Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA N10-009 Dumps Questions Answers

Page: 1 / 35
Total 507 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Buy Now
Question 2

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Question 3

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

Options:

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Question 4

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 5

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question 6

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

Options:

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Question 7

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Question 8

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Question 9

Which of the following ports is used to transfer data between mail exchange servers?

Options:

A.

21

B.

25

C.

53

D.

69

Question 10

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Question 11

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Question 12

A network administrator is trying to troubleshoot an issue with a newly installed switch that is not connecting to the network. The administrator logs on to the switch and observes collisions on the interface. Which of the following is most likely the issue?

Options:

A.

Wrong speed

B.

Jumbo frames enabled

C.

Incorrect VLAN

D.

Duplex mismatch

Question 13

Which of the following should an installer orient a port-side exhaust to when installing equipment?

Options:

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

Question 14

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 15

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

Options:

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Question 16

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

Options:

A.

22

B.

80

C.

443

D.

587

Question 17

Which of the following standards enables the use of an enterprise authentication for network access control?

Options:

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

Question 18

Which of the following connectors provides console access to a switch?

Options:

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Question 19

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Question 20

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

Options:

Question 21

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

Options:

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Question 22

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Question 23

A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com. Which of the following should be done to reach the correct website?

Options:

A.

Modify the CNAME record

B.

Update the PTR record

C.

Change the NTP settings

D.

Delete the TXT record

Question 24

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Options:

Question 25

A company is opening a new site that needs to be divided into subnets that accommodate 75 hosts each. Which of the following is the most efficient subnet?

Options:

A.

192.168.13.0/25

B.

192.168.13.0/26

C.

192.168.13.0/27

D.

192.168.13.0/28

Question 26

A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage?

Options:

A.

MAC filtering

B.

Administrative distance

C.

Bluetooth beacon signals

D.

IP address blocks

Question 27

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 28

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 29

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

Options:

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Question 30

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Question 31

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Question 32

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Question 33

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

Options:

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Question 34

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Question 35

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 36

A company ' s marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 37

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 38

A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?

Options:

A.

Incorrect default gateway

B.

Faulty Ethernet cable

C.

Wrong duplex settings

D.

VLAN mismatch

Question 39

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Question 40

A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?

Options:

A.

Captive portal

B.

Acceptable use policy

C.

Network access control

D.

DNS filtering

Question 41

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

Options:

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Question 42

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host ' s TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Question 43

Which of the following best describes a characteristic of a DNS poisoning attack?

Options:

A.

DNS address records are edited and changed on a DNS server.

B.

An attacker sets up a malicious DNS server in place of a legitimate server.

C.

DNS client requests are intercepted and false responses are returned.

D.

False DNS records are injected into cache on a DNS server.

Question 44

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

Options:

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Question 45

A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

Options:

A.

Identify the problem.

B.

Establish a theory.

C.

Document findings.

D.

Create a plan of action.

Question 46

Which of the following is the best way to securely access a network appliance from an external location?

Options:

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Question 47

Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?

Options:

A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Question 48

Which of the following would most likely be used to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question 49

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

Options:

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Question 50

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

Options:

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Question 51

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Question 52

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Question 53

Which of the following provides an opportunity for an on-path attack?

Options:

A.

Phishing

B.

Dumpster diving

C.

Evil twin

D.

Tailgating

Question 54

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Question 55

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

Options:

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Question 56

A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the most secure and compatible?

Options:

A.

WPA3

B.

WPA2

C.

WPA2/WPA3 mixed mode

D.

WPA/WPA2 mixed mode

Question 57

A customer wants to cache commonly used content to reduce the number of full page downloads from the internet. Which of the following should the network administrator recommend?

Options:

A.

Proxy server

B.

Load balancer

C.

Open relay

D.

Code repository

Question 58

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Question 59

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 60

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Question 61

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Question 62

A new network is being created to support 126 users . Which of the following CIDR ranges provides the most efficient use of space?

Options:

A.

10.2.2.0/23

B.

10.2.2.0/24

C.

10.2.2.0/25

D.

10.2.2.0/26

Question 63

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Question 64

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Question 65

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Question 66

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

Options:

A.

The patch cord from the wall jack is faulty.

B.

The switchport bandwidth needs to be increased.

C.

Multicast is not configured correctly on the switch.

D.

The NIC is set to half duplex.

Question 67

A company ' s network is experiencing high levels of suspicious network traffic. The security team finds that the traffic is coming from an unknown, foreign IP address. Which of the following is the most cost-efficient way to mitigate this threat?

Options:

A.

ACL

B.

IDS

C.

NAT

D.

DoS prevention

Question 68

A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?

Options:

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Question 69

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 70

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

Options:

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Question 71

A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the distribution switch. Which of the following should the technician use?

Options:

A.

Link aggregation

B.

Subinterfaces

C.

Switch virtual interfaces

D.

Half-duplex connections

Question 72

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

Options:

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Question 73

During a VoIP call, a user notices inconsistent audio and logs an incident ticket. A network administrator notices inconsistent delays in arrival of the RTP packets. Which of the following troubleshooting tools should the network administrator use to determine the issue?

Options:

A.

Toner and probe

B.

Protocol analyzer

C.

Cable tester

D.

Spectrum reader

Question 74

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 75

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

Options:

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Question 76

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Question 77

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department ' s shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Question 78

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Question 79

Which of the following is enforced through legislation?

Options:

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Question 80

A customer purchases a new UTM device and wants the development team to integrate some of the device’s data-reporting capabilities into the company’s custom internal support software. Which of the following features should the development team use to obtain the device’s data?

Options:

A.

API

B.

SNMPv2c

C.

SIEM

D.

MIB

Question 81

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Question 82

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Question 83

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Question 84

Which of the following is used to stage copies of a website closer to geographically dispersed users?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Question 85

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 86

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

Options:

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Question 87

Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?

Options:

A.

SSO

B.

MFA

C.

SAML

D.

RADIUS

Question 88

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Options:

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Question 89

A company ' s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

NTP

D.

SNMP

Question 90

Employees report that the network is slow. The network engineer thinks the performance issue is with an upstream router. Which of the following tools should the engineer use to determine the location of the issue?

Options:

A.

nslookup and dig

B.

Nmap and speed tester

C.

tracert and ping

D.

tcpdump and protocol analyzer

Question 91

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Question 92

Which of the following Layer 1 devices is responsible for the termination of fiber-optic connections on an SFP-capable switch?

Options:

A.

Transceiver

B.

Modem

C.

Ethernet NIC

D.

Repeater

Question 93

A network administrator is managing network traffic so that classified services and applications are prioritized. Which of the following technologies should the network administrator use?

Options:

A.

Load balancing

B.

Time to live

C.

Quality of service

D.

Content delivery network

Question 94

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Question 95

A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user ' s laptop is lost. Which of the following frequency bands is the laptop most likely using?

Options:

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

900MHz

Question 96

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Question 97

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

Options:

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Question 98

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Question 99

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 100

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

Options:

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Question 101

Which of the following is a major difference between an IPS and IDS?

Options:

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

Question 102

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Question 103

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

Options:

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Question 104

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Question 105

Which of the following would an adversary do while conducting an evil twin attack?

Options:

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Question 106

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Question 107

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Question 108

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Question 109

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

Options:

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Question 110

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

Options:

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Question 111

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

Options:

A.

RJ45

B.

ST

C.

LC

D.

MPO

Question 112

A technician is troubleshooting a user ' s laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 113

Which of the following is the best reason to create a golden configuration?

Options:

A.

To provide configuration consistency

B.

To decrease the size of configuration files

C.

To increase security by encrypting configurations

D.

To set up backup configurations for each device

Question 114

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 115

A network administrator needs to ensure all network ports use a security method that only permits authenticated devices. The solution must meet the following requirements:

• Reduced chance of spoofing

• Centrally managed solution

• Auditable logs

Which of the following technologies provides this functionality?

Options:

A.

MAC filtering

B.

Port security

C.

ACLs

D.

802.1X

Question 116

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Question 117

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

Options:

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Question 118

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers ' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Question 119

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

Subnet: 10.8.100.1/24

Scope: 10.8.100.50 – 10.8.100.150

Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

Options:

A.

Increase the scope to 10.8.100.35 – 10.8.100.150

B.

Increase the scope to 10.8.100.40 – 10.8.100.150

C.

Increase the scope to 10.8.100.40 – 10.8.100.175

D.

Increase the scope to 10.8.100.50 – 10.8.100.175

Question 120

Which of the following ports is a secure protocol?

Options:

A.

20

B.

23

C.

443

D.

445

Question 121

A user ' s VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question 122

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

Options:

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Question 123

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Question 124

Which of the following does a router prioritize first in the route selection process?

Options:

A.

Prefix length

B.

Metric

C.

Administrative distance

D.

Default route

Question 125

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Question 126

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Question 127

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

Options:

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Question 128

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question 129

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

Options:

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Question 130

Which of the following allows an organization to map multiple internal devices to a single external-facing IP address?

Options:

A.

NAT

B.

BGP

C.

OSPF

D.

FHRP

Question 131

Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

Phishing

Question 132

Which of the following troubleshooting steps provides a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem

B.

Develop a theory of probable cause

C.

Test the theory to determine cause

D.

Establish a plan of action

Question 133

Which of the following ports creates a secure connection to a directory service?

Options:

A.

22

B.

389

C.

445

D.

636

Question 134

Which of the following network cables involves bouncing light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Question 135

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Which of the following is the most likely cause of the user ' s connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Question 136

Which of the following connector types is most commonly associated with Wi-Fi antennas?

Options:

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Question 137

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

Options:

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Question 138

A network administrator is responding to a request to configure a new IP phone. Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?

Options:

A.

Configure full duplex.

B.

Modify QoS.

C.

Enable 802.1Q tagging.

D.

Change the native VLAN.

Question 139

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Question 140

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Question 141

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP ' s connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Page: 1 / 35
Total 507 questions