Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A network architect must design a new branch network that meets the following requirements:

    No single point of failure

    Clients cannot be impacted by changes to the underlying medium

    Clients must be able to communicate directly to preserve bandwidth

Which of the following network topologies should the architect use?

A.

Hub-and-spoke

B.

Mesh

C.

Spine-and-leaf

D.

Star

Full Access
Question # 5

A network engineer is installing new switches in the data center to replace existing infrastructure. The previous network hardware had administrative interfaces that were plugged into the existing network along with all other server hardware on the same subnet. Which of the following should the engineer do to better secure these administrative interfaces?

A.

Connect the switch management ports to a separate physical network.

B.

Disable unused physical ports on the switches to keep unauthorized users out.

C.

Set the administrative interfaces and the network switch ports on the same VLAN.

D.

Upgrade all of the switch firmware to the latest hardware levels.

Full Access
Question # 6

As part of a project to modernize a sports stadium and improve the customer service experience for fans, the stadium owners want to implement a new wireless system. Currently, all tickets are electronic and managed by the stadium mobile application. The new solution is required to allow location tracking precision within 5ft (1.5m) of fans to deliver the following services:

    Emergency/security assistance

    Mobile food order

    Event special effects

    Raffle winner location displayed on the giant stadium screen

Which of the following technologies enables location tracking?

A.

SSID

B.

BLE

C.

NFC

D.

IoT

Full Access
Question # 7

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

Which of the following is the most useful information to add to the dashboard for the operations team?

A.

404 errors

B.

Concurrent users

C.

Number of orders

D.

Number of active incidents

Full Access
Question # 8

A company hosts a cloud-based e-commerce application and only wants the application accessed from certain locations. The network team configures a cloud firewall with WAF enabled, but users can access the application globally. Which of the following should the network team do?

A.

Reconfigure WAF rules

B.

Configure a NAT gateway

C.

Implement a CDN

D.

Configure geo-restriction

Full Access
Question # 9

Application development team users are having issues accessing the database server within the cloud environment. All other users are able to use SSH to access this server without issues. The network architect reviews the following information to troubleshoot the issue:

Traceroute output from an application developer's machine with the assigned IP 192.168.2.7:

    Application development gateway: 192.168.2.1/24

    Server segment gateway: 192.168.1.1/24

    Database server: 192.168.1.9

    Application developer machine IP: 192.168.2.7

    Traceroute ends at hop 4: 192.168.4.1 (server segment firewall), then times out

Which of the following is the most likely cause of the issue?

A.

The core firewall is blocking the traffic.

B.

Network security groups do not have the correct outbound rule configured.

C.

The server segment firewall is dropping the traffic.

D.

The server segment gateway is having bandwidth issues.

Full Access
Question # 10

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

Full Access
Question # 11

A company is transitioning from on-premises to a hybrid environment. Due to regulatory standards, the company needs to achieve a high level of reliability and high availability for the connection between its data center and the cloud provider. Which of the following solutions best meets the requirements?

A.

Establish a Direct Connect with the cloud provider and peer to two different VPCs in the cloud network.

B.

Establish a Direct Connect with the cloud provider and a redundant connection with a VPN over the internet.

C.

Establish two Direct Connect connections to the cloud provider using two different suppliers.

D.

Establish a VPN with two tunnels to a transit gateway at the cloud provider.

Full Access
Question # 12

An administrator needs to add a device to the allow list in order to bypass user authentication of an AAA system. The administrator uses MAC filtering and needs to discover the device's MAC address to accomplish this task. The device receives an IP address from DHCP, but the IP address changes daily. Which of the following commands should the administrator run on the device to locate its MAC address?

A.

ipconfig /all

B.

netstat -an

C.

arp -a

D.

nslookup

Full Access
Question # 13

An organization's Chief Technical Officer is concerned that changes to the network using IaC are causing unscheduled outages. Which of the following best mitigates this risk?

A.

Making code changes to the master branch

B.

Enforcing code review of the change by the author

C.

Forking the code repository before making changes

D.

Adding review/approval steps to the CI/CD pipelines

Full Access
Question # 14

A network architect is designing a solution to place network core equipment in a rack inside a data center. This equipment is crucial to the enterprise and must be as secure as possible to minimize the chance that anyone could connect directly to the network core. The current security setup is:

    In a locked building that requires sign in with a guard and identification check.

    In a locked data center accessible by a proximity badge and fingerprint scanner.

    In a locked cabinet that requires the security guard to call the Chief Information Security Officer (CISO) to get permission to provide the key.

Which of the following additional measures should the architect recommend to make this equipment more secure?

A.

Make all engineers with access to the data center sign a statement of work.

B.

Set up a video surveillance system that has cameras focused on the cabinet.

C.

Have the CISO accompany any network engineer that needs to do work in this cabinet.

D.

Require anyone entering the data center for any reason to undergo a background check.

Full Access
Question # 15

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

Full Access
Question # 16

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Full Access
Question # 17

A network engineer is establishing a wireless network for handheld inventory scanners in a manufacturing company's warehouse. The engineer needs an authentication mechanism for these scanners that uses the Wi-Fi network and works with the company's Active Directory. The business requires that the solution authenticate the users and authorize the scanners. Which of the following provides the best solution for authentication and authorization?

A.

TACACS+

B.

RADIUS

C.

LDAP

D.

PKI

Full Access
Question # 18

A network load balancer is not correctly validating a client TLS certificate. The network architect needs to validate the certificate installed on the load balancer before progressing. Which of the following commands should the architect use to confirm whether the private key and certificate match?

A.

openssl-list -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

B.

openssl req -in certificate.csr -verify

openssl-verify -noout -modulus -in privkey.txt | openssl md5

C.

openssl-rsa -noout -modulus -in cert.crt | openssl md5

openssl-verify -noout -modulus -in privkey.txt | openssl md5

D.

openssl x509 -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

Full Access
Question # 19

A network security engineer must secure a web application running on virtual machines in a public cloud. The virtual machines are behind an application load balancer. Which of the following technologies should the engineer use to secure the virtual machines? (Choose two.)

A.

CDN

B.

DLP

C.

IDS

D.

WAF

E.

SIEM

F.

NSG

Full Access
Question # 20

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Full Access
Question # 21

A network architect is working on a physical network design template for a small education institution's satellite campus that is not yet built. The new campus location will consist of two small buildings with classrooms, one screening room with audiovisual equipment, and 200 seats for students. Which of the following enterprise network designs should the architect suggest?

A.

Hybrid

B.

Dual-layer

C.

Three-tier

D.

Collapsed core

Full Access
Question # 22

A network architect is designing a new network for a rural hospital system. Given the following requirements:

    Highly available

    Consistent data transmission

    Resilient to simultaneous failures

Which of the following topologies should the architect use?

A.

Collapsed core

B.

Hub-and-spoke

C.

Mesh

D.

Star

Full Access
Question # 23

A network engineer needs to implement a cloud-native solution. The solution must allow the recording of network conversation metadata of the host and appliances attached to a VPC. Which of the following will accomplish these goals with the least effort?

A.

Enabling network flow

B.

Configuring SNMP traps

C.

Implementing QoS network tagging

D.

Installing a cloud monitoring agent

Full Access
Question # 24

A company provides an API that runs on the public cloud for its customers. A fixed number of VMs host the APIs. During peak hours, the company notices a spike in usage that results in network communication speeds slowing down for all customers. The management team has decided that access for all customers should be fair and accessible at all times. Which of the following is the most cost-effective way to address this issue?

A.

Use an allow list for customers using APIs.

B.

Increase the number of VMs running APIs.

C.

Enable throttling on APIs.

D.

Increase the MTU on the VMs.

Full Access
Question # 25

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

A router on the same network shows the following output:

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Full Access