Independence Day - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

Which of the following ports is commonly used by VoIP phones?

A.

20

B.

143

C.

445

D.

5060

Full Access
Question # 5

A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?

A.

Link aggregation control

B.

Port tagging

C.

Jumbo frames

D.

Media access control

Full Access
Question # 6

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

A.

CSMA/CD

B.

LACP

C.

PoE+

D.

MDIX

Full Access
Question # 7

A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:

1 Must not use plaintext passwords

2 Must be certificate based

3. Must be vendor neutral

Which of the following methods should the engineer select?

A.

TWP-RC4

B.

CCMP-AES

C.

EAP-TLS

D.

WPA2

Full Access
Question # 8

Which of the following BEST describes hosting several businesses on the same physical infrastructure?

A.

Hybrid

B.

Elasticity

C.

laaS

D.

Multitenancy

Full Access
Question # 9

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

A.

A VPN concentrator

B.

A load balancer

C.

A wireless controller

D.

A RADIUS server

Full Access
Question # 10

A network technician needs to install security updates on several switches on me company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?

A.

Upload the security update onto each switch using a terminal emulator and a console cable.

B.

Configure a TFTP server. SSH into each device, and perform the update.

C.

Replace each old switch with new switches that have the updates already performed.

D.

Connect a USB memory stick to each switch and perform the update.

Full Access
Question # 11

A company is being acquired by a large corporation. As part of the acquisition process, the company's address should now redirect clients to the corporate organization page. Which of the following DNS records needs to be created?

A.

SOA

B.

NS

C.

CNAME

D.

TXT

Full Access
Question # 12

A network administrator would like 10 enable NetFlow on a Layer 3 switch but is concerned about how the feature may impact the switch. Which of the following metrics should the administrator graph using SNMP to BEST measure the feature's Impact?

A.

CPU usage

B.

Temperature

C.

Electrical consumption

D.

Bandwidth usage

Full Access
Question # 13

A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?

A.

Wireless client isolation

B.

Port security

C.

Device geofencing

D.

DHCP snooping

Full Access
Question # 14

Given the following information:

Which of the following command-line tools would generate this output?

A.

netstat

B.

arp

C.

dig

D.

tracert

Full Access
Question # 15

A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?

A.

Insider threat

B.

War driving

C.

Evil twin

D.

Honeypot

Full Access
Question # 16

A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?

A.

A honeypot

B.

Network segmentation

C.

Antivirus

D.

A screened subnet

Full Access
Question # 17

Which of the following topologies requires me MOST connections when designing a network?

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Full Access
Question # 18

Which of the following topologies requites the MOST connections when designing a network?

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Full Access
Question # 19

A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?

A.

Check the system’s IP address

B.

Do a ping test against the servers

C.

Reseat the cables into the back of the PC

D.

Ask what changes were made

Full Access
Question # 20

Which of the following uses the destination IP address to forward packets?

A.

A bridge

B.

A Layer 2 switch

C.

A router

D.

A repeater

Full Access
Question # 21

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

A.

Evil twin

B.

Tailgating

C.

Piggybacking

D.

Shoulder surfing

Full Access
Question # 22

A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:

A.

using a bottom-to-top approach.

B.

establishing a plan of action.

C.

documenting a finding.

D.

questioning the obvious.

Full Access
Question # 23

At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?

A.

Network

B.

Data link

C.

Transport

D.

Session

Full Access
Question # 24

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 25

A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?

A.

172.15.0.0/18

B.

172.18.0.0/10

C.

172.23.0.0/16

D.

172.28.0.0/8

E.

172.32.0.0/14

Full Access
Question # 26

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

A.

VLAN mismatch

B.

Transceiver mismatch

C.

Latency

D.

DHCP exhaustion

Full Access
Question # 27

A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect Which of the following describes the issue?

A.

Rogue DHCP server

B.

Misconfigured HSRP

C.

DNS poisoning

D.

Exhausted IP scope

Full Access
Question # 28

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:

Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down

Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down

Which of the following describes the reason why the events are not being received?

A.

The network device is not configured to log that level to the syslog server

B.

The network device was down and could not send the event

C.

The syslog server is not compatible with the network device

D.

The syslog server did not have the correct MIB loaded to receive the message

Full Access
Question # 29

To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?

A.

Use tcpdump and parse the output file in a protocol analyzer.

B.

Use an IP scanner and target the cloud WAN network addressing.

C.

Run netstat in each cloud server and retrieve the running processes.

D.

Use nmap and set the servers' public IPs as the targets.

Full Access
Question # 30

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

A.

Captive portal

B.

Two-factor authentication

C.

Complex passwords

D.

Geofencing

E.

Role-based access

F.

Explicit deny

Full Access
Question # 31

Given the following output:

Which of the following attacks is this MOST likely an example of?

A.

ARP poisoning

B.

VLAN hopping

C.

Rogue access point

D.

Amplified DoS

Full Access
Question # 32

Which of the following is the LARGEST MTU for a standard Ethernet frame?

A.

1452

B.

1492

C.

1500

D.

2304

Full Access
Question # 33

A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?

A.

The nearest APs are configured for 802.11g.

B.

An incorrect channel assignment is on the nearest APs.

C.

The power level is too high for the AP on the far side.

D.

Interference exists around the AP on the far side.

Full Access
Question # 34

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:

Which of the following metrics confirms there is a cabling issue?

A.

Last cleared

B.

Number of packets output

C.

CRCs

D.

Giants

E.

Multicasts

Full Access
Question # 35

Which of the following would be used to expedite MX record updates to authoritative NSs?

A.

UDP forwarding

B.

DNS caching

C.

Recursive lookup

D.

Time to live

Full Access
Question # 36

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:

Device

LC/LC patch cable

Patch panel

Cross-connect fiber cable

Patch panel

LC/LC patch cable

Switch

The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

A.

TX/RX is reversed

B.

An incorrect cable was used

C.

The device failed during installation

D.

Attenuation is occurring

Full Access
Question # 37

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

A.

Fault tolerance

B.

Quality of service

C.

Load balancing

D.

Port aggregation

Full Access
Question # 38

A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would BEST describe this setup?

A.

Bus

B.

Spine-and-leaf

C.

Hub-and-spoke

D.

Mesh

Full Access
Question # 39

A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?

A.

Detection

B.

Recovery

C.

Identification

D.

Prevention

Full Access