Black Friday Goodies - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

A.

Standard operating procedures

B.

Wiring diagram

C.

Inventory documentation

D.

Network baseline

Full Access
Question # 5

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?

A.

Deploy two APs to the gymnasium with the maximum power level transmitting to cover the adjacent offices.

B.

Deploy a single AP to each adjacent office set to transmit at maximum power.

C.

Use a high-gain antenna on the AP in the gymnasium and install an AP in every other adjacent office.

D.

Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

Full Access
Question # 6

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Full Access
Question # 7

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

A.

Replace the omnidirectional antennas with unidirectional antennas.

B.

Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.

C.

Replace the 802.11 wireless standard and use GSM instead.

D.

Replace the wireless bridges with wireless routers.

Full Access
Question # 8

A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?

A.

MU-MIMO

B.

MIMO

C.

Channel bonding

D.

TDM

E.

Automatic channel selection

Full Access
Question # 9

A home user has contacted the help desk to transfer files from an old smartphone to a new one. The help desk analyst informs the home user this can be completed using Bluetooth. Which of the following types of topologies is this called?

A.

PAN

B.

LAN

C.

SAN

D.

WAN

Full Access
Question # 10

A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

A.

Additional PIN

B.

Security questions

C.

RSA token

D.

Access control lists

Full Access
Question # 11

A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection?

A.

An RG-59 cable with BNC connectors

B.

A multi-mode fiber cable

C.

A straight-through Cat5 UTP cable

D.

A cable with TIA/EIA 568a and 568b on each end

Full Access
Question # 12

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?

A.

WPA2

B.

EAP-FAST

C.

MAC filtering

D.

802.1X

Full Access
Question # 13

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Full Access
Question # 14

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

A.

22

B.

69

C.

80

D.

389

E.

443

Full Access
Question # 15

Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this?

A.

The customer's laptop does not support auto-MDIX.

B.

Joe's laptop does not support auto-MDIX.

C.

Straight-through patch cables are prone to crosstalk.

D.

The customer's laptop NIC does not support full duplex.

Full Access
Question # 16

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?

A.

Pre-shared key

B.

Open

C.

EAP-TLS

D.

WPA2

Full Access
Question # 17

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.)

A.

Label the switch with IP address and firmware version

B.

Draw the switchport diagram

C.

Create a change management document

D.

Draw the network rack logical diagram

E.

Confirm standard operating procedures documentation

F.

Create a performance baseline of the switch

Full Access
Question # 18

A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?

A.

International export controls policy

B.

Remote access policy

C.

Privileged user agreement

D.

Data loss policy

E.

Service-level agreement

Full Access
Question # 19

A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?

A.

The user ordered Cat5e cable instead of Cat3.

B.

A crossover cable was installed.

C.

The total cable run exceeds the maximum distance.

D.

There is a network speed mismatch between the computer and the switch.

Full Access
Question # 20

A technician installed a new fiber optic cable to connect two sites. Although there is a link light on the port at each site, the customer reports traffic is dropping intermittently. Which of the following should the technician do NEXT to troubleshoot the issue?

A.

Check the interfaces for CRC errors.

B.

Check for a VLAN mismatch.

C.

Check for a TX/RX reverse on the connector.

D.

Check that the pinout is correct.

Full Access
Question # 21

A network technician is reviewing the following output from a router:

Which of the following is this an example of?

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Full Access
Question # 22

A network technician is reviewing the company phone system to make the necessary changes to a firewall configuration. Which of the following protocols are used in VoIP communication? (Choose two.)

A.

SIP

B.

NTP

C.

H.323

D.

SNMP

E.

IMAP

F.

SMB

G.

CSMA

Full Access
Question # 23

Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?

A.

Spanning port

B.

Port forwarding

C.

Port mirroring

D.

Port tagging

Full Access
Question # 24

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

A.

164.10.12.0/24

B.

164.10.12.64/29

C.

164.10.12.128/26

D.

164.10.12.191/28

Full Access
Question # 25

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Full Access
Question # 26

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Full Access
Question # 27

A new datacenter is being created, and management is trying to control access to that area. Which of the following are the BEST choices for providing access to the new datacenter? (Choose two.)

A.

Captive portal

B.

Wireless IP camera

C.

Biometrics

D.

Key fob

E.

Private key infrastructure

F.

Access control list

Full Access
Question # 28

A server administrator is building an email server. To protect the corporate/internal network from external users, the email server should be placed:

A.

on the intranet.

B.

in a subnet isolated from the internal network.

C.

on the company LAN segment.

D.

in the DMZ.

Full Access
Question # 29

A network technician is working to bring a new workstation onto the network. No lights come on when the technician plugs the Ethernet cable into the workstation. The technician checks the connection in the IDF and discovers the data jack is not labeled. Which of the following tools should the technician use to trace the network connection back to the IDF?

A.

A port scanner

B.

A loopback adapter

C.

An OTDR

D.

A tone generator

Full Access
Question # 30

A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method c following should be configured to provide connectivity and minimal security to the new network? (Select TWO).

A.

Pre-shared key

B.

Open authentication

C.

PEAP

D.

MAC filtering

E.

EAP-FAST

F.

EAP-TLS

Full Access
Question # 31

Which of the following BEST describes a VLAN hopping attack?

A.

An attacker gains unauthorized access to a network by overflowing the CAM table.

B.

An attacker gains unauthorized access to a network by placing a rogue AP on the network.

C.

An attacker gains unauthorized access to a network by using double-tagged packets.

D.

An attacker gains unauthorized access to a network by scanning and mapping it.

Full Access
Question # 32

A user's computer is having trouble reaching a certain website Other branch locations do not have any issues reaching this website, and the user can reach all other websites A technician suspects there is a failure at an upstream router under The ISPs control. Which of the following commands should the technician run to confirm this suspicion''

A.

tepdump

B.

arp

C.

traeert

D.

nmp

E.

route

Full Access
Question # 33

A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation:

* Researched and decided that 802.11ac would be the best technology

* Ensured the switch supports PoE+

* Purchased an AP for each floor and spare APs in case of failure

* Put each AP into non-overlapping channels

Which of the following is the MOST likely reason users are experiencing poor performance?

A.

802.11ac is not the proper wireless technology for a multistory building.

B.

A comprehensive site survey of each floor was not conducted.

C.

Users were not consulted to find out what type of wireless cards they had.

D.

APs in non-overlapping channels are not able to provide proper redundancy.

Full Access
Question # 34

A network technician needs to replace a failed hard drive on a server at the company's large, remote datacenter Which of the following types of documentation should be reviewed to locate this server easily?

A.

Logical diagrams

B.

Rack diagrams

C.

Change management

D.

Standard operating procedures

Full Access
Question # 35

An IT training company hosts an annual series of daily seminars Each day. a different group of 252 students participate, and all require use of the company's /24 guest wireless network Starling on Tuesday, and continuing through Friday, some students report they are unable to connect to the wireless network. Which of the following is the BEST solution for preventing this Issue from occurring again next year?

A.

Reduce DHCP lease time from eight days to eight hours.

B.

Increase the upper limit of the DHCP scope from 254 to 506

C.

Create IP address reservations for Monday's students in the DHCP scope.

D.

Add DHCP scope option 156 for the TFTP server.

Full Access
Question # 36

The main purpose of jumbo frames is to increase the:

A.

timeout value to ensure critical data is received

B.

VLAN ID field to allow for higher-numbered VLANs.

C.

MTU size to pass more data quicker

D.

TTL value to pass data further across the network

Full Access
Question # 37

A network technician needs to install new network cables. The technician will be running the cables in the air return space above the drop ceiling. Which of the following cable types should be installed?

A.

Plenum

B.

Coaxial

C.

Shielded twisted pair

D.

Fiber optic

Full Access
Question # 38

A network administrator has been experiencing slow performance and file errors when attempting to utilize server utilities. The administrator needs to ensure the system tiles on the server have not been modified. Which of the following should be used to ensure the server files have not been compromised?

A.

Performance baseline

B.

File hash

C.

Iptables

D.

tepdump

Full Access
Question # 39

A technician receives a report that Joe. an existing user is unable to access the network. Joe confirms that he had full access the previous clay. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe Is able to access the network. Which of the following is the MOST likely cause of this issue?

A.

Incorrect pin-out

B.

Bad port

C.

Transceiver mismatch

D.

Incorrect cable type

Full Access
Question # 40

A senior technician is reconfiguring the company’s firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?

A.

The technician should put the junior team’s lab in a VLAN and the phone system in the DMZ.

B.

The technician should put the junior team’s lab in a DMZ and the phone system in a VLAN.

C.

The technician should put the junior team’s lab in the LAN and the phone system in the WAN.

D.

The technician should put the junior team’s lab in the WAN and the phone system in a WLAN

Full Access
Question # 41

Which of the following may state: "Employees may hot browse social media websites from company-owned computers?

A.

AUP

B.

BYOD

C.

NDA

D.

SLA

Full Access
Question # 42

Accompany provides web content to several customers around the country. DNS records are being used to distribute the client's connections among the servers. The monitoring records of the servers show some servers are used more than others. Which of the following should be used to achieve a more efficient distribution for the connections?

A.

Load balancer

B.

Hot site

C.

NIC teaming

D.

Round robin

Full Access
Question # 43

A customer warns to be able to separate traffic on a local network without using a router. Which of the following should a technician install?

A.

A multilayer switch

B.

A wireless controller

C.

A load balancer

D.

A VPN concentrator

E.

A UTM appliance

Full Access
Question # 44

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

A.

Confirm the patch's MD5 hash prior to the upgrade

B.

Schedule the switches to reboot after an appropriate amount of time.

C.

Download each switch's current configuration before the upgrade

D.

Utilize FTP rather than TFTP to upload the patch

Full Access
Question # 45

A network technician recently installed a new Layer 2 switch. After scanning the device, the network administrator mentions there is traffic on port 23. Which of the following should the network technician have done during the installation?

A.

Disabled Telnet and enabled SSH

B.

Created an ACL to block port 23

C.

Disabled DHCP snooping

D.

Changed the native VLAN

Full Access
Question # 46

Which of the following DHCP settings defines the range of dynamic IP addresses?

A.

Exclusions

B.

Pool

C.

Reservations

D.

Scope options

Full Access
Question # 47

A network technician has been deployed to a remote office where WiFi functionality was lost after some recent remodeling. Upon arrival the technician finds the sole access point In the office is powered on via a Cat6 port, which is PoE+ enabled. All necessary SSIDs are broadcasting property However after connecting, authentication falls. Rebooting the WAP does not remediate the situation, nor does replacing the paten cable between the switch and the patch panel. Which of the following is MOST likely the root cause of this issue?

A.

The WAP is causing a packet storm on the network.

B.

Some of the leads on the male end going into the WAP were damaged

C.

The switchport In question Is using 802. 3at instead of 802.3at.

D.

The Cat6 uplink to the WAP was plugged into the AUX pot instead of the Gigabit PoE port.

Full Access
Question # 48

A network administrator wants to ensure devices on the network are not susceptible to published exploits. Which of the following will the administrator MOST likely conduct?

A.

A port scan

B.

A vulnerability scan

C.

A packet analysis

D.

A network log review

Full Access
Question # 49

A customer wants to install a network that can utilize 802.1X authentication protocols. The customer uses a Windows laptop and does not want to install any additional software; therefore, a technician needs to configure

the network to work with what is available natively. Which of the following should the technician configure for the 802.1X network?

A.

PEAP

B.

LDAP

C.

EAP-FAST

D.

NAC

Full Access
Question # 50

A network technician is assisting a user cannot connect to a wireless connection. The user is connecting to the correct SSID and has the correct pre-shared key. The technician verifies the WAP is working, and other clients are connected to it from same location. Which of the following should the technician investigate?

A.

Channel overlap

B.

Wireless frequency

C.

AP power levels

D.

Encryption type

Full Access
Question # 51

A user reports a laptop wireless connection is working at the user's desk but not in a recent building addition. A network administrator logs into the wireless controller, searches for the user's MAC address, and receives the following results:

Which of the following describes the reason for the issue?

A.

Frequency mismatch

B.

Distance limitation

C.

Channel overlap

D.

Wrong SSID

Full Access
Question # 52

A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?

A.

Network configuration

B.

Change management documentation

C.

Work instructions

D.

Performance baseline

Full Access
Question # 53

A network manager is drafting a document mat outlines what employees can and cannot do when using personal tablets that are connected to the network. Which of the following is the manager drafting?

A.

An AUP policy

B.

A BYOD policy

C.

A DLP policy

D.

An NDA policy

Full Access
Question # 54

A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?

A.

Standard operating procedures

B.

Configuration baseline documents

C.

Work instructions

D.

Change management documentation

Full Access
Question # 55

A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients?

A.

Migrate the clients to 802.11a NICs.

B.

Disable 802.11n.

C.

Disable the 2.4GHz radio

D.

Use omnidirectional antennas

Full Access
Question # 56

A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall?

A.

Secure SNMP

B.

Port security

C.

Implicit deny

D.

DHCP snooping

Full Access
Question # 57

A network technician is asked to design and properly size an IPv4 network. Management wants to use a class B private network address, and each subnet should be able to contain exactly 30 hosts.

Which of the following combinations of network addresses and subnet masks would BEST meet these requirements?

A.

10.200.1.0 / 255.255.255.192

B.

172.18.30.96 / 255.255.255.224

C.

180.20.12.64 / 255.255.255.224

D.

192.168.200.224 / 255.255.255.0

E.

192.168.200.224 / 255.255.255.224

Full Access
Question # 58

Joe an ex-employee from accounting, changed the configurations on several network devices on his last day of work. Which of the following is the MOST likely reason a non-IT employee was able to gain access to network devices?

A.

Left virtual ports open

B.

Allowed unsecure protocols

C.

Left default passwords

D.

Allowed unnecessary services

Full Access
Question # 59

In which of the following layers of the OSI model is checksum added to the end of an Ethernet frame?

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Full Access
Question # 60

A wireless network administrator has been advised that some company devices can only connect to wireless networks that employ TKIP stream cipher encryption. The administrator has changed the security settings to allow these devices to connect. Which of the following wireless security methods has the administrator configured?

A.

Captive portal

B.

MAC filtering

C.

WEP

D.

WPA

Full Access
Question # 61

A network technician needs to dedicate a range of addresses in DHCP for statically assigned servers and network devices. Which of the following should be configured to BEST accomplish this?

A.

Static addressing

B.

Sub-netting

C.

Advertisements

D.

Exclusions

Full Access
Question # 62

Which of the following is used to purposely attack a system to exploit vulnerabilities?

A.

Honeypot

B.

Vulnerability scan

C.

Device hardening

D.

Penetration testing

Full Access
Question # 63

A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company’s firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?

A.

Bridge

B.

Router

C.

Multilayer switch

D.

Media converter

Full Access
Question # 64

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Full Access
Question # 65

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other.

The subnet the Access Points and switch are on should only support 30 devices maximum.

The Access Points should be configured to only support TKIP clients at a maximum speed.

INSTRUCTIONS

Click on the devices to review their information and adjust the settings of the APs to meet the given requirements.

If any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 66

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Full Access
Question # 67

A web server administrator has changed the domain registrar’s A record for the company’s website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?

A.

The NAT has not been configured to point to an internal resource.

B.

An egress firewall rule is blocking access to the web server.

C.

The IDS has determined it is a rogue web server.

D.

The corporate DNS server has not been updated.

Full Access
Question # 68

The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

A.

Frequency mismatch

B.

Crosstalk

C.

Interference

D.

Channel overlap

Full Access
Question # 69

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Full Access
Question # 70

Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?

A.

Check the latency by running a continuous ping to the site.

B.

Perform the ipconfig/flushdns command on the affected users’ PCs.

C.

Run a speedtest from a user’s PC to a site on the Internet.

D.

Verify if there is MTU mismatch in the path to the site.

Full Access
Question # 71

A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?

A.

Because secure protocols would reject malicious packets

B.

Because SCP is not a secure service

C.

Because FTP is not a secure service

D.

Because a secure firewall will protect the device

Full Access
Question # 72

A network administrator is reviewing the following output from a switch.

Which of the following attacks has occurred on the switch?

A.

DNS poisoning

B.

ARP poisoning

C.

VLAN hopping

D.

MAC address spoofing

Full Access
Question # 73

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Select TWO).

A.

DNS poisoning

B.

ARP poisoning

C.

Man-in-the-middle

D.

Ransomware

E.

Evil twin

F.

Reflective

Full Access
Question # 74

A technician wants to have the ability to transfer files from home to the company’s network on a regular basis. Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?

A.

FTP

B.

SCP

C.

TFTP

D.

Telnet

Full Access
Question # 75

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Full Access
Question # 76

A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?

A.

tracert

B.

netstat

C.

arp

D.

dig

Full Access
Question # 77

Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?

A.

Inventory management

B.

Wiring and port location

C.

Configuration baseline

D.

Standard operating procedure

Full Access
Question # 78

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Full Access
Question # 79

To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?

A.

SIP

B.

PAT

C.

NAT

D.

VIP

Full Access
Question # 80

A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?

A.

Remote desktop gateway

B.

Transport mode IPSec

C.

SSH tunneling

D.

TLS VPN

Full Access
Question # 81

A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?

A.

Gather information.

B.

Determine the symptoms.

C.

Establish a plan of action.

D.

Document the findings

Full Access
Question # 82

A technician is moving a company to a cloud email service. Several external recipients are reporting that email sent from the company is going to their junk folders because the sender's identity cannot be verified. Which of the following DNS record types should the technician modify to minimize this problem?

A.

CNAME

B.

PTR

C.

TXT

D.

SRV

Full Access
Question # 83

Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? (Select TWO).

A.

Load balancer

B.

Jumbo frames

C.

Clustering

D.

Round robin

E.

TCP offloading

Full Access
Question # 84

A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

A.

3

B.

4

C.

5

D.

6

E.

7

Full Access
Question # 85

When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?

A.

Incident response policy

B.

International export controls

C.

Data loss prevention

D.

Remote access policies

E.

Licensing restrictions

Full Access
Question # 86

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Full Access
Question # 87

A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

A.

HTTP

B.

SMTP

C.

NTP

D.

RDP

Full Access
Question # 88

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the www.comptia.com website:

Which of the following is the reason the system cannot connect?

A.

The DNS server is under maintenance.

B.

A cable is not connected to the NIC.

C.

The domain complia.com is having network issues.

D.

The interface eth0 Is using an APIPA address.

Full Access
Question # 89

Allowing data to be centrally stored and accessed by multiple devices on an isolated subnet is BEST understood as:

A.

NAS

B.

iSCSI

C.

SAN

D.

FCoE

Full Access
Question # 90

A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update?

A.

Host-based firewall settings

B.

TACAS+ server time

C.

Server IP address

D.

DNS SRV record

Full Access
Question # 91

Which of the following should be configured to allow for IP-to-name resolutions?

A.

CNAME

B.

A

C.

PTR

D.

NS

Full Access
Question # 92

The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?

A.

802.1X

B.

802.1q

C.

802.3at

D.

802.3af

Full Access
Question # 93

A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed?

A.

1000BaseLX SFP

B.

Duplex GBIC

C.

Duplex SFP+

D.

Bidirectional SFP

Full Access
Question # 94

Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?

A.

Ransomware

B.

Phishing

C.

DDoS

D.

Social engineering

E.

Spoofing

Full Access
Question # 95

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Full Access
Question # 96

A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating?

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Full Access
Question # 97

Which of the following storage network technologies has the HIGHEST throughput?

A.

FCoE

B.

InfiniBand

C.

iSCSI

D.

OC3

Full Access
Question # 98

Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?

A.

Reviewing application logs

B.

Reviewing a baseline report

C.

Reviewing a vulnerability scan

D.

Reviewing SLA requirements

Full Access
Question # 99

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

A.

System life-cycle procedures

B.

Off-boarding procedures

C.

Safety procedures

D.

Appropriate use policy

Full Access
Question # 100

A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?

A.

Spectrum analyzer

B.

OTDR

C.

Packet sniffer

D.

Multimeter

Full Access
Question # 101

A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the ceiling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation'?

A.

Plenum

B.

PVC

C.

Single-mode

D.

Cat 7

Full Access
Question # 102

A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?

A.

ipconfig

B.

nslookup

C.

arp

D.

dig

Full Access
Question # 103

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

A.

Open wireless

B.

Geofencing

C.

Pre-shared key

D.

MAC filtering

Full Access