CompTIA+ N10-007

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Myron0576
M
Myron0576
Community Contributor
Quizzes Created: 2 | Total Attempts: 7,613
| Attempts: 317 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. A recent network audit has highlighted the security issues on the access point shown in the exhibit. What should the company do?

Explanation

The correct answer is to change the authentication method to WPA2-AES. This is because WPA2-AES is currently the most secure authentication method available for wireless networks. It provides stronger encryption and better security compared to WPA-TKIP. Changing the authentication method to WPA2-AES will help address the security issues highlighted in the network audit.

Submit
Please wait...
About This Quiz
CompTIA+ N10-007 - Quiz

This CompTIA+ N10-007 quiz assesses knowledge in network security and management, focusing on tasks like file integrity verification, Layer 2 hardening, DNS troubleshooting, and secure file transfers. It prepares learners for practical network security challenges.

2. What are smart cards used for in computer networking?

Explanation

Smart cards are used for logon and authentication in computer networking. These cards contain a microprocessor and memory, allowing them to securely store and process data. When a user inserts a smart card into a reader, it can be used to verify the user's identity and grant access to the network. This helps to enhance security by requiring a physical card in addition to a username and password for authentication.

Submit
3. Which policy sets guidelines for allowing employees to use their own personal devices for work-related tasks?

Explanation

BYOD stands for Bring Your Own Device, which is a policy that allows employees to use their own personal devices, such as smartphones, tablets, or laptops, for work-related tasks. This policy sets guidelines for how employees can securely access company resources and data on their personal devices, ensuring that sensitive information is protected. It allows employees to be more productive and flexible while also reducing the costs of providing company-owned devices.

Submit
4. What should a company use to create a point-to-point bridge between two APs?

Explanation

A company should use unidirectional antennas to create a point-to-point bridge between two APs. Unidirectional antennas are designed to transmit and receive signals in a specific direction, allowing for a focused and concentrated signal transmission between the two access points. This helps to establish a strong and stable connection, minimizing interference and maximizing the distance and throughput of the bridge.

Submit
5. Which type of vulnerability would NOT be reported by a vulnerability scan?

Explanation

A vulnerability scan is a process that identifies and reports security weaknesses in a system. Zero day vulnerabilities refer to unknown vulnerabilities that are discovered and exploited by hackers before the developers become aware of them. Since zero day vulnerabilities are unknown, they cannot be detected by a vulnerability scan, as the scan relies on known vulnerabilities and patterns. Therefore, zero day vulnerabilities would not be reported by a vulnerability scan.

Submit
6. Provides for secure login and remote executions of commands.

Explanation

SSH (Secure Shell) is a network protocol that provides a secure way to login to a remote computer and execute commands. It encrypts the data transmitted between the client and the server, ensuring that it cannot be intercepted or tampered with by malicious actors. Port 22 is the default port used by SSH for communication. Therefore, the given correct answer, SSH and port 22, aligns with the description provided, indicating that it provides secure login and remote executions of commands.

Submit
7. A company deploys a new computer. When the cable to the computer is plugged in at the with, the network link LED does not light. When the cable is plugged in to a different open port, the LED lights up. When plugged back in to the original port, the LED does not light. What is the most likely problem? 

Explanation

The most likely problem is a bad port. This is indicated by the fact that when the cable is plugged into a different open port, the network link LED lights up, suggesting that the cable and computer network adapter are functioning properly. However, when the cable is plugged back into the original port, the LED does not light, indicating that there is an issue with that specific port.

Submit
8. While discussing a configuration issue with a switch manufacturer's technical support team, the in-house support team learns of a switch vulnerability. The vulnerability was fixed with a recent update. the support team needs to mitigate the vulnerability and avoid a potential attack with minimum risk to the network, downtime, and the cost.  What should in-house support do?

Explanation

The in-house support team should download and install the most recent firmware update. This is the most efficient and cost-effective solution to mitigate the vulnerability and avoid potential attacks. Ordering new firmware chips and removing/replacing the firmware would be time-consuming and costly. Purchasing a new switch is unnecessary if the vulnerability can be fixed with a firmware update. Deploying an IDS may help monitor activity, but it does not directly address the vulnerability itself.

Submit
9. A user complains about the transfer rates from a server in VLAN 4. A network administrator connects to a switch and receives the output shown in the exhibit. Which parameter is MOST likely misconfigured on the switch?

Explanation

Based on the given information, the user is complaining about transfer rates from a server in VLAN 4. The exhibit shows the output from the switch, indicating that the network administrator has connected to it. Since the issue is related to transfer rates, the most likely misconfigured parameter on the switch is the duplex setting. Duplex refers to the communication mode between devices, and if it is misconfigured, it can result in slower transfer rates.

Submit
10. Which network device uses ASICs to handle the packet switching for inter-VLAN communication?

Explanation

An L3 switch uses ASICs (Application-Specific Integrated Circuits) to handle the packet switching for inter-VLAN communication. ASICs are specialized hardware components that are designed to perform specific tasks efficiently. In the case of an L3 switch, the ASICs allow for fast and efficient routing of packets between different VLANs, improving network performance and reducing latency. This makes an L3 switch an ideal choice for networks that require inter-VLAN communication.

Submit
11. Which one do you like?

Explanation

not-available-via-ai

Submit
12. Which two items would be specified as part of an SLA? (Choose two.)

Explanation

An SLA, or Service Level Agreement, is a contract between a service provider and a customer that outlines the level of service that will be provided. Two items that are typically specified in an SLA are availability and uptime, which refer to the amount of time that a service or system is operational and accessible to users, and help desk response time, which outlines the expected time for the help desk to respond to customer inquiries or issues. These two items are important in ensuring that the service provider meets the agreed-upon service levels and customer expectations.

Submit
13. A company is deploying a new company as shown in the exhibit. The company will have a static IPv4 address. What should technicians use as the company's default gateway?

Explanation

Technicians should use 192.168.1.1 as the company's default gateway. The default gateway is the IP address of the router that connects the local network to the internet. In this case, 192.168.1.1 is the most likely candidate for the default gateway as it falls within the same IP subnet as the company's static IPv4 address.

Submit
14. What is a secure multipoint IP hub-and-spoke WAN configuration that supports direct communication between spokes?

Explanation

DMVPN (Dynamic Multipoint Virtual Private Network) is a secure multipoint IP hub-and-spoke WAN configuration that supports direct communication between spokes. It is a flexible and scalable solution that allows dynamic creation of VPN tunnels between spokes without the need for manual configuration. With DMVPN, spokes can communicate directly with each other, improving network efficiency and reducing traffic through the hub. It provides secure communication over public networks, making it an ideal choice for organizations with distributed branch offices.

Submit
15. A system administrator cannot ping a file server running Windows Server. Users can access files on the server without any problems. What should the administrator check?

Explanation

The system administrator should check the local firewall rules. The fact that users can access files on the server without any problems suggests that the issue is not with NTFS permissions or TCP/IP settings. However, if the administrator is unable to ping the file server, it indicates that there may be a firewall blocking the ping requests. Checking the local firewall rules will help identify if there are any rules preventing the ping requests from reaching the server.

Submit
16. A consultant is setting up a SOHO for a customer. The customer has requested a DOCSIS Internet connection. What type of service connection should the consultant configure?

Explanation

The consultant should configure a cable service connection for the customer's SOHO. Cable internet uses the same coaxial cables that deliver cable television, providing high-speed internet access. This type of connection is suitable for a small office or home office (SOHO) setup, as it offers fast and reliable internet speeds. BRI, PRI, and DSL are not appropriate options for a DOCSIS internet connection.

Submit
17. Users report that they have lost access to a network shared drive. They open a new help ticket and expect a quick resolution to the problem. What should a technician do next?

Explanation

The technician should gather more information from the users because it is important to understand the specific details of the issue before taking any action. By gathering more information, the technician can determine the cause of the problem and identify the appropriate solution. This will help avoid unnecessary actions such as rebooting the servers or replacing the cabling, which may not be the actual cause of the issue. Escalating the issue to the server team may be necessary after gathering more information, but it should not be the first step.

Submit
18. Which Internet of Things (IoT) technology is designed to facilitate touchless payments using passive embedded chips and smart devices?

Explanation

NFC stands for Near Field Communication, which is a technology designed to enable touchless payments using passive embedded chips and smart devices. NFC allows for secure and convenient transactions by simply bringing two devices close together, without the need for physical contact. This technology is commonly used in mobile payment systems, allowing users to make payments by tapping their smartphones or smartwatches on compatible payment terminals.

Submit
19. The network team is tasked with hardening the L2 infrastructure. Which two actions should the team perform?

Explanation

The team should change the native VLAN and shut down unused ports. VLAN 1 is the native VLAN and can be used to perform a network attack called VLAN hopping. VLAN hopping allows an attacker to gain unauthorized access to a different VLAN by exploiting the native VLAN settings. All ports belong to VLAN 1 by default. The network team should change the native VLAN to a value other that VLAN 1.

Submit
20. A company has configured some services and applications using a PAAS platform. The network team wants to create a secure connection from an onsite router to the new platform. Which of the following would be the BEST protocol to implement?

Explanation

IPsec (Internet Protocol Security) would be the best protocol to implement in this scenario. IPsec provides secure communication between the onsite router and the PAAS platform by encrypting the data that is transmitted over the network. It ensures data confidentiality, integrity, and authentication, making it an ideal choice for creating a secure connection in this situation. SSL/TLS (Secure Sockets Layer/Transport Layer Security) is commonly used for securing web communications, but it may not be the best choice for establishing a secure connection between the router and the platform. PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) are VPN protocols that are typically used for remote access, but they may not be the most suitable options for this particular scenario.

Submit
21. A company is setting up a routed network with three subnets. All routers are BOOTP enabled. The company wnats to use dynamic IPv4 address assignments for all client computers and manage the process from one central location. What should the company do?  
Submit
22. A company is preparing to deploy a wireless LAN (WLAN) in a newly constructed office space. The network design specifies the minimum channel bandwidth requirement as 80MHz. Which standard should the access points support?

Explanation

The access points should support the 802.11ac standard because it is the only standard listed that supports a channel bandwidth of 80MHz. The other standards listed, such as 802.11n, 802.11a, 802.11b, and 802.11g, do not meet the minimum channel bandwidth requirement specified in the network design.

Submit
23. Match the following
Submit
24. For redundancy purposes, a network engineer installs a new router and enables a load balancing protocol. What type of address should he assign as a default gateway to end devices?

Explanation

The network engineer should assign a Virtual IP as the default gateway to end devices. A Virtual IP is a single IP address that represents a group of devices, such as a cluster of servers or a load balancer. By assigning a Virtual IP as the default gateway, the network engineer can ensure that traffic is distributed evenly across multiple routers, providing redundancy and improving network performance.

Submit
25. Which one do you like?

Explanation

The explanation for the given answer is not available as the question does not provide any context or criteria for selecting a preference.

Submit
26. Which service does an ASP provide to subscribers?

Explanation

An ASP (Application Service Provider) provides Software as a Service (SAAS) to subscribers. SAAS is a cloud computing model where software applications are delivered over the internet on a subscription basis. Subscribers can access and use these applications without the need for local installation or management. This allows users to conveniently access and use software applications from anywhere, anytime, using any device with an internet connection.

Submit
27. A policy includes the following statement: "Employees are not allowed to use company equipmen t to copy or distribute copyrighted material without the written permission of the holder of the copyright." Which policy would this statement be part of?

Explanation

The given statement is related to the acceptable use policy (AUP). An acceptable use policy outlines the acceptable behavior and actions of employees when using company equipment or resources. This specific statement prohibits employees from using company equipment to copy or distribute copyrighted material without written permission. AUPs are commonly implemented by organizations to ensure that employees are aware of and adhere to certain guidelines and restrictions while using company resources.

Submit
28. Protocol providing shared access to files, printers, and serial ports.

Explanation

SMB (Server Message Block) is a protocol that allows shared access to files, printers, and serial ports. It is commonly used in Windows operating systems to enable file and printer sharing over a network. The port number 445 is associated with SMB and is used for communication between devices. Therefore, the correct answer is SMB,445.

Submit
29. Which one do you like?

Explanation

The explanation for the given correct answer cannot be provided as the question does not provide any information or context to determine a preference.

Submit
30. A company is configuring an internal network with routed subnets based on the following class B address range: 172.30.8.0/21 The company wants to set up the following subnets:  Network A- 600 hosts  Network B - 100 hosts NetworkC - 56 hosts Network D - 40 hosts The company wants to keep the used addresses in each subnet to a minimum. Which network address ranges should the company use?

Explanation

The given answer is correct because it follows the requirements of the company. Network A requires 600 hosts, which can be accommodated within the subnet 172.30.8.0/22. Network B requires 100 hosts, which can be accommodated within the subnet 172.30.12.0/25. Network C requires 56 hosts, which can be accommodated within the subnet 172.30.12.128/26. Network D requires 40 hosts, which can be accommodated within the subnet 172.30.12.192/26. This allocation minimizes the number of used addresses in each subnet while still meeting the company's requirements.

Submit
31. Which media access method is used with 802.11 RTS/CTS network configurations and is NOT able to detect collisions during transmissions?

Explanation

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the media access method used with 802.11 RTS/CTS network configurations. Unlike CSMA/CD (Carrier Sense Multiple Access with Collision Detection), CSMA/CA is not able to detect collisions during transmissions. Instead, it uses a mechanism called "Request to Send/Clear to Send" (RTS/CTS) to avoid collisions by allowing devices to reserve the channel before transmitting data. This helps to reduce the chances of collisions and improve the efficiency of wireless communication.

Submit
32. A company deploys six new computers that are configured for automatic address assignment to the 192.168.4/26 subnet. The DHCP server that hosts the scope for the subnet is deployed on the same subnet. Four of the new computers are able to lease valid IP addresses. The remaining two computers have the following addresses: 169.245.12.7 169.254.14.2 What is most likely wrong?

Explanation

The most likely explanation for the two computers being assigned invalid IP addresses is that the DHCP scope for the subnet is exhausted. This means that the DHCP server has run out of available IP addresses to assign to new devices. As a result, the two computers were not able to lease valid IP addresses and were assigned addresses from a different range (169.245.12.7 and 169.254.14.2) which are not within the expected subnet (192.168.4/26).

Submit
33. The support team has been tasked with creating an alias name for a newly deployed server.  What should the team do?
Submit
34. Supports secure communication with websites to protect data privacy and integrity.

Explanation

HTTPS is the correct answer because it stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that uses encryption to protect the privacy and integrity of data transmitted between a user's device and a website. By using HTTPS, websites can ensure that sensitive information, such as passwords or credit card details, cannot be intercepted or tampered with by unauthorized individuals. The number 443 is also mentioned, which is the default port used for HTTPS communication.

Submit
35. Which network device uses ASICs to handle the packet switching for inter-VLAN communication?

Explanation

An L3 switch uses ASICs (Application-Specific Integrated Circuits) to handle the packet switching for inter-VLAN communication. ASICs are specialized hardware components that are designed to perform specific tasks efficiently. In the case of an L3 switch, the ASICs are responsible for processing and forwarding packets between different VLANs, allowing for efficient and fast communication between them. This makes the L3 switch a suitable choice for handling inter-VLAN communication in a network.

Submit
36. Provides for audio-visual communication sessions and widely used in videoconferencing.

Explanation

H.323 is a protocol suite that provides for audio-visual communication sessions, making it suitable for videoconferencing. Port 1720 is the default port used by H.323 for signaling, allowing devices to establish and manage connections for videoconferencing sessions. Therefore, the correct answer is H.323,1720.

Submit
37. A sales manager wants to provide a mobile device to all remote employees. The devices have to support low power and short-range peer-to-peer file transfers and payments using passive sources. Which technololgy should the manager consider?

Explanation

NFC (Near Field Communication) is the technology that the sales manager should consider. NFC supports low power and short-range peer-to-peer file transfers and payments using passive sources. It allows devices to establish a connection by simply touching or bringing them close together, making it convenient for remote employees to transfer files and make payments using their mobile devices.

Submit
38. Against which type of attack is end user training most effective?

Explanation

End user training is most effective against phishing attacks. Phishing is a type of cyber attack where attackers impersonate a legitimate entity to deceive users into providing sensitive information or performing harmful actions. By educating end users about the signs of phishing attempts, such as suspicious emails or websites, they can learn to identify and avoid falling victim to such attacks. Training can help users understand the importance of not clicking on suspicious links, not sharing personal information, and being cautious with email attachments, thereby reducing the success rate of phishing attacks.

Submit
39. A company's network is shown in the exhibit. the DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses for he DHCP server. Clients in the 192.168.20 subnet are able to lease addresses. What should the company do?

Explanation

The company should deploy a DHCP relay agent in the 192.168.2.0 subnet. This is because the DHCP server is unable to reach the clients in the 192.168.4.0 and 192.168.4.128 subnets. By deploying a DHCP relay agent in the 192.168.2.0 subnet, it will forward the DHCP requests from the clients in the 192.168.4.0 and 192.168.4.128 subnets to the DHCP server, allowing them to lease addresses.

Submit
40. A security audit highlights some security concerns in a newly deployed SDN process. One of the scripts uses the verify md5 command to check the image integrity, uploads it to a server using FTP. What should the company do to address security concerns?

Explanation

The company should use SHA512 for file integrity and FTPS for uploads. SHA512 is a stronger hashing algorithm compared to SHA256, providing better security for verifying the integrity of the image. FTPS (FTP over SSL/TLS) ensures secure file transfers by encrypting the data during transmission. This combination of using a strong hashing algorithm and secure file transfer protocol helps address the security concerns highlighted in the security audit.

Submit
41. A company needs a leased line connection supporting the transmission speed of 30 Mbps. Which service should the company choose?

Explanation

The company should choose the T3 service because it supports a transmission speed of 45 Mbps, which is higher than the required 30 Mbps. VDSL, T1, T2, and ADSL do not provide the necessary transmission speed for the company's needs.

Submit
42. A company is expanding its office space. The current space is configured as a wired network. The new space will be set up as a wireless network. The company needs to identify potential sources of interference in the network office space. What should the company use?

Explanation

The company should use a spectrum analyzer to identify potential sources of interference in the network office space. A spectrum analyzer is a device that measures and displays the frequency spectrum of signals, allowing the company to identify any sources of interference that may be present in the wireless network. This tool would be particularly useful in the new wireless network setup, as it can help the company ensure that the network operates efficiently and without any interference from other devices or signals.

Submit
43. Which protocol provides time synchronization service over the global Internet?

Explanation

NTP (Network Time Protocol) is the correct answer because it is specifically designed to provide time synchronization service over the global Internet. NTP allows devices to synchronize their clocks with highly accurate time references, called NTP servers, which are distributed worldwide. This protocol is widely used in computer networks, ensuring accurate timekeeping for various applications and systems that rely on synchronized time. ICMP (Internet Control Message Protocol) is used for diagnostic and control purposes, SNMP (Simple Network Management Protocol) is used for network management, and IPAM (IP Address Management) is used for managing IP addresses.

Submit
44. Which mechanism is used by TCP to set up and synchronize a new TCP/IP connection?

Explanation

The three-way handshake is the mechanism used by TCP to set up and synchronize a new TCP/IP connection. This process involves three steps: the client sends a SYN packet to the server, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to the server. This ensures that both the client and server agree on the initial sequence numbers and establishes a reliable connection between them. The sliding window is a flow control mechanism, the port number is an identifier for network communication, and the code field is used for various purposes in TCP packets.

Submit
45. PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem?

Explanation

To fix the problem of PC1 failing to receive an IP address, the IP helper address should be configured on Router 1. An IP helper address is used to forward DHCP requests from clients in one subnet to a DHCP server in another subnet. By configuring the IP helper address on Router 1, it will forward the DHCP request from PC1 to the DHCP server, allowing PC1 to receive an IP address and resolve the issue.

Submit
46. PC1 and PC2 are connected to a managed switch. PC1 uses port F0/5, which is in VLAN 7, and PC @ uses port F0/11. which is in VLAN 12. What is the minimum required configured by a technician on PC1 and PC2 to exchange data?

Explanation

To exchange data between PC1 and PC2, the minimum required configuration on both PCs would be their IP address, subnet mask, and default gateway. The IP address is necessary for identifying each PC on the network, the subnet mask is used to determine the network portion of the IP address, and the default gateway is required for routing data between different networks. The MAC address is not necessary in this scenario as it is used for communication within the local network.

Submit
47. A company wants to connect devices so that there are many redundant interconnections. Which topology should the company use?

Explanation

A company should use the Mesh topology because it allows for many redundant interconnections. In a Mesh topology, each device is connected to every other device in the network, creating multiple paths for data to travel. This redundancy ensures that if one connection fails, there are alternative paths available, increasing the network's reliability and fault tolerance.

Submit
48. Matching the topology types with their descriptions.
Submit
49. A company is wiring a new office space to support 1000BaseT Ethernet. The network design for UTP cable. The  majority of the cable will be routed through a suspended ceiling. Which cable should the company use?

Explanation

The company should use Cat 5e plenum cable because it is specifically designed for use in plenum spaces, such as suspended ceilings. Plenum spaces are areas where air circulates for heating, ventilation, and air conditioning systems. Plenum-rated cables have a special insulation that is fire-retardant and low-smoke, which is required for safety in these types of spaces. Cat 5e plenum cable is also capable of supporting 1000BaseT Ethernet, making it the most suitable choice for wiring the new office space.

Submit
50. An office area is prewired with Cat 5e cable. Technicians need to test cable continuity. Cable terminate at 110 block in a secure server room. RJ-45 jacks are installed at the device end of each cable. One technician will go from jack to jack with a loopback plug. What should the technician working in the server room use?

Explanation

The technician working in the server room should use a multimeter. A multimeter is a versatile tool that can measure various electrical properties, including continuity. By connecting the multimeter to the RJ-45 jacks and using the loopback plug, the technician can test the cable continuity and ensure that the connections are functioning properly.

Submit
51. A company is developing several web applications. The company does not have the hardware resources to support the development and does not want to incur the expense of additional hardware. The companyt wants to use its own development application and data, but it wants hardware, operating system and storage management to be the responsibility of a third-party provider. Which type of service does this describe? 

Explanation

This scenario describes the use of Platform as a Service (PaaS). PaaS allows the company to use its own development application and data, while outsourcing the responsibility of hardware, operating system, and storage management to a third-party provider. This allows the company to focus on developing web applications without the need for additional hardware resources or incurring the expense of managing them.

Submit
52. Which Layer 2 security solution allows a network administrator to protect the topology against malicious STP messages?

Explanation

ACL (Access Control List) is not the correct answer for this question. ACL is a Layer 3 security solution that is used to control traffic flow based on source and destination IP addresses, ports, and protocols. It is not specifically designed to protect against malicious STP (Spanning Tree Protocol) messages. The correct answer is BPDU Guard, which is a Layer 2 security feature that prevents unauthorized switches from participating in the STP process, thereby protecting the network topology.

Submit
53. A medium-sized company is moving into a new office space. The office is being prewired with Cat 6 cabling. Employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible. What should Technical Services use to ensure this?

Explanation

Technical Services should use labeling to ensure that the move goes as smoothly as possible. Labeling the cables and equipment will help employees easily identify and connect their equipment to the network. This will minimize confusion and prevent any delays or errors during the move.

Submit
54. A network engineer has installed three gigabit switches. The switches will provide access to NAS devices for end users. What should the engineer configure to avoid a bottleneck in the network with big file transfers?

Explanation

To avoid a bottleneck in the network with big file transfers, the network engineer should configure trunks with port aggregation. Trunks allow multiple physical connections to be combined into a single logical connection, increasing the available bandwidth. Port aggregation, also known as link aggregation or EtherChannel, allows multiple physical links between switches to be bundled together, providing increased bandwidth and redundancy. By configuring trunks with port aggregation, the engineer can ensure that the network has sufficient capacity to handle large file transfers without experiencing a bottleneck.

Submit
55. Which of the following is an example of valid authentication factors?

Explanation

Facial recognition and PIN are examples of valid authentication factors because they combine something the user knows (the PIN) with something the user is (their facial features). This multi-factor authentication approach enhances security by requiring the user to provide both a physical characteristic (facial recognition) and a secret code (PIN) to verify their identity. This makes it more difficult for unauthorized individuals to gain access to the system or data.

Submit
56. Used to monitor and manage network devices.

Explanation

SNMP (Simple Network Management Protocol) is a widely used protocol for monitoring and managing network devices. It allows network administrators to collect information and manage devices such as routers, switches, and servers. The number "161" refers to the default port number used by SNMP for communication. This port is used for sending and receiving SNMP messages between the network management system and the network devices. By using SNMP on port 161, administrators can monitor and control various aspects of network devices, such as performance, availability, and configuration.

Submit
57. A company deployed a new network. The company secures access using WPA2-Personal. What is required for a client to connect to an access point?

Explanation

To connect to an access point secured with WPA2-Personal, a client needs a pre-shared key. This key is a password that both the access point and client devices must have in order to establish a secure connection. The pre-shared key ensures that only authorized clients can connect to the network, as they need to provide the correct key. It acts as a shared secret between the access point and the client, allowing them to authenticate and encrypt their communication.

Submit
58. A company wants to implement an authentication and authorization solution for network devices that also directly supports device management. What should the company use?

Explanation

The company should use TACACS+ for implementing an authentication and authorization solution for network devices that also directly supports device management. TACACS+ (Terminal Access Controller Access Control System Plus) is a protocol that provides centralized authentication, authorization, and accounting (AAA) services for network devices. It allows for granular control over access to network devices, ensuring that only authorized users can manage and access them. Additionally, TACACS+ provides detailed logging and auditing capabilities, making it an ideal choice for device management.

Submit
59. The network team has been tasked with a new project. They need to identify the best set of devices to be purchased. Match the network device with the BEST use case. 
Submit
60. A company has offices on several floors of a building. All connections to external public lines come in through a central area and are routed to distribution points on each floor. the distribution points on each floor connect to the internal network. Where is the cabling and equipment for the central area documented in detail?

Explanation

The cabling and equipment for the central area are documented in detail in the MDF (Main Distribution Frame) documentation. The MDF is the central point where all connections from external public lines come in and are routed to the distribution points on each floor. Therefore, it is essential to have detailed documentation of the cabling and equipment in the MDF to ensure proper management and maintenance of the network infrastructure.

Submit
61. A company must implement additional monitoring and analysis to meet compliance requirements relating to work done for new customers. The company needs a solution that can collect log, event, and other security information from a variety of sources and correlate and analyze the data to identify threats. It should provide for long-term storage of the data collected and be able to identify trending threats. What type of device solution should the company use? 

Explanation

The company should use a SIEM (Security Information and Event Management) solution. SIEM solutions are designed to collect and analyze log, event, and security information from various sources. They can correlate and analyze the data to identify threats and provide long-term storage of the collected data. Additionally, SIEM solutions can identify trending threats, which is important for meeting compliance requirements and ensuring the security of work done for new customers.

Submit
62. What is the last step in a systematic troubleshooting methodology?

Explanation

The last step in a systematic troubleshooting methodology is to document the solution and the process. This is important for several reasons. Firstly, documenting the solution ensures that it can be easily replicated in the future if the same issue arises. Secondly, it allows other team members or technicians to understand the steps taken to resolve the problem. Lastly, documenting the troubleshooting process helps in creating a knowledge base for future reference and for training purposes.

Submit
63. A network engineer arrives on -site to install and access point. The office is 25 square meters and has several glass walls and doors. What should be the main concern for the engineer?

Explanation

The main concern for the engineer should be refraction. Refraction occurs when a signal passes through different mediums, such as air and glass, causing the signal to change direction. In this case, the office has several glass walls and doors, which can cause the Wi-Fi signal to refract and weaken. This can result in a decrease in signal strength and potentially impact the coverage and performance of the access point. The engineer may need to consider strategies to mitigate the effects of refraction, such as adjusting the placement of the access point or using additional equipment to boost the signal.

Submit
64. A network team has deployed a new SIP trunk. What will MOST likely be used by users in this network?

Explanation

A SIP trunk is a virtual connection that enables voice and video calls over the internet using the Session Initiation Protocol (SIP). Therefore, it is logical to assume that users in this network will most likely use a softphone. A softphone is a software application that allows users to make and receive calls over the internet using their computer or mobile device, eliminating the need for physical telephones. This is a common choice for users in a network with a SIP trunk deployment as it provides flexibility and convenience.

Submit
65. What type of backup takes the least time and uses the least amount of disk space?

Explanation

Incremental backup takes the least time and uses the least amount of disk space compared to other types of backups. In an incremental backup, only the changes made since the last backup are saved, resulting in smaller backup files and faster backup process. This is because it only backs up the data that has been modified or added since the last backup, rather than copying all the data again.

Submit
66. A company is installing a large rack-mounted Infrastructure to support a web server farm. High-availability is a critical concern for the company. You need to recommend a solution that will ensure continued availability without interruption if AC line power is lost. What type of technology does the company need to ensure this?

Explanation

A UPS (Uninterruptible Power Supply) is a device that provides backup power to critical equipment in the event of a power outage or loss of AC line power. It contains a battery that can supply power for a limited time, allowing the web server farm to continue operating without interruption until the power is restored or a standby generator kicks in. A UPS ensures high-availability by preventing downtime and data loss due to power failures, making it the recommended solution in this scenario.

Submit
67. What is the purpose of on-boarding and off-boarding procedures?

Explanation

The purpose of on-boarding and off-boarding procedures is to define the activities that need to be followed when an employee joins or leaves an organization. These procedures ensure that the necessary steps are taken to smoothly integrate a new employee into the company and to properly transition an exiting employee out of the organization. This includes tasks such as providing orientation, setting up accounts and access privileges, collecting company property, and conducting exit interviews. By having clear on-boarding and off-boarding procedures in place, organizations can ensure that the onboarding process is efficient and effective, and that the off-boarding process is handled in a professional and secure manner.

Submit
68. A security engineer installs an SSL certificate and an endpoint security package on a server. The deployment of a dedicated agent on a member server fails with the following error message: Error code:SSL_SEC_ERROR_EXPIRED_CERTIFICATE.License has expired! What should the engineer do first?

Explanation

The error message indicates that the SSL certificate has expired, but it also mentions a "License has expired" error. This suggests that the issue may not be solely related to the SSL certificate, but also to the license for the endpoint security package. Checking the time settings on the server is important because if the system time is incorrect, it can cause certificates and licenses to appear expired. By ensuring that the time settings are accurate, the engineer can eliminate this potential cause of the error and proceed with further troubleshooting if necessary.

Submit
69. PC1 is unable to access the Internet in the network shown in the exhibit. What is the most likely cause?

Explanation

A rogue DHCP server is the most likely cause for PC1 being unable to access the internet in the network shown in the exhibit. A rogue DHCP server refers to a unauthorized DHCP server that is providing incorrect or conflicting IP addresses to clients on the network. This can lead to IP address conflicts and connectivity issues, preventing PC1 from accessing the internet.

Submit
70. A network technician wants to deploy a new virtual firewall. The firewall has to support three interfaces: G0/0, G0/1, and G0/2. What should the technician configure at the VM level for these interfaces?

Explanation

The network technician should configure vNIC (virtual network interface card) at the VM level for these interfaces. A vNIC is a virtual representation of a physical network interface card and is used to connect the virtual firewall to the network. By configuring vNICs for the G0/0, G0/1, and G0/2 interfaces, the technician can ensure that the virtual firewall can communicate with the network through these interfaces.

Submit
71. A company's network is shown in the exhibit. PC1 is unable to access any resources in network B. What should the company do to fix the issue? 

Explanation

In order for PC1 to access resources in network B, it needs to have an IP address that is within the same subnet as network B. By changing the IP address on PC1 to one that is within the range of network B's subnet, PC1 will be able to communicate with the devices in network B and access the resources it needs.

Submit
72. A company recently implemented a bring your own device (BYOD) policy and is adding security controls over personal devices. The company wants to ensure that some managed apps and most company data will be unavailable when a device leaves the corporate campus. What should the company use to implement this?

Explanation

Geofencing is a technology that allows the company to set virtual boundaries around the corporate campus. By using geofencing, the company can ensure that when a device leaves the campus, certain managed apps and most company data will be unavailable. This helps to maintain security and prevent unauthorized access to sensitive information. EAP-FAST, WPA2, and geotagging are not directly related to implementing this specific requirement.

Submit
73. A company routes Cat 5e UTP cabling through a part of its manufacturing floor that generates a great deal of EMI. the cables are routed loosely through the ceiling, about 3 meters above the equipment. computers connected to the cabling experience communication errors any time the equipment is running. The company needs a reliable, cost-effective solution. Managemen t will not authorize converting to fiber optic cabling. What should the company do?

Explanation

Upgrading the Cat 5e UTP cable to Cat 6 UTP cable would provide better performance and reduce the impact of EMI. Cat 6 UTP cable has improved shielding and can handle higher frequencies, making it more resistant to interference. This would help to minimize communication errors caused by the EMI generated by the equipment on the manufacturing floor. Additionally, this solution is cost-effective as it does not require converting to fiber optic cabling, which management is not authorizing.

Submit
74. A company wants to create a site-to-site VPN. maximum security is required. Which set of protocols should the company use?

Explanation

The company should use AES for encryption and SHA512 for hashing because AES is a strong and widely used encryption algorithm that provides maximum security. SHA512 is a secure hashing algorithm that generates a longer hash value, making it more resistant to attacks. Using 3DES for encryption is less secure compared to AES, and MD5 for hashing is also less secure compared to SHA512. DES for encryption is outdated and considered weak in terms of security. SSL is a protocol used for securing communication between a client and a server, but it does not provide site-to-site VPN functionality.

Submit
75. Which one do you like?

Explanation

not-available-via-ai

Submit
76. A company wants to configure a site-to-site VPN link between two offices. Users in each office should have access to resources in the other office, including shared folders and network services. What type of VPN should the company use?

Explanation

The company should use an IPsec VPN. IPsec (Internet Protocol Security) is a protocol suite that provides secure communication over IP networks. It offers strong encryption and authentication mechanisms, making it suitable for creating a secure site-to-site VPN link between two offices. PPTP (Point-to-Point Tunneling Protocol) is an older VPN protocol that has known security vulnerabilities. TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are encryption protocols commonly used for securing web communications, but they are not specifically designed for site-to-site VPN connections.

Submit
77. A restaurant offers public Wi-Fi access to the Internet for its customers. A customer is prompted with a wesb page that requires the customer to agree to abide by use policies while connected. What is this and example of?

Explanation

A captive portal is a web page that is displayed to users when they attempt to access a public Wi-Fi network. It typically requires users to agree to certain terms and conditions or use policies before they can connect to the internet. In this scenario, the customer is prompted with a web page that requires them to agree to abide by the use policies, indicating that it is an example of a captive portal.

Submit
78. A company expands its corporate campus and builds new facilities for its warehouse and additional offices. The company needs to run a high-bandwidth link between the buildings. The buildings are approximately 4 km (about 2.5 miles) apart. What kind of cable should the company use?

Explanation

Single-mode fiber should be used for running a high-bandwidth link between the buildings that are 4 km apart. Single-mode fiber has a smaller core size and allows for transmission over longer distances with minimal signal loss. It is designed for long-range communication and provides higher bandwidth and faster transmission speeds compared to other cable options.

Submit
79. Which layer of the OSI model do routers operate at?

Explanation

Routers operate at the network layer of the OSI model, which is responsible for routing and forwarding data packets between different networks. The data link layer, on the other hand, is responsible for the reliable transmission of data frames within a single network. Therefore, the correct answer is network.

Submit
80. A file server deployed on the company perimeter network is used to store reference materials and templates for forms. All of the files are stored on the same disk. Files are downloaded from the server using FTP. The company needs to able to determine whether a file is changed while stored on the server. What should the company do?

Explanation

The company should create a hash fro each file. A hash is a value generated from the file content. If another has is generated at a later time, the new hash should have the same value. if not the file has been modified.

Submit
81. An on-site inspection finds that one fiber optic exceeds the bend radius that is recommended by the manufacturer. What should the main concern for the company?

Explanation

The main concern for the company when one fiber optic exceeds the bend radius recommended by the manufacturer is attenuation. Attenuation refers to the loss of signal strength that occurs as the signal travels through the fiber optic cable. When the bend radius is exceeded, it can cause excessive bending and stress on the fiber, leading to increased signal loss and reduced performance. Therefore, the company should be concerned about the potential for higher levels of attenuation, which can negatively impact the transmission of data through the fiber optic cable.

Submit
82. A company wants to interconnect serveral offices. The solution has to be secure, scalable, and should not require any changes to the existing agreements with ISPs. which solution would meet the company's objectives?

Explanation

DMVPN (Dynamic Multipoint Virtual Private Network) would meet the company's objectives. DMVPN provides a secure and scalable solution for interconnecting multiple offices without requiring any changes to the existing agreements with ISPs. It allows for dynamic creation of VPN tunnels between the offices, providing a flexible and efficient network architecture. Additionally, DMVPN supports encryption and authentication, ensuring the security of the data transmitted between the offices.

Submit
83. Match the network requirements with the network devices that are needed to meet the requirement. 
Submit
84. A technician is setting up a SOHO with devices located in different rooms. The configuration needs to support multiple simultaneous data streams to maximum thoughput. Which two standards support this configuration? (Choose two.) 

Explanation

802.11n and 802.11ac are the two standards that support multiple simultaneous data streams to maximize throughput. These standards provide higher data transfer rates and improved network performance compared to 802.11g and 802.11a. They utilize advanced technologies such as MIMO (Multiple Input Multiple Output) and wider channel bandwidth to increase the capacity and efficiency of wireless networks. This makes them suitable for setups like a SOHO (Small Office/Home Office) where multiple devices in different rooms need to transmit data simultaneously at high speeds.

Submit
85. A technician configures an access point as shown in the exhibit. He creates a list of MAC addresses to allow on the network using MAC filtering. The technician realizes that despite this configuration, any device can still connect. What should the technician do?

Explanation

The technician should enable MAC filtering globally. Currently, the access point has MAC filtering enabled, but it is not being applied to the network as a whole. By enabling MAC filtering globally, the access point will only allow devices with MAC addresses that are on the allowed list to connect to the network. This will prevent any unauthorized devices from connecting, ensuring a more secure network.

Submit
86. The users connected to the network using wireless laptops and report intermittent access issues with a NAS server. The access point and the NAS server are connected to a switch using a 100 Mbps link. The status of the access point is shown in the exhibit. What should the support team do to fix the connectivity issue?

Explanation

not-available-via-ai

Submit
87. Which mechanism is used to elect a root bridge in the network?

Explanation

not-available-via-ai

Submit
88. A network engineer wants to configure a new standalone access point for a small company. The solution should support the 2.4 Ghz and 5 Ghz bands, use a secure encryption standard, and provide filtering used on hardware addresses. What should the engineer configure? 
Submit
89. A company network is wired with 10/100/1000 multilayer switches and CAT 6 UTP cable. The company wants to implement a SAN using the existing infrastructure.

Explanation

iSCSI (Internet Small Computer System Interface) is the correct answer because it is a protocol that allows SCSI commands to be sent over IP networks. It is commonly used to connect servers to storage devices, such as a Storage Area Network (SAN), using existing Ethernet infrastructure. In this case, since the company network is wired with multilayer switches and CAT 6 UTP cable, implementing iSCSI would be the most suitable choice for connecting the SAN to the network. It provides a cost-effective and flexible solution for storage connectivity without the need for specialized hardware like InfiniBand or Fibre Channel.

Submit
90. Which command line interface command should a system administrator use to verify the hardware address of a device connected to a local area network?

Explanation

To verify the hardware address of a device connected to a local area network, a system administrator should use the "arp" command line interface command. ARP stands for Address Resolution Protocol, and it is used to map an IP address to a physical or hardware address. By using the "arp" command, the system administrator can view the ARP cache table, which contains the IP to hardware address mappings for devices on the network. This allows them to identify the hardware address of a specific device connected to the LAN.

Submit
91. Which mechanism monitors and manages virtual machine instances?

Explanation

The correct answer is "Hypervisor". A hypervisor is a software or hardware component that creates and manages virtual machine instances. It allows multiple virtual machines to run on a single physical server, providing isolation and resource allocation for each virtual machine. The hypervisor monitors the virtual machine instances, ensuring their proper functioning, managing their resources, and facilitating communication between the virtual machines and the underlying hardware. It plays a crucial role in virtualization technology by enabling efficient and secure virtual machine management.

Submit
92. A technician needs to configure rules for a host-based firewall on a computer running Linux. What command should the technician use?

Explanation

The technician should use the "iptables" command to configure rules for a host-based firewall on a computer running Linux. Iptables is a command-line utility that allows the configuration of firewall rules in the Linux kernel. It provides a powerful and flexible firewall solution, enabling the technician to filter network traffic based on various criteria such as source and destination IP addresses, ports, protocols, and more. By using iptables, the technician can effectively secure the computer and control the network traffic flowing in and out of it.

Submit
93. A network engineer wants to create an uplink between two switches using a fiber optic cable. Which two standards could the engineer use to connect the cable to a switch? (Choose two)

Explanation

The network engineer could use SPF+ and GBIC standards to connect the fiber optic cable to a switch. SPF+ (Small Form-factor Pluggable) is a compact transceiver commonly used for high-speed data transmission over fiber optic cables. GBIC (Gigabit Interface Converter) is another type of transceiver that allows for the connection of fiber optic cables to switches. Both standards provide a reliable and efficient way to establish an uplink between switches using fiber optic technology.

Submit
94. A company's wireless network is configured with a single WAP. The number of wireless devices supported has increased rapidly since the company implemented a BYOD policy. Users complain about lagging performance, difficulty connecting, and randomly being kicked off the network. What is the most likely problem?

Explanation

The most likely problem in this scenario is overcapacity. The company's wireless network is configured with a single WAP (Wireless Access Point), but the number of wireless devices supported has increased rapidly due to the implementation of a BYOD (Bring Your Own Device) policy. This means that the network is being overloaded with too many devices trying to connect at the same time, leading to lagging performance, difficulty connecting, and users being randomly kicked off the network.

Submit
95. In-house technicians plan to emulate a penetration attempt. They want to see if they can learn what services are running on network servers. What should they use?

Explanation

In order to learn what services are running on network servers, the in-house technicians should use port scanning. Port scanning involves scanning a range of ports on a network to determine which ports are open and what services are running on those ports. This allows the technicians to identify potential vulnerabilities and assess the security of the network. Packet analysis involves examining the contents of network packets, vulnerability scanning involves scanning for known security vulnerabilities, and traffic analysis involves analyzing network traffic patterns.

Submit
96. A company replaces its video surveillance cameras with PoE video cameras. The network is wired with Cat 5e UTP cable. What type of connector is used to connect the cameras to the network?

Explanation

The correct answer is RJ-45. RJ-45 connectors are commonly used for Ethernet connections, including PoE (Power over Ethernet) connections. These connectors have 8 pins and are designed to fit into an RJ-45 jack, which is the standard for network connections. Cat 5e UTP cable is also commonly used for Ethernet connections, making RJ-45 the appropriate connector for connecting the cameras to the network. RJ-11 connectors, on the other hand, are typically used for telephone connections and have fewer pins than RJ-45 connectors. LC and DB-9 connectors are not commonly used for Ethernet connections.

Submit
97. A server on the internal network is determined to be at risk for potential attack. The Technical Services team is directed to harden the server to minimize this risk. The network supports wired and wireless access. The server is connected through a wired connection. The computer is backed up to a network location once a week, over the weekend. The computer is rebooted after the backup. Which two actions should hardening include? (Choose two)

Explanation

The server is at risk for potential attack, so hardening measures need to be taken to minimize this risk. Two actions that should be included in the hardening process are disabling unused ports and bringing patches up-to-date. Disabling unused ports helps to prevent unauthorized access through those ports, reducing the attack surface. Bringing patches up-to-date ensures that any known vulnerabilities in the server's software are patched, reducing the risk of exploitation.

Submit
98. A consultant is helping set up an office in a remote rural area. The office needs a high bandwidth WAN link with the main office, which is located several hundred miles away. Which type of transmission medium should the consultant recommend?

Explanation

The consultant should recommend a satellite transmission medium for the office in the remote rural area. Since the main office is located several hundred miles away, satellite communication can provide a high bandwidth WAN link without the need for physical cables or infrastructure. Satellite transmission allows for long-distance communication and is often used in remote areas where other transmission mediums may not be feasible or cost-effective.

Submit
99. Spare parts and other pieces of equipment are kept in a locked cage.There are internal security devices that set off alarms when triggered. People authorized to enter the area need to be able to remotely disable and enable the alarms from outside the cage as needed. What should the company use?

Explanation

The company should use a key fob. A key fob is a small device that can be easily carried and used to remotely control access to a locked cage. It allows authorized personnel to disable and enable the alarms from outside the cage as needed. This provides convenience and flexibility in managing the security of the spare parts and equipment. Smart cards, asset tags, and ID badges are not specifically designed for remote access control and may not be suitable for this purpose.

Submit
100. A technician has configured a new SSID on an AP using the 5GHz frequency. he has connected to it with a mobile phone. A test laptop is unable to show the new SSID in the list of available networks. what would be the MOST likely reason for that?

Explanation

The most likely reason for the test laptop being unable to show the new SSID in the list of available networks is that the laptop has a single-band wireless card. The 5GHz frequency is not supported by single-band wireless cards, which typically only support the 2.4GHz frequency. Therefore, the laptop is unable to detect the SSID being broadcasted on the 5GHz frequency by the AP.

Submit
101. What if the purpose of each protocol?
Submit
102. A technician has established a plan of action to resolve a problem on a network switch. The solution has been tested in a lab environment, and the technician has a list of commands to execute. After logging into the device, he realizes that the TACACS server blocks the commands he has to implement. What should the technician do?

Explanation

The technician should assign the task to another person or department because the TACACS server is blocking the commands that need to be implemented. This means that the technician does not have the necessary permissions or access to execute the commands. By assigning the task to someone else who has the appropriate permissions or access, the problem can be resolved without further issues.

Submit
103. A company runs call center services with 25 agents. Agents report that their softphones have random quality issues. Which performance parameter should be verified in the network?

Explanation

In a call center environment, it is crucial to ensure that there is minimal delay in the network to provide a smooth and efficient communication experience for both the agents and the customers. A delay of more than 150 ms can result in noticeable disruptions and hinder effective communication. Therefore, verifying the maximum delay of 150 ms in the network is important to address the random quality issues reported by the agents.

Submit
104. Which type of attack is primarily used to compromise user passwords?

Explanation

Brute force attacks are primarily used to compromise user passwords. In a brute force attack, the attacker systematically tries all possible combinations of passwords until the correct one is found. This method is time-consuming but can be effective, especially if the password is weak or easily guessable. Spoofing, ransomware, and phishing are different types of attacks that may be used for other purposes, such as impersonating a trusted entity, encrypting files for ransom, or tricking users into revealing sensitive information, respectively.

Submit
105. What type of attack is designed to flood a server with traffic, either crashing the server or making it unavailable?

Explanation

A DoS (Denial of Service) attack is designed to flood a server with excessive traffic, overwhelming its resources and causing it to crash or become unavailable to legitimate users. This type of attack is often carried out by sending a large number of requests to the server, consuming its bandwidth and processing power. Unlike ransomware, which encrypts files and demands a ransom, a DoS attack aims to disrupt the server's functionality rather than gain financial benefit. Brute force and logic bomb attacks are different types of cyber threats that target vulnerabilities in systems or networks through different methods.

Submit
106. The threat of flooding causes a company to move large vertical filing cabinets from the basement to the main office area. Users start complaining of problems connecting to the WLAN and delayed response from the network. network analysis shows a high level of corrupted packets. What is the most likely cause?

Explanation

The most likely cause of the network issues is reflection. When the filing cabinets were moved from the basement to the main office area, it is possible that they caused reflections of the wireless signals. Reflection occurs when wireless signals bounce off surfaces and create interference. This interference can lead to corrupted packets and problems connecting to the WLAN, resulting in delayed responses from the network.

Submit
107. A company has a Synamic Host Configuration Protocol (DHCP) server with all of the dubnet addresses specified as an IP address scope. The company deploys a new physical server as a database server in the 192.168.4.0/24 subnet. Application that use the database server require the server to always the same IP address. Company policy forbids the use of static addressing. What should the company do to set addressing for the database server?

Explanation

To ensure that the database server always has the same IP address, the company should configure an IP address reservation. This involves assigning a specific IP address to the MAC address of the database server in the DHCP server's configuration. By doing so, whenever the database server requests an IP address from the DHCP server, it will always be assigned the reserved IP address. This allows the server to have a consistent IP address without violating the company's policy against using static addressing.

Submit
108. Match the WAN technology with its characteristics.
Submit
109. A company needs to tighten its network security. This includes restricting access based on operating system and version, current patch versions, and antimalware updates. Devices falling to meet access requirements should be quarantined, user access restricted, and automated remediation initiated. What should the company implement?

Explanation

The company should implement NAC (Network Access Control). NAC allows the company to restrict access to the network based on various factors such as operating system and version, patch versions, and antimalware updates. It also allows for quarantining devices that do not meet the access requirements, restricting user access, and initiating automated remediation processes. NAC is an effective solution for tightening network security by ensuring that only compliant devices can access the network.

Submit
110. A company is replacing a portion of its wired LAN with a wireless LAN configured for Wi-Fi Protected Access II (WPA2). The company needs to use the most secure encryption protocol for WPA2.  Which protocol should the company implement?

Explanation

The company should implement the CCMP-AES protocol for WPA2. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the encryption protocol used in WPA2 to provide data confidentiality, integrity, and authentication. AES (Advanced Encryption Standard) is the encryption algorithm used by CCMP, which is considered highly secure and widely used in various applications. Therefore, implementing CCMP-AES will ensure the most secure encryption for the company's wireless LAN.

Submit
111. An office is configured with APs as shown in the exhibit. The office was originally configured with AP1 only, but the users farthest from the AP had problems connecting. There were also intermittent problems with bandwidth saturation. After installing AP2, users near the center of the office have trouble connecting and communicating and are experiencing latency problems. What should technicians do to correct the problem?

Explanation

The correct answer is to change AP2 to channel 6. This is because the users near the center of the office are experiencing latency problems, which could be caused by interference between AP1 and AP2. By changing AP2 to channel 6, it will be on a different frequency and reduce the interference, improving connectivity and communication for the users near the center of the office.

Submit
112. One of a company's office areas is shown in the exhibit. The shaded area shows where devices can get a reliable connection with the acces point (AP). Devices in the unshaded are are either unable to connect to the AP of have a weak connection. the company plans to deploy a wireless range extender. Where should the company depoly he wireless range extender? 

Explanation

Based on the information provided, the shaded area represents the area where devices can get a reliable connection with the access point. Since the company plans to deploy a wireless range extender, it should be placed in an area where devices currently have a weak connection or are unable to connect to the access point. Therefore, the company should deploy the wireless range extender at Location B, as it is the only location outside the shaded area, indicating that devices in that area have a weak or no connection.

Submit
113. A company wants to deploy a web server in a new DMZ. Which device should the company configure a new network zone and Layer 7 filtering policies?

Explanation

A firewall should be configured in a new network zone and Layer 7 filtering policies for deploying a web server in a new DMZ. A firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. By configuring a firewall with Layer 7 filtering policies, the company can ensure that only the desired web traffic is allowed through the firewall, providing an additional layer of security for the web server in the DMZ.

Submit
114. What is the purpose of which protocol?
Submit
115. A computer hosts three virtual machines (VMs) that are used as virtual servers and an internal virtual switch. The Technical Services department needs to configure the virtual servers to give them access to a physical server deployed on the company LAN but not directly expose the servers to the physical network. What should they do?

Explanation

The Technical Services department needs to configure the virtual servers to have access to a physical server on the LAN without exposing them directly to the physical network. The most appropriate solution for this scenario is to configure a virtual firewall on the host. By doing so, the virtual firewall can act as a barrier between the virtual servers and the physical network, allowing the servers to access the physical server while still maintaining security and isolation. Reconfiguring the virtual switch as a private switch or an external switch may not provide the necessary level of protection, and virtual network teaming is unrelated to this specific requirement.

Submit
116. Which device uses the LWAPP and CAPWAP protocols for communication?

Explanation

The correct answer is WLC because LWAPP (Lightweight Access Point Protocol) and CAPWAP (Control and Provisioning of Wireless Access Points) are protocols used for communication between wireless access points and wireless LAN controllers (WLCs). WLCs are responsible for managing and controlling the access points in a wireless network, making them the device that uses these protocols.

Submit
117. What are two main differences between a hub and a switch? (Choose two.)

Explanation

The first difference between a hub and a switch is that hubs work at Layer 1 of the OSI model, while switches work at Layer 2. Layer 1 is the physical layer, dealing with the physical transmission of data, while Layer 2 is the data link layer, responsible for addressing and error detection. The second difference is that hubs do not understand MAC addresses, while switches maintain a CAM (Content Addressable Memory) address table. MAC addresses are used to identify devices on a network, and switches use this information to forward packets to the correct destination.

Submit
118. A company's wireless LAN is configured with three access points configured as follows: Ap1:  *SSID: CompAP *Channel: 1 *Security: WPA2-PSK  AP2: * SSID: CompAP * Channel: 6 * Security: WPA2-PSK AP3: * SSID: CompAP *Channel: 11 *Security: WPA2-PSK A user is moved to a cubicle in a different part of the office building. the user is prompted for a passphrase when attempting to connect to any wireless device to the network. Why is this happening?

Explanation

The user is prompted for a passphrase when attempting to connect to any wireless device because they are connecting to an access point (AP) with a different passphrase. The APs in the company's wireless LAN have different SSIDs, channels, and security settings, including different passphrases. Since the user has moved to a different part of the office building, they are likely within range of a different AP that has a different passphrase configured. As a result, the user is prompted to enter the correct passphrase in order to connect to the network.

Submit
119. A company has ordered the cable shown in the exhibit. Which of the following WAN technologies would MOST likely be deployed?

Explanation

LTE (Long-Term Evolution) is the most likely WAN technology to be deployed based on the given information. LTE is a wireless broadband technology that provides high-speed internet access over cellular networks. It is commonly used for mobile devices and can also be used as a primary or backup internet connection for businesses. Since the exhibit does not provide any information about existing infrastructure or connectivity options, LTE would be the most suitable choice as it offers flexibility and scalability without relying on existing cables or lines.

Submit
120. Match the WAN technology with its characteristics. 
Submit
121. Match network with their descriptions.
Submit
122. A company needs to support a secure link for remote users to a web-aware application that is deployed on a server in a perimeter network. The Technical Services department recommends using an SSL VPN to minimize the configuration changes needed in netwrk firewalls. The solution will use certificate-based authentication. What is the minimum certificate requirement for this configuration?

Explanation

The minimum certificate requirement for this configuration is a server-side certificate only. This means that only the server needs to have a certificate for authentication purposes. The client does not require a certificate to establish a secure link with the server. This configuration allows for secure communication between remote users and the web-aware application without the need for extensive configuration changes in network firewalls.

Submit
123. Users report problems connecting to a server. An on-site technician suspects a physical fault with a fiber patch cord. which tool should the technician use to confirm that?

Explanation

The on-site technician should use an OTDR (Optical Time Domain Reflectometer) to confirm if there is a physical fault with the fiber patch cord. An OTDR is a specialized tool that uses light pulses to analyze the optical fiber and detect any breaks, bends, or other faults in the fiber. It can measure the length of the fiber, locate the exact location of the fault, and provide information about the loss of signal strength. This makes it an ideal tool for troubleshooting and diagnosing physical issues in fiber optic connections.

Submit
124. Which two attack types are examples of social engineering attacks? (Choose two.)

Explanation

Phishing and tailgating are both examples of social engineering attacks. Phishing involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity through email or other communication channels. Tailgating, on the other hand, involves unauthorized individuals gaining physical access to secure areas by following closely behind an authorized person. Both attacks exploit human vulnerabilities rather than technical vulnerabilities to gain unauthorized access or information.

Submit
125. A network administrator has been tasked with deploying a new wireless LAN controller. Which protocol is recommended for integrity checking and encryption?

Explanation

AES-based CCMP is recommended for integrity checking and encryption in a wireless LAN controller deployment. AES (Advanced Encryption Standard) is a widely used encryption algorithm that provides strong security. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is a mode of operation for AES that ensures data integrity by using a message authentication code. Therefore, AES-based CCMP is the recommended protocol for both integrity checking and encryption in this scenario.

Submit
126. Technicians want to test a series of patches before applying them on multiple servers.The test server is moved to a private LAN. Technicians need a way to quickly return the test server to its state immediately before the patches are installed in case there are any problems. What should technicians do first to prepare for the test?

Explanation

To prepare for the test, technicians should run a full backup of the test server. This will create a copy of the server's current state, allowing technicians to easily restore it if any problems occur during the patching process. Running a backup ensures that all data and configurations are saved, providing a safety net for the technicians to revert back to the previous state if needed.

Submit
127. A service technician tests and confirms a theory for the probable cause of a problem. What should the technician do next?

Explanation

After testing and confirming a theory for the probable cause of a problem, the technician should create a plan of action. This is important because it allows the technician to outline the necessary steps and resources needed to address and resolve the problem effectively. By creating a plan of action, the technician can ensure a systematic and organized approach towards implementing a solution, which increases the likelihood of successfully resolving the problem.

Submit
128. The host shown in the exhibit is unable to communicate with other hosts. This is a recent problem. Each subnet has a subnet mask of 255.255.255.0 The technical team needs to determine whether the TCP/IP protocol stack loaded and whether the computer's NIC is working. Which command should they run?

Explanation

The technical team should run the "ping 127.0.0.1" command to determine whether the TCP/IP protocol stack loaded and whether the computer's NIC is working. The IP address 127.0.0.1 is the loopback address, which allows a host to send network packets to itself. By pinging this address, the team can test whether the network stack is functioning correctly on the local machine. If the ping is successful, it indicates that the TCP/IP protocol stack is loaded and the NIC is working properly.

Submit
129. Based on SANS Institute recommendation. In what order should incident response phases be carried out?

Explanation

The incident response phases should be carried out in the following order: Preparation, Identification, Containment, Investigation, Eradication, Recovery, and Lessons learned. This order ensures that the necessary preparations are made before an incident occurs, followed by identifying the incident, containing it to prevent further damage, investigating the incident to understand its cause and impact, eradicating the incident to remove any traces or vulnerabilities, recovering the affected systems and data, and finally, learning from the incident to improve future incident response efforts.

Submit
130. What is the logical topology of a network wired with multilayer switches? 

Explanation

The logical topology of a network wired with multilayer switches is a star. In a star topology, all devices are connected to a central switch, which acts as a hub for communication. This allows for efficient and centralized management of the network, as well as easy troubleshooting and scalability. Each device has its own dedicated connection to the switch, ensuring that the failure of one device does not affect the rest of the network.

Submit
131. A device shows no NIC activity when the NIC is connected using a new patch cord. An on-site engineer suspects an incorrect type of cable analyzer to test the network cable. The report is shown in the exhibit. Which devices could the engineer connect using that cable?

Explanation

The cable analyzer report shows that the cable is a straight-through cable, which is typically used to connect different types of devices, such as a router and a terminal server. This type of cable is not used to connect devices of the same type, such as a router to a router. Therefore, the engineer could connect a router to a terminal server using the cable.

Submit
132. A company wants to run some additional cables to connect two floors. There is a rack on each floor with a dedicated switch. The solution has to support gigabit file transfers while minimizing the cost. What three things will the technicians need to use? (Choose three.)

Explanation

To support gigabit file transfers while minimizing cost, the technicians will need to use a patch panel, Cat 6 cable, and a punch down tool. A patch panel is necessary to organize and connect the cables between the switches and the devices. Cat 6 cable is capable of transmitting data at gigabit speeds and is more cost-effective than fiber optic cable. The punch down tool is required to terminate and secure the cables onto the patch panel and switches. Media converters and fiber optic cables are not necessary in this scenario as the switches are already in place on each floor.

Submit
133. An ISP has installed a DWDM device at a new location. What would be the MOST likely reason for that?

Explanation

The most likely reason for installing a DWDM device at a new location is to solve the fiber exhaust problem. DWDM (Dense Wavelength Division Multiplexing) technology allows for the transmission of multiple signals over a single fiber optic cable by using different wavelengths of light. By implementing DWDM, the ISP can increase the capacity and efficiency of their network, alleviating the issue of fiber exhaust, which occurs when the available fiber capacity is fully utilized. This solution enables the ISP to meet the growing demands for data transmission without the need for additional physical fiber installations.

Submit
134. The nslookup command fails and shows the error in the exhibit. What should the support team create to fix the problem? 

Explanation

The support team should create a reverse lookup zone. The error indicates a missing Pointer (PTR) record PTR records resolve IP addresses to fully-Qualified domain names (FQDN). The team should create a reverse lookup zone on a domain name system (DNS) server and verify the PTR records.

Submit
135. A company has deployed a new Microsoft Windows server behind a firewall. A system administrator has been experiencing problems querying and modifying items in Active Directory from a remote location using an LDAP-based application. Which protocol should be allowed through the firewall?

Explanation

The correct answer is TCP port 636. This is because TCP port 636 is used for secure LDAP (LDAPS) communication, which is necessary for querying and modifying items in Active Directory from a remote location. LDAPS uses SSL/TLS encryption to secure the communication, making it suitable for transmitting sensitive information. Allowing TCP port 636 through the firewall will ensure that the LDAP-based application can establish a secure connection with the Windows server.

Submit
136. A company needs to improve security in its offices. Employees should have to prove their identity when entering the building, and visitors should be detained in the lobby until an escort can be arranged. Which two aspects of physical security should the company use?

Explanation

The company should use a security guard to monitor and control access to the building, ensuring that only authorized personnel are allowed in. Additionally, the company should use a photo ID badge system to require employees to prove their identity when entering the building. This will help to prevent unauthorized access and enhance the overall security of the offices.

Submit
137. A junior network engineer receives a new router to configure. Which two configuration tasks should the engineer perform BEFORE he copies a standard configuration template onto the router? (Choose two)

Explanation

Before copying a standard configuration template onto the new router, the junior network engineer should perform two configuration tasks. Firstly, updating the firmware is necessary to ensure that the router has the latest software version, which may include bug fixes and security patches. Secondly, changing the default username and password is crucial for enhancing security and preventing unauthorized access to the router. These two tasks should be completed before applying the configuration template to ensure the router is up to date and protected.

Submit
138. A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:
  • Users authentication with a user ID and password.
  • all communication between the server and client is encrypted.
  • Open ports on the perimeter firewall are kept to a minimum.
  • No certificate is required at the server or client.
What should the company select as a solution?

Explanation

SFTP (Secure File Transfer Protocol) should be selected as the solution because it meets all the specific requirements mentioned. SFTP allows users to authenticate with a user ID and password, ensures that all communication between the server and client is encrypted, and does not require any certificates at the server or client. Additionally, SFTP helps in keeping the open ports on the perimeter firewall to a minimum, making it the most suitable choice for the given scenario.

Submit
139. A technician needs to execute command-line management commands on a Linux server located in a remote office. The technician should be required to log on at the server. All communication should be encrypted. What should the technician use?

Explanation

The technician should use SSH (Secure Shell) to execute command-line management commands on the Linux server located in a remote office. SSH provides a secure and encrypted communication channel, ensuring that all data transmitted between the technician's computer and the server is protected from eavesdropping and tampering. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access, not specifically for command-line management. Telnet, on the other hand, does not provide encryption, making it insecure for remote access.

Submit
140. A company deploys a host as shown in the exhibit. The host needs to be configured with a static address. What values should be used to configure the host?
Submit
141. Users complain about intermittent connection issues with file server. A junior technician has gathered all information and determined that no changes have been made in the network. What should the technician do next?

Explanation

The technician should use the OSI model to establish a theory of probable cause. This means that the technician should analyze the different layers of the OSI model (physical, data link, network, transport, session, presentation, and application) to identify any potential issues or failures that could be causing the intermittent connection issues with the file server. By systematically analyzing each layer, the technician can narrow down the possible causes and develop a theory of what might be causing the problem. This will help in troubleshooting and finding a solution to fix the issue.

Submit
142. A company wants to open a new office. A wireless survey reveals that there are 12 access points in the area immediately around the office and that they use channels 1, 6, 11. What should the company do to address the interference problem?

Explanation

The company should use the 5GHz band to address the interference problem. This is because channels 1, 6, and 11 are commonly used in the 2.4GHz band, and having 12 access points using these channels can cause interference. By using the 5GHz band, the company can avoid the congestion and interference in the 2.4GHz band, as it offers more available channels and less interference from other devices.

Submit
143. A network engineer prepares a network diagram for a small company. The design should support routing hardware, wireless access, and edge protection with advances stateful packet inspection (SPI). What should the engineer install?
Submit
144. A company subscribes all of its offices to a local MAN. The MAN uses a single-mode fiber backbone. The company needs to connect its offices to the backbone. Each office has a wired router with a firewall, a 10/100/1000 switch, and is wired with UTP cable. Each office has a wireless access point connected to the switch. Which device should the company use to connect to the MAN?

Explanation

The company should use a media converter to connect to the MAN. A media converter is used to convert the signal from UTP cable to single-mode fiber, which is the backbone used by the MAN. Since each office has a wired router with a firewall and a 10/100/1000 switch, the media converter will allow them to connect their existing equipment to the single-mode fiber backbone.

Submit
145. What is the first step when troubleshooting a network problem?

Explanation

The first step when troubleshooting a network problem is to identify the problem. This involves gathering information, observing the symptoms, and understanding the nature of the issue. By identifying the problem, you can then proceed to analyze and diagnose the root cause, allowing you to develop an effective plan of action to resolve the network problem.

Submit
146. A company has two access points, as shown in the exhibit. Users report intermittent access issues. What could the company do to fix the problem? (Choose two.)

Explanation

To fix the intermittent access issues, the company can change to 5Ghz, which is less crowded and provides better performance compared to the 2.4Ghz frequency. Additionally, assigning AP1 to channel 11 can help reduce interference and improve connectivity as it selects a less congested channel for communication.

Submit
147. A company is deploying a web farm to host a publicly available website. the company network is configured as shown in the exhibit. The company wants to make the website available but limit the exposure of the internal network to the Internet. The solution needs to support secure access to the website.  What should the company implement?

Explanation

The company should implement a DMZ (Demilitarized Zone). A DMZ is a separate network segment that sits between the internal network and the external Internet network. It is used to host publicly available services, such as a website, while limiting the exposure of the internal network. By placing the website in the DMZ, the company can provide secure access to the website while protecting the internal network from potential attacks or unauthorized access.

Submit
148. Which statement BEST describes a warm backup recovery site?

Explanation

A warm backup recovery site refers to a site that has computer equipment, network hardware, and data communication installed and configured. However, it does not have recent backups of corporate data. This means that in the event of a disaster, the site can quickly resume operations using the existing infrastructure, but it may not have the most up-to-date data.

Submit
149. Which device should a company use to configure a new area within OSPf?

Explanation

A router should be used to configure a new area within OSPf because routers are networking devices that connect different networks together and can route traffic between them. OSPf (Open Shortest Path First) is a routing protocol used for dynamic routing within a network. By using a router, the company can configure and manage the OSPf protocol to create and control different areas within the network, allowing for efficient and optimized routing of traffic.

Submit
150. A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data. Which type of attack does this scenario describe?

Explanation

This scenario describes a ransomware attack. Ransomware is a type of malware that encrypts the victim's data and demands a ransom payment in exchange for a decryption key. In this case, the malware has encrypted the data on a critical network server and displays a dialog box with instructions on how to pay for a recovery code to decrypt the server data. This aligns with the characteristics of a ransomware attack.

Submit
151. The network technical team needs to configure two network connections working in parallel between a server and a switch to improve available bandwidth. The switch is already configured to support the communication.  What should the team configure on the server?

Explanation

The network technical team should configure NIC teaming on the server. NIC teaming allows multiple network interface cards (NICs) to be grouped together to form a single logical interface. This enables parallel network connections between the server and the switch, improving available bandwidth. NIC teaming also provides fault tolerance, as if one NIC fails, the other NICs in the team can continue to handle network traffic.

Submit
152. Which DNS resource record type is used to identify and locate web servers in a network?

Explanation

The correct answer is SRV. The SRV (Service) record is used to identify and locate specific services within a domain. It is commonly used to locate web servers in a network by providing information about the server's domain name, port number, and protocol. This allows clients to easily find and connect to the appropriate web server for a given service.

Submit
153. Network devices in one area of the office building experience communication problems. A cable tester shows that the signal on the RX pair is lower than expected. What is this an indication of?

Explanation

Attenuation refers to the loss of signal strength as it travels through a medium, such as a cable. In this scenario, the lower signal on the RX pair indicates that the signal is being weakened or attenuated. This could be caused by various factors, such as long cable lengths, poor cable quality, or interference. It suggests that the network devices in that area of the office building are experiencing communication problems due to the weakened signal.

Submit
154. A company has its own comms rooms and an on-premises data center containing all its servers and network devices. A network engineer wants to add some cloud on-demand solutions to the existing infrastructure. Which cloud model should the company use?

Explanation

The company should use the hybrid cloud model. This is because the company already has its own on-premises infrastructure, but wants to add cloud on-demand solutions. A hybrid cloud model allows the company to integrate their existing infrastructure with cloud services, giving them the flexibility to choose which workloads and data they want to keep on-premises and which they want to move to the cloud. This model provides a balance between security, control, and scalability, making it a suitable choice for the company in this scenario.

Submit
155. A company needs to deploy network devices that support configuration of multiple VLANs and the ability to route traffic between the VLANs. Which type of device should the company use?

Explanation

A multilayer switch is the best choice for the company because it supports the configuration of multiple VLANs and can route traffic between them. Unlike a UTM appliance, which is primarily used for network security, or a proxy server, which is used for forwarding client requests, a multilayer switch has the capability to handle both VLAN configuration and routing tasks efficiently. An NGFW (Next-Generation Firewall) may have some routing capabilities but may not be as effective as a dedicated multilayer switch in managing VLANs and routing traffic between them.

Submit
156. What type of physical security device lets a company locate devices that have been moved to a new location?

Explanation

Asset tracking tags are physical security devices that allow a company to locate devices that have been moved to a new location. These tags are attached to the devices and use various technologies like GPS, RFID, or Bluetooth to track their location. By using asset tracking tags, companies can keep track of their valuable assets, prevent loss or theft, and quickly locate devices that have been moved without authorization.

Submit
157. A company collects network traffic data from multiple subnets. Detailed analysis indicates that packets are being dropped by on of the routers. Technicians suspect this is due to misconfigured firewall ACLs. Where should technicians look for more detailed information?

Explanation

Technicians should look for more detailed information in the firewall logs. Firewall logs record all the traffic that passes through the firewall, including any dropped packets. By analyzing the firewall logs, technicians can identify any misconfigured firewall ACLs that may be causing the packets to be dropped. The firewall logs provide a detailed record of the network traffic and can help pinpoint the exact cause of the issue.

Submit
158. Users report they cannot access any resources on the Internet using an FTP client. It is determined that the connections have been denied by the firewall. All hosts from the local subnet of 192.168.1/25 should have access. Which ACL rule should the company implement? 

Explanation

The correct answer is to implement an outbound rule that permits hosts from the local subnet of 192.168.1/25 to access any hosts on TCP ports 20 and 21. Since the users are reporting that they cannot access any resources on the Internet using an FTP client, it indicates that the FTP traffic is being blocked by the firewall. By allowing outbound access on TCP ports 20 and 21 for the specified subnet, the users will be able to establish FTP connections and access resources on the Internet.

Submit
159. Compare characteristics of NAS and SAN storage technologies. To answer, choose the appropriate storage type from the drop-down menus.
Submit
160. A network consultant determines that company can improve its performance by implementing jumbo frames. The network is configured with 10/100/1000 switches, and all hosts are configured with Gigabit Ethernet network adapters. The network si wired with Cat 5e UTP cable. What must the company do to support jumbo frames?

Explanation

To support jumbo frames, the company needs to increase the Maximum Transmission Unit (MTU) to 9000. Jumbo frames are larger than the standard Ethernet frame size, allowing for more data to be transmitted in a single frame. By increasing the MTU to 9000, the network can accommodate these larger frames. The other options, such as enabling STP on all switches, replacing the cable with Cat 6 UTP cable, or configuring switch ports in dynamic auto mode, are not directly related to supporting jumbo frames.

Submit
161. A network administrator has captured the following messages on the firewall: 10.10.10.64391 > 188.12.1.1:80 188.12.1.1:80 > 10.10.10.64391 10.10.10.10.64392 > 83.122.1.1:80 Which application has most likely generated that traffic?

Explanation

Based on the given messages, the traffic is using the HTTP protocol (port 80), which is commonly used by web browsers to communicate with web servers. Therefore, the most likely application that generated this traffic is a web browser.

Submit
162. A company has several employees who work from home at least part of the time. A data analysis application is used extensively in the company office, but employees are not authorized to copy the application and use it from their homes. What type of policy does this demonstrate?

Explanation

This question is asking about the type of policy that is demonstrated by the given scenario. The scenario states that employees are not authorized to copy the data analysis application and use it from their homes. This indicates that the company has a policy in place regarding the licensing of software. Software licensing policies typically restrict the unauthorized copying and use of software, which is exactly what is described in the scenario. Therefore, the correct answer is Software licensing.

Submit
163. Part of a company's network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses. Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP addresses. Computers on other subnets are not experiencing this problem. What is the most likely cause?

Explanation

The most likely cause for the issue is that Port 53 is blocked on the 192.168.1.1 interface. Port 53 is the standard port used for DNS (Domain Name System) communication. Since the client computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets, it suggests that the DNS requests are not being properly forwarded or allowed through the 192.168.1.1 interface. By unblocking Port 53 on this interface, the DNS communication can be restored, allowing the client computers to resolve host names in other subnets.

Submit
164. A company wants to deploy a new WLAN topology without running a new electrical wiring. The solution has to support the 5 Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power fro a connected device. Which two components should be used? (Choose two.)

Explanation

The company wants to deploy a new WLAN topology without running new electrical wiring, so a Power over Ethernet (PoE) solution is needed. The PoE solution should provide at least 25W of power for a connected device. Therefore, a switch supporting the 802.3at standard should be used as it provides higher power output compared to the 802.3af standard. Additionally, an access point supporting the 802.11ac Wave 2 standard should be used to support the 5 Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps.

Submit
165. Users report that message about duplicate IP addresses keep displaying on their computers. What should technicians suspect as a cause?

Explanation

Technicians should suspect a rogue DHCP server as the cause for the message about duplicate IP addresses. A rogue DHCP server refers to an unauthorized DHCP server that is providing incorrect or conflicting IP addresses to network devices. This can lead to multiple devices on the network having the same IP address, causing the duplicate IP address message to appear. By identifying and removing the rogue DHCP server, technicians can resolve the issue and prevent further conflicts on the network.

Submit
166. A company wants to deploy a new WLAN topology without running new electrical wiring. The solution has to support the 5Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power for a connected device. Which two components should be used? (Choose two)

Explanation

The 802.3at standard is also known as PoE+ and provides up to 25W of power, which meets the company's requirement of at least 25W of power for a connected device. An access point supporting the 802.11ac Wave 2 standard offers speeds of at least 2100 Mbps, fulfilling the company's speed requirement. Therefore, using a switch supporting the 802.3at standard and an access point supporting the 802.11ac Wave 2 standard would meet all the specified requirements for the new WLAN topology.

Submit
167. Which metric is used to determine routes when using RIP?

Explanation

RIP (Routing Information Protocol) uses hop count as the metric to determine routes. Hop count refers to the number of routers or hops that a packet must traverse to reach its destination. In RIP, each router in the network adds 1 to the hop count value before forwarding the packet. By comparing the hop counts of different routes, RIP selects the route with the lowest hop count as the best path. This metric assumes that fewer hops generally indicate a shorter and more efficient path to the destination.

Submit
168. The project team purchases an 8-port Layer 2 switch, a router, and an 8-port network hub. The router has two WAN Interfaces: F0/0 and F0/1. A network engineer connects the switch to port F0/0 and the hub to port F0/1 on the router. How many collision and broadcast domains are available in this network? (Choose two.)

Explanation

In this network setup, the switch and the hub are connected to different ports on the router. The switch is connected to port F0/0, while the hub is connected to port F0/1.

A collision domain is a network segment where network devices share the same bandwidth and can potentially collide with each other while transmitting data. Since the switch is connected to the router, it creates one collision domain. The hub, on the other hand, is a multiport repeater, meaning that all devices connected to it share the same collision domain. As there are 8 ports on the hub, it creates 8 collision domains. Therefore, there are a total of 9 collision domains in this network.

A broadcast domain is a network segment where network devices can directly communicate with each other using broadcast messages. In this setup, both the switch and the hub are connected to the router, which acts as a boundary for broadcast messages. Therefore, there are two separate broadcast domains in this network.

Hence, the correct answers are 2 broadcast domains and 9 collision domains.

Submit
169. A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update? (Choose two)

Explanation

The company needs to update the logical network diagram because it shows the overall network layout and how different components are connected, including the addition of the web server and honeypot in the DMZ. The physical network diagram also needs to be updated as it provides a detailed view of the physical infrastructure, such as switches, routers, and cables, and needs to reflect the changes made for the new network design.

Submit
170. What should a company use as an authentication and authorization server for WPA2-Enterprise?

Explanation

A company should use RADIUS as an authentication and authorization server for WPA2-Enterprise because RADIUS (Remote Authentication Dial-In User Service) is a widely used protocol that provides centralized authentication, authorization, and accounting for network access. It allows the company to manage user credentials and control access to the network resources effectively. RADIUS supports a variety of authentication methods, including passwords, digital certificates, and token-based authentication, making it suitable for securing WPA2-Enterprise networks. Additionally, RADIUS integrates well with other networking technologies and can be easily integrated into existing network infrastructure.

Submit
171. A network administrator would change the ID on a switch's native VLAN to mitigate what type of attack?

Explanation

Changing the ID on a switch's native VLAN can help mitigate VLAN hopping attacks. VLAN hopping is a type of attack where an attacker gains unauthorized access to traffic on different VLANs by exploiting the native VLAN, which is often left untagged. By changing the ID on the switch's native VLAN, the network administrator can prevent attackers from hopping between VLANs and accessing sensitive information.

Submit
172. A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company. What should the company use to ensure this? 

Explanation

Standard operating procedures (SOPs) should be used by the company to ensure consistent instructions and management throughout the organization. SOPs are documented guidelines that outline the steps and processes to be followed for various tasks and activities. By implementing SOPs, the organization can ensure that network administration and management practices are consistent across all locations, promoting efficiency and reducing errors. SOPs provide a standardized approach to handling tasks, allowing employees in different locations to follow the same procedures and achieve consistent results.

Submit
173. A company wants to connect a remote office using a satellite Internet service. What should be the main concern for this deployment?

Explanation

The main concern for connecting a remote office using a satellite Internet service should be latency. Latency refers to the delay in data transmission caused by the time it takes for the signal to travel from the satellite to the remote office and back. High latency can result in slower response times and affect real-time communication and applications. Therefore, it is crucial to consider and minimize latency when deploying a satellite Internet service for a remote office.

Submit
174. A consultant is helping a company design a wireless LAN implementation. Network requirements include internal access points for network host connections and external wireless connections between buildings. The consultant needs to help the company choose appropriate antennas. What does the dBi rating of an antenna represent?

Explanation

The dBi rating of an antenna represents its gain and field pattern. A higher dBi antenna has more gain, meaning it can transmit and receive signals over a greater distance. Additionally, a higher dBi antenna has a narrower field pattern, which means it focuses the signal in a more concentrated area. This can be beneficial for long-range connections or for minimizing interference from nearby wireless networks.

Submit
175. A company encounters problems with inappropriate disclosure of company information including forwarding of sensitive emails and transfer of files to offsite locations. The company determines that the actions were inadvertent rather than malicious acts. The company implements an employee training program to raise awareness about data security. Technical Services is asked to put controls in place to help prevent these disclosures from occurring in the future. what should Technical Services use?

Explanation

Technical Services should use DLP (Data Loss Prevention) to help prevent inappropriate disclosure of company information. DLP is a set of tools and technologies that can monitor, detect, and prevent sensitive data from being transmitted outside of the company network. It can identify and block email forwarding, file transfers, and other actions that may lead to data breaches. By implementing DLP, the company can enforce data security policies and prevent inadvertent disclosures in the future.

Submit
176. A company needs to tighten its network security. This includes restricting access based on operating system and version, current patch versions, and antimalware updates. Devices failing to meet access requirements should be quarantined, user access restricted, and automated remediation initiated. What should the company implement?

Explanation

The company should implement NAC (Network Access Control). NAC allows the company to enforce security policies and restrict access to the network based on various factors such as operating system and version, patch versions, and antimalware updates. It provides the ability to quarantine devices that do not meet the access requirements, restrict user access, and initiate automated remediation to address any security issues.

Submit
177. Which protocol is open, a vendor-neutral standard for accessing and maintaining directory services?

Explanation

LDAP stands for Lightweight Directory Access Protocol. It is an open, vendor-neutral standard protocol used for accessing and maintaining directory services. LDAP allows clients to search, modify, and retrieve information from directory servers. It is commonly used for centralized authentication, storing user information, and managing network resources. Unlike other protocols listed, such as SMTP (Simple Mail Transfer Protocol), SNMP (Simple Network Management Protocol), and IMAP (Internet Message Access Protocol), LDAP specifically focuses on directory services.

Submit
178. Which layer of the OSI model are web browsers and email clients implemented at?

Explanation

Web browsers and email clients are implemented at Layer 7 of the OSI model because this layer, also known as the application layer, is responsible for providing network services to user applications. Web browsers and email clients are user applications that rely on network services to access and interact with web pages and email servers respectively. Layer 7 is the highest layer in the OSI model and is closest to the end user.

Submit
179. A company is designing a wireless LAN deployment. To help secure the network., the company wants to use an authentication protocol option that requires a client certificate on each wireless client. Which authentication protocol option should the company use?

Explanation

The company should use the EAP-TLS authentication protocol option. EAP-TLS stands for Extensible Authentication Protocol-Transport Layer Security. It requires a client certificate on each wireless client, providing a higher level of security for the network. This protocol option ensures that only authorized clients with valid certificates can connect to the wireless LAN, reducing the risk of unauthorized access or data breaches.

Submit
180. A team with members from two companies is designing a new product. All members of the product team sign a legally binding document that details what they may and may not discuss outside the project team. What is this an example of?

Explanation

This scenario is an example of a Non-Disclosure Agreement (NDA). An NDA is a legally binding document that outlines what information can and cannot be shared outside of a specific group or project team. In this case, the team members from two different companies are designing a new product, and they have all signed an NDA to ensure that they do not disclose any confidential information about the project to anyone outside of the team.

Submit
181. A network engineer has to order network cables to connect two floors in a new building, The project team has specified the following requirements:
  • Protect the cables from external interference
  • Offer up to 1000 Mbps
  • Be compatible with existing UTP pass-through patch panels
  • Keep the cost to a minimum
Which cables should the network engineer order? 

Explanation

The network engineer should order RJ45 Cat 6 STP cables. These cables offer up to 1000 Mbps, are compatible with existing UTP pass-through patch panels, and provide protection from external interference. Additionally, they meet the requirement of keeping the cost to a minimum.

Submit
182. A company expands its corporate campus. All new buildings are configured to support wireless LANs. the company wants to use WPA2-Enterprise to ensure wireless security and provide for centralized control of authentication and authorization.

Explanation

A RADIUS server is used to provide centralized control of authentication and authorization for wireless LANs. It helps ensure wireless security by allowing the company to use WPA2-Enterprise, which is a strong security protocol. The RADIUS server acts as a central authentication server that verifies the credentials of users before allowing them access to the wireless network. It also provides authorization for specific access privileges based on user roles or policies. Overall, using a RADIUS server helps the company maintain control and security over its wireless LANs in the expanded corporate campus.

Submit
183. A company opens a new call center with 35 agents. the network team is tasked with providing them with LAN and WAN access. The solution must meet the following requirements:
  • Provide fast and reliable connections
  • Limit access to some local network resources
  • Filter access to the Internet
Which three options should the network team implement? (Choose three.)

Explanation

The network team should implement a Proxy group to filter access to the Internet and limit access to local network resources. This will provide fast and reliable connections while also controlling access to specific resources. They should also implement a Firewall ACL to further filter access to the Internet and protect the network from unauthorized access. Finally, implementing a VLAN on a switch will help segregate and secure the network, ensuring that only authorized users have access to specific resources.

Submit
184. A network team prepares a presentation to members of the board. Match the use cases with the most appropriate network devices.
Submit
185. A company has deployed a new access point. A network administrator wants to monitor proactively the number of connected clients and available using a secure protocol. What Layer 7 network protocol should be used?

Explanation

SNMP (Simple Network Management Protocol) should be used to monitor the number of connected clients and available using a secure protocol. SNMP is commonly used for network management and allows administrators to monitor and manage network devices. It operates at the application layer (Layer 7) of the OSI model and provides a secure and efficient way to collect and organize information about network devices. SNMP can be used to monitor various aspects of network devices, including the number of connected clients and available resources.

Submit
186. A company needs to have a reliable record of everyone who enters a locked secure area of the building. What should the company use?

Explanation

A motion detector would be an effective solution for the company to have a reliable record of everyone who enters a locked secure area of the building. It can detect any movement within the area and trigger an alarm or notification, providing a record of when someone enters the area. This can help ensure the security of the area and keep track of who has accessed it.

Submit
187. A NIDS reports several attempts to download files from an external IP address. The Technical Services department determines that the source is a website that is made to look like a site from which network users download reference materials and blank PDF forms. Users enter the correct URL for the website but are being sent to a different address. which type of attack is this?

Explanation

This is a case of DNS poisoning. DNS poisoning refers to the manipulation of the Domain Name System (DNS) to redirect users to a different IP address than the one they intended to visit. In this scenario, users are entering the correct URL for the website, but they are being redirected to a different address, which is a website designed to deceive them. This type of attack can be used to trick users into entering sensitive information on malicious websites or to distribute malware.

Submit
188. A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device, Continuity plans will depend on how frequent the device is likely to fail. Which value should be used to determine this?

Explanation

MTBF stands for Mean Time Between Failures. It is a measure of the reliability of a device or system. MTBF represents the average time between failures of a device, indicating how frequently the device is likely to fail. In the context of business continuity and disaster recovery plans, the company needs to know the reliability of the critical network device to determine how often it may fail and plan accordingly. Therefore, MTBF is the value that should be used to determine the reliability of the device.

Submit
189. Match the following
Submit
190. Match each statement with the appropriated switch port protection.
Submit
191. A technician determines there is a break in the fiber optic cable routed between two buildings. The technician needs to determine the distance to the break.  What should the technician do?

Explanation

The technician should use an OTDR (Optical Time Domain Reflectometer) to determine the distance to the break in the fiber optic cable. An OTDR is a device that sends out a pulse of light into the fiber optic cable and measures the time it takes for the light to reflect back. By analyzing the time and intensity of the reflected light, the technician can determine the location and distance of the break in the cable.

Submit
192. What is the role of an MIB when implementing SNMP for network management?

Explanation

The correct answer is that an MIB (Management Information Base) is a collection of manageable device definitions that identifies device property information. MIBs are used in SNMP (Simple Network Management Protocol) to organize and manage information about devices on a network. They define the structure and properties of managed objects, allowing network administrators to monitor and control network devices. MIBs provide a standardized way to access and manipulate data on network devices, making it easier to manage and troubleshoot network issues.

Submit
193. A company's WLAN is configured with one access point (AP) and named AP1. AP1 has and SSID of AP1, is configured to use channel 1 and is configured for WPA2-PSK.  The company deploys a second AP named AP2 and with an SSID of AP2. The AP is configured to use channel 6 and is configured settings are left at the defaults. Technical Services discovers that someone has been hacking into AP2 and changing configuration settings. After the settings are corrected, they are changed in a few days. How should they implement device hardening to prevent this from occurring?

Explanation

To prevent unauthorized access and configuration changes on AP2, the company should change the default administrator's password on AP2. By doing so, they will ensure that only authorized individuals with the new password can access and make changes to the AP's settings. This will enhance the security of the WLAN and prevent further hacking incidents. Reconfiguring both APs to use WPA2-Enterprise, disabling SSID broadcast, or changing AP2's channel will not directly address the issue of unauthorized access and configuration changes.

Submit
194. A company has remote offices with intermittent WAN connections. Administrators need to be able to connect to and manage network routers even when the WAN connection is unavailable or when the router is minimally operable. Technical personnel are directed to suggest a technology to support an out-of-bounds management plan. What should the technical personnel recommend?

Explanation

A dial-in modem would be the most suitable technology to support an out-of-bounds management plan in this scenario. A dial-in modem allows administrators to remotely connect to and manage network routers even when the WAN connection is unavailable or when the router is minimally operable. This technology provides a reliable and secure way for technical personnel to access and troubleshoot the routers, ensuring continuous management capabilities regardless of the network conditions.

Submit
195. The Technical Services team prepare a drawing to document all network devices with their IP addresses, device names, and connection information. Which type of documentation does this represent?

Explanation

A physical network diagram is a visual representation of the network infrastructure, including devices, connections, and their physical locations. It provides a detailed overview of the network layout, including IP addresses, device names, and connection information. This type of documentation helps in understanding the network architecture and troubleshooting any issues that may arise. It is an essential tool for network administrators to effectively manage and maintain the network infrastructure.

Submit
196. Match network devices with their role in 802.1x port based authentication.
Submit
197. A company wants to deploy an 802.1x standalone wireless access point. Which authentication protocol should be used?

Explanation

The correct answer is RADIUS. RADIUS (Remote Authentication Dial-In User Service) is an authentication protocol commonly used in wireless networks. It provides centralized authentication, authorization, and accounting for users attempting to access the network. In the context of deploying an 802.1x standalone wireless access point, RADIUS would be the appropriate choice to ensure secure and controlled access to the network.

Submit
198. A company wants to support multiple client computers running and application installed on a computer that runs Windows Server 2016. The clients should be able to take advantage of the memory and processor resources on the server. Each client will have a unique data set. Which technology should the company use?

Explanation

The company should use RDP (Remote Desktop Protocol) to support multiple client computers. RDP allows clients to connect to and access a computer remotely, in this case, the computer running Windows Server 2016. RDP enables the clients to utilize the memory and processor resources on the server, making it an ideal choice for this scenario.

Submit
199. A company opens a new warehouse space on its company campus. network wiring for the warehouse is routed through a 110 punch block and patch panel. Wiring out to devices uses Cat 5e UTP cable. Several devices in the warehouse experience communication problems. After extensive testing, the problem is determined to be crosstalk. The company needs to correct the problem. Infrastructure changes should be kept to the minimum. What should the company do?

Explanation

The company should replace the failing cables with Cat 6 cables. Cat 6 cables are an upgraded version of Cat 5e cables and offer better performance in terms of bandwidth and crosstalk reduction. By replacing the failing cables with Cat 6 cables, the company can address the crosstalk issue while minimizing infrastructure changes. Replacing the cables with Cat 5e STP cables or replacing the punchdown block would also be valid options, but Cat 6 cables would provide the best solution for improved communication in the warehouse. Fiber optic cables would be a more expensive and extensive infrastructure change, which is not necessary in this scenario.

Submit
200. The marketing team uses a SaaS service to store raw video files. The team reports slow access to some resources on the SaaS platform. What should the network team do?

Explanation

The marketing team is experiencing slow access to resources on the SaaS platform. Checking the bandwidth would be the appropriate action for the network team to take in this situation. Slow access could be a result of limited bandwidth, which can cause delays in transferring data. By checking the bandwidth, the network team can identify if there are any issues with the network capacity and take necessary steps to address it, such as upgrading the bandwidth or optimizing network traffic. Deploying a SAN network, migrating to a PaaS solution, or verifying the ACL on the firewall may not directly address the slow access issue in this scenario.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 25, 2018
    Quiz Created by
    Myron0576
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A recent network audit has highlighted the security issues on the...
What are smart cards used for in computer networking?
Which policy sets guidelines for allowing employees to use their own...
What should a company use to create a point-to-point bridge between...
Which type of vulnerability would NOT be reported by a vulnerability...
Provides for secure login and remote executions of commands.
A company deploys a new computer. When the cable to the computer is...
While discussing a configuration issue with a switch...
A user complains about the transfer rates from a server in VLAN 4. A...
Which network device uses ASICs to handle the packet switching for...
Which one do you like?
Which two items would be specified as part of an SLA? (Choose two.)
A company is deploying a new company as shown in the exhibit. The...
What is a secure multipoint IP hub-and-spoke WAN configuration that...
A system administrator cannot ping a file server running Windows...
A consultant is setting up a SOHO for a customer. The customer has...
Users report that they have lost access to a network shared drive....
Which Internet of Things (IoT) technology is designed to facilitate...
The network team is tasked with hardening the L2 infrastructure. Which...
A company has configured some services and applications using a PAAS...
A company is setting up a routed network with three subnets. All...
A company is preparing to deploy a wireless LAN (WLAN) in a newly...
Match the following
For redundancy purposes, a network engineer installs a new router and...
Which one do you like?
Which service does an ASP provide to subscribers?
A policy includes the following statement: ...
Protocol providing shared access to files, printers, and serial ports.
Which one do you like?
A company is configuring an internal network with routed subnets based...
Which media access method is used with 802.11 RTS/CTS network...
A company deploys six new computers that are configured for automatic...
The support team has been tasked with creating an alias name for a...
Supports secure communication with websites to protect data privacy...
Which network device uses ASICs to handle the packet switching for...
Provides for audio-visual communication sessions and widely used in...
A sales manager wants to provide a mobile device to all remote...
Against which type of attack is end user training most effective?
A company's network is shown in the exhibit. the DHCP server is...
A security audit highlights some security concerns in a newly...
A company needs a leased line connection supporting the transmission...
A company is expanding its office space. The current space is...
Which protocol provides time synchronization service over the global...
Which mechanism is used by TCP to set up and synchronize a new TCP/IP...
PC1 fails to receive an IP address in the network shown in the...
PC1 and PC2 are connected to a managed switch. PC1 uses port F0/5,...
A company wants to connect devices so that there are many redundant...
Matching the topology types with their descriptions.
A company is wiring a new office space to support 1000BaseT Ethernet....
An office area is prewired with Cat 5e cable. Technicians need to test...
A company is developing several web applications. The company does not...
Which Layer 2 security solution allows a network administrator to...
A medium-sized company is moving into a new office space. The office...
A network engineer has installed three gigabit switches. The switches...
Which of the following is an example of valid authentication factors?
Used to monitor and manage network devices.
A company deployed a new network. The company secures access using...
A company wants to implement an authentication and authorization...
The network team has been tasked with a new project. They need to...
A company has offices on several floors of a building. All connections...
A company must implement additional monitoring and analysis to meet...
What is the last step in a systematic troubleshooting methodology?
A network engineer arrives on -site to install and access point. The...
A network team has deployed a new SIP trunk. What will MOST likely be...
What type of backup takes the least time and uses the least amount of...
A company is installing a large rack-mounted Infrastructure to support...
What is the purpose of on-boarding and off-boarding procedures?
A security engineer installs an SSL certificate and an endpoint...
PC1 is unable to access the Internet in the network shown in the...
A network technician wants to deploy a new virtual firewall. The...
A company's network is shown in the exhibit. PC1 is unable to...
A company recently implemented a bring your own device (BYOD) policy...
A company routes Cat 5e UTP cabling through a part of its...
A company wants to create a site-to-site VPN. maximum security is...
Which one do you like?
A company wants to configure a site-to-site VPN link between two...
A restaurant offers public Wi-Fi access to the Internet for its...
A company expands its corporate campus and builds new facilities for...
Which layer of the OSI model do routers operate at?
A file server deployed on the company perimeter network is used to...
An on-site inspection finds that one fiber optic exceeds the bend...
A company wants to interconnect serveral offices. The solution has to...
Match the network requirements with the network devices that are...
A technician is setting up a SOHO with devices located in different...
A technician configures an access point as shown in the exhibit. He...
The users connected to the network using wireless laptops and report...
Which mechanism is used to elect a root bridge in the network?
A network engineer wants to configure a new standalone access point...
A company network is wired with 10/100/1000 multilayer switches and...
Which command line interface command should a system administrator use...
Which mechanism monitors and manages virtual machine instances?
A technician needs to configure rules for a host-based firewall on a...
A network engineer wants to create an uplink between two switches...
A company's wireless network is configured with a single WAP. The...
In-house technicians plan to emulate a penetration attempt. They want...
A company replaces its video surveillance cameras with PoE video...
A server on the internal network is determined to be at risk for...
A consultant is helping set up an office in a remote rural area. The...
Spare parts and other pieces of equipment are kept in a locked...
A technician has configured a new SSID on an AP using the 5GHz...
What if the purpose of each protocol?
A technician has established a plan of action to resolve a problem on...
A company runs call center services with 25 agents. Agents report that...
Which type of attack is primarily used to compromise user passwords?
What type of attack is designed to flood a server with traffic, either...
The threat of flooding causes a company to move large...
A company has a Synamic Host Configuration Protocol (DHCP) server with...
Match the WAN technology with its characteristics.
A company needs to tighten its network security. This includes...
A company is replacing a portion of its wired LAN with a wireless LAN...
An office is configured with APs as shown in the exhibit. The office...
One of a company's office areas is shown in the exhibit. The...
A company wants to deploy a web server in a new DMZ. Which device...
What is the purpose of which protocol?
A computer hosts three virtual machines (VMs) that are used as virtual...
Which device uses the LWAPP and CAPWAP protocols for communication?
What are two main differences between a hub and a switch? (Choose...
A company's wireless LAN is configured with three access points...
A company has ordered the cable shown in the exhibit. Which of the...
Match the WAN technology with its characteristics. 
Match network with their descriptions.
A company needs to support a secure link for remote users to a...
Users report problems connecting to a server. An on-site technician...
Which two attack types are examples of social engineering attacks?...
A network administrator has been tasked with deploying a new wireless...
Technicians want to test a series of patches before applying them on...
A service technician tests and confirms a theory for the probable...
The host shown in the exhibit is unable to communicate with other...
Based on SANS Institute recommendation. In what order should incident...
What is the logical topology of a network wired with multilayer...
A device shows no NIC activity when the NIC is connected using a new...
A company wants to run some additional cables to connect two floors....
An ISP has installed a DWDM device at a new location. What would be...
The nslookup command fails and shows the error in the exhibit. What...
A company has deployed a new Microsoft Windows server behind a...
A company needs to improve security in its offices. Employees should...
A junior network engineer receives a new router to configure. Which...
A company deploys a server on its perimeter network. The server will...
A technician needs to execute command-line management commands on a...
A company deploys a host as shown in the exhibit. The host needs to be...
Users complain about intermittent connection issues with file server....
A company wants to open a new office. A wireless survey reveals that...
A network engineer prepares a network diagram for a small company. The...
A company subscribes all of its offices to a local MAN. The MAN uses a...
What is the first step when troubleshooting a network problem?
A company has two access points, as shown in the exhibit. Users report...
A company is deploying a web farm to host a publicly available...
Which statement BEST describes a warm backup recovery site?
Which device should a company use to configure a new area within OSPf?
A malware attack encrypts the data on a critical network server. A...
The network technical team needs to configure two network connections...
Which DNS resource record type is used to identify and locate web...
Network devices in one area of the office building experience...
A company has its own comms rooms and an on-premises data center...
A company needs to deploy network devices that support configuration...
What type of physical security device lets a company locate devices...
A company collects network traffic data from multiple subnets....
Users report they cannot access any resources on the Internet using an...
Compare characteristics of NAS and SAN storage technologies. To...
A network consultant determines that company can improve its...
A network administrator has captured the following messages on the...
A company has several employees who work from home at least part of...
Part of a company's network is shown in the exhibit. Client...
A company wants to deploy a new WLAN topology without running a new...
Users report that message about duplicate IP addresses keep displaying...
A company wants to deploy a new WLAN topology without running new...
Which metric is used to determine routes when using RIP?
The project team purchases an 8-port Layer 2 switch, a router, and an...
A company is changing its network design as shown in the exhibit. The...
What should a company use as an authentication and authorization...
A network administrator would change the ID on a switch's native...
A large organization has offices in several locations around the...
A company wants to connect a remote office using a satellite Internet...
A consultant is helping a company design a wireless LAN...
A company encounters problems with inappropriate disclosure of company...
A company needs to tighten its network security. This includes...
Which protocol is open, a vendor-neutral standard for accessing and...
Which layer of the OSI model are web browsers and email clients...
A company is designing a wireless LAN deployment. To help secure the...
A team with members from two companies is designing a new product. All...
A network engineer has to order network cables to connect two floors...
A company expands its corporate campus. All new buildings are...
A company opens a new call center with 35 agents. the network team is...
A network team prepares a presentation to members of the board. Match...
A company has deployed a new access point. A network administrator...
A company needs to have a reliable record of everyone who enters a...
A NIDS reports several attempts to download files from an external IP...
A company is developing its business continuity and disaster recovery...
Match the following
Match each statement with the appropriated switch port protection.
A technician determines there is a break in the fiber optic cable...
What is the role of an MIB when implementing SNMP for network...
A company's WLAN is configured with one access point (AP) and...
A company has remote offices with intermittent WAN connections....
The Technical Services team prepare a drawing to document all network...
Match network devices with their role in 802.1x port based...
A company wants to deploy an 802.1x standalone wireless access point....
A company wants to support multiple client computers running and...
A company opens a new warehouse space on its company campus. network...
The marketing team uses a SaaS service to store raw video files. The...
Alert!

Advertisement