiences broad wireless interference. It allows autonomous communication if the sensor network goes down.
A consultant is designing a new network for a company that will be hosting its own email and web servers. The company wants to ensure there are separate devices to protect the internal network from the DMZ and the DMZ from the Internet. Which of the following would provide this protection? The installation of a firewall with multiple interfaces for the Internet to the DMZ and the LAN. The in-line installation of two firewalls to divide the Internet to the DMZ and the DMZ to the LAN. The installation of two switches to divide the Internet from the LAN and the LAN to the DMZ. The installation of a switch from the Internet to the DMZ and a firewall between the DMZ and the LAN.
A network administrator plans to install network connectivity at a new remote office location. The administrator is concerned about how to troubleshoot network connectivity issues and reconfigure the remote router. The technician should use __________. an SD card with a backup configuration. a TFTP server on the main network for backup configurations. a modem using POTS. a second Ethernet interface for remote access.
A technician receives a report that Joe, an existing user, is unable to access the network. Joe confirms that he had full access the previous day. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe is able to access the network. Which of the following is the MOST likely cause of this issue? Incorrect pin-out Bad port Transceiver mismatch Incorrect cable type.
A technician is dispatched to replace an access point that has failed. The device is preconfigured with the correct SSID and passphrase. When the user tries to connect to the SSID, the connection fails. Which of the following is the MOST likely cause of the issue? Interference Channel overlap Distance limitations Security type mismatch.
A network technician is installing a wireless network for a small medical office. The doctors need to download high resolution x-rays quickly with minimal latency. Which of the following technologies should be utilized? RFID MIMO CDMA 802.11g.
Two buildings are connected with 802.11a wireless bridges using omnidirectional antennas. However, the connection between the two bridges often drops. Which of the following would be the BEST solution? Change the antennas to unidirectional. Conduct a site survey to identify sources of noise. Add a second wireless bridge at each building Change the bridges to use 802.11g.
Which of the following BEST explains why a firewall would be subject to international export controls Protected industry IP version incompatibility Differing power standards Encryption technology.
A network engineer needs to connect two network switches with a gigabit link. The proposed route to run the 164ft (50m) cable is directly underneath a large electrical generator. Which of the following cable types would BEST fit the needs of the network engineer? UTP Cat 5 plenum Coaxial STP.
A network technician is connecting medical-monitoring devices on a personal area network for patients' phones. Which of the following technologies should be used? Bluetooth RFID NFC IR.
A vendor has installed new wireless access points in an office. After completing the installation, users in one area of the office report they cannot connect to the wireless network. A network technician confirms the users in that area cannot see the wireless SSID. Which of the following MOST likely explains the issue? The AP power levels are too low. The wireless network is over capacity. A directional antenna was installed incorrectly The channels are overlapping.
Report abuse Consent Terms of use