The Actual Exam Version included actual exam questions verified by IT Experts. We verified questions and updated frequently each month and also based on members’ feedback to keep updating with the real exam. We are offering money back immediately if questions in our Actual Exam Version do not appear in your exam. Highly recommend you take the Actual Exam Version then go to the exam as soon as possible. We’re using Google Docs to manage our actual exam contents. This way to keep all members always in the latest update and this is the fastest way to learn. When you make the payment, we will add your gmail to access our materials.
Actual Exam Version:
QUESTION NO: 1
Ann, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, she can access the Internet. The network engineer has confirmed that Ann’s account has been set up the same as the others. There are no access lists restricting Ann’s access. Which of the following could be the issue for this lack of access?
A. Duplex/speed mismatch
B. VLAN mismatch
C. DNS server issue
D. DHCP server issue
E. Spanning tree blocked ports
QUESTION NO: 2
A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport?
A. Perform a DNS lookup on the server.
B. Set up an SSH session to the desktop.
C. Reference the ARP table in the router.
D. Configure port security on the switch.
QUESTION NO: 3
A router is set up to utilize RIPv2 to route traffic throughout the network. Which of the following routing metrics is used to determine the path?
A. Distance
B. Bandwidth
C. Speed
D. Hop count
QUESTION NO: 4
A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?
A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public IP
QUESTION NO: 5
Which of the following can be done to implement network device hardening? (Choose two.)
A. Implement spanning tree
B. Perform VLAN hopping
C. Patch and update
D. Perform backups
E. Enable port mirroring
F. Change default admin password
QUESTION NO: 6
A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?
A. Change the default password
B. Use a firewall in front of the device.
C. Update the firmware.
D. Upgrade the configuration.
QUESTION NO: 7
A technician has been alerted of incoming HTTP traffic on the LAN segment that should not
contain any web servers. The technician has the IP address of the destination host and wants to determine if the socket for HTTP is open. Which of the following should the technician perform?
A. Baseline assessment
B. Packet analysis
C. Port scan
D. Patch-level assessment
QUESTION NO: 8
Which of the following creates a secure remote connection at the OSI network layer?
A. L2TP
B. SSL
C. DTLS
D. IPSec
QUESTION NO: 9
A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?
A. The cables have an incorrect pin-out.
B. The cables are UTP instead of STP.
C. The cables are Cat 6 instead of Cat 5.
D. The cables are not plenum rated.
QUESTION NO: 10
A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks?
A. Install an IDS to monitor all traffic to and from the kiosks.
B. Install honeypots on the network to detect and analyze potential kiosk attacks before they occur.
C. Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks.
D. Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network.
QUESTION NO: 11
While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?
A. dig
B. iptables
C. ifconfig
D. traceroute
QUESTION NO: 12
A network administrator has had difficulty keeping track of IP address assignments on networking devices and clients recently. Which of the following is the BEST technology to aid in this scenario?
A. DNS
B. DHCP
C. IPAM
D. NTP
QUESTION NO: 13
A technician is surveying a college’s network equipment rooms and connectivity. Which of the following types of documentation does the technician need to perform a detailed site survey?
(Choose three.)
A. IDF/MDF documentation.
B. Cable run label documentation.
C. Network configuration documentation.
D. Performance baseline documentation.
E. Standard operating procedure documentation
F. Change management documentation.
G. Rack diagram documentation.
QUESTION NO: 14
A technician is connecting a PC to a switchport. At the wiring closet, the technician is unable to identify which cable goes from patch panel A connected to the switch to patch panel B connected to the PC. Which of the following tools should the technician use to resolve the issue?
A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR
QUESTION NO: 15
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?
A. EAP-PEAP
B. CCMP-AES
C. WPA2-PSK
D. TKIP-RC4
QUESTION NO: 16
Which of the following protocols are classified as connectionless? (Choose two.)
A. TFTP
B. FTP
C. HTTP
D. SNMP
E. SSH
F. IMAP
QUESTION NO: 17
Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?
A. Plug in a second spare cable at each end to double the speed.
B. Replace the switches with ones that utilize port bonding and use the spare cables.
C. Replace the switches with 10Gb switches and utilize the existing cabling.
D. Plug in a second cable and set one port to TX and one port to RX.
QUESTION NO: 18
A technician is downloading an ISO from a vendor’s website. To ensure the integrity of the download, which of the following should be verified?
A. File size
B. Vendor URL
C. File hashing
D. Encryption
QUESTION NO: 19
An administrator wants to implement an additional authentication factor to the remote SSH servers. Which of the following accomplishes this goal with the principle of “something you have”?
A. Certificate
B. Pattern
C. Password
D. Fingerprint
QUESTION NO: 20
A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office. Of which of the following types of IoT technologies is this an example?
A. LAN
B. WAN
C. SAN
D. PAN
QUESTION NO: 21
Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?
A. Private IP
B. Static IP
C. APIPA
D. Loopback
QUESTION NO: 22
A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network. Which of the following should the administrator create?
A. Logical diagram
B. Physical diagram
C. Rack diagram
D. Configuration diagram
QUESTION NO: 23
Which of the following would indicate that a circuit speed should be increased?
A. Low latency
B. Low bandwidth consumption
C. High number of SIEM alerts
D. High packet drops
QUESTION NO: 24
A technician has installed an older IP camera as a temporary replacement for a recently failed newer one. The technician notices that when the camera’s video stream is off, the ping round trip time between the camera and the network DVR is consistently less than 1ms without dropped packets. When the camera video stream is turned on, the ping round trip time increases dramatically, and network communication is slow and inconsistent. Which of the following is MOST likely the issue in this scenario?
A. VLAN mismatch
B. Duplex mismatch
C. Cat 6 RX/TX reversed
D. Damaged cable
QUESTION NO: 25
Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate. Which of the following wireless performance problem concepts defines this issue?
A. Interference
B. Distance limitation
C. Signal-to-noise ratio
D. Absorption
QUESTION NO: 26
Which of the following BEST explains the purpose of signature management as a mitigation technique?
A. Hardening devices
B. Segmenting the network
C. Detecting malicious activity
D. Restricting user credentials
QUESTION NO: 27
A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?
A. VLAN
B. DMZ
C. SNMP
D. NTP
QUESTION NO: 28
A Chief Information Officer (CIO) tasks the network engineer with protecting the network from outside attacks. Placing which of the following devices on the network perimeter would provide the MOST security for the system?
A. Firewall
B. NGFW
C. Content filter
D. IDS/IPS
QUESTION NO: 29
Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST thing the network technician should do?
A. Order equipment
B. Create network diagrams
C. Perform a site survey
D. Create an SSID.
QUESTION NO: 30
A technician has deployed an additional DHCP server for redundancy. Clients in certain subnets are not receiving DHCP leases from the new DHCP server. Which of the following is the MOST likely cause?
A. The new DHCP server’s IP address was not added to the router’s IP helper list.
B. The new DHCP server is not receiving the requests from the clients.
C. The ARP cache of the new DHCP server needs to be updated.
D. The ARP table on the router needs to be cleared.
QUESTION NO: 31
Greater bandwidth and availability are required between two switches. Each switch has multiple 100Mb Ethernet ports available. Which of the following should a technician implement to help achieve these requirements?
A. Spanning tree
B. Clustering
C. Power management
D. Port aggregation
QUESTION NO: 32
A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?
A. 10.35.112.0/30
B. 10.35.112.0/24
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.255.0
QUESTION NO: 33
Ann, a customer, recently upgraded her SOHO Internet to gigabit fiber from cable. She was previously getting speeds around 75Mbps down and 25Mbps up. After the upgrade, Ann runs a speed test on her desktop and gets results of 1000Mbps down and 100Mbps up. A technician connects directly to the router and sees the correct 1000Mbps speeds. Which of the following is
MOST likely the cause? (Choose two.)
A. All ports should be configured for full duplex.
B. There is a 10/100 switch on the network.
C. The connections are using Cat 5 cable.
D. The connections are using Cat 6 cable.
E. There is a transceiver mismatch at the fiber termination point.
F. Signal attenuation on the new fiber has reached the upper limits.
QUESTION NO: 34
A user reports intermittent performance issues on a segment of the network. According to the troubleshooting methodology, which of the following steps should the technician do NEXT after collecting initial information from the customer?
A. Document findings, actions, and outcomes.
B. Establish a theory of probable cause.
C. Establish a plan of action to resolve the problem.
D. Duplicate the problem, if possible.
QUESTION NO: 35
Which of the following protocols is associated with a three-way handshake?
A. UDP
B. ICMP
C. GRE
D. TCP
QUESTION NO: 36
Which of the following would a company place at the edge of its network if it wants to view and control which Internet applications are being used?
A. VPN concentrator
B. NGFW
C. IDS/IPS
D. Proxy server
QUESTION NO: 37
A technician wants to physically connect two office buildings’ networks. The office buildings are located 600ft (183m) apart. Which of the following cable types is the BEST choice?
A. Cat 5e
B. Cat 6a
C. Multimode
D. Coaxial
QUESTION NO: 38
A network engineer at a multinational company is asked to purchase mobile phones for senior executives who often travel internationally. The executives want their phones to work with wireless carriers in multiple countries when they travel. Which of the following cellular standards should these new phones support?
A. GSM
B. TDM
C. CDMA
D. PSTN
QUESTION NO: 39 DRAG DROP
You are tasked with creating a network that will accomplish the following requirements.
Requirements:
The remote Sales Team must be able to connect to the corporate network.
Each department must have ONLY two PCs and a server.
Each department must be segmented from each other.
The following VLANs have been designed:
Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
INSTRUCTIONS
Complete the network by dragging the required objects onto the diagram.
Objects can be used multiple times and not all placeholders need to be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Answer:
QUESTION NO: 40
Which of the following should a network administrator use to configure Layer 3 routes? (Choose two.)
A. Multilayer switch
B. Firewall
C. Hub
D. Bridge
E. Modem
F. Media converter
QUESTION NO: 41
While logged into a financial application, a user gets errors when trying to write to the database. The network administrator is not familiar with the application and how it communicates with the database. Which of the following documentation types should the network administrator use to troubleshoot the data flow?
A. Logical diagram
B. Physical diagram
C. Network baseline
D. Change management log
QUESTION NO: 42
Joe, a network engineer, is attempting to install wireless in a large work area. He installs the access point in the middle of the work space. When testing, he notices a -60dB reading on one side of the room and a -92dB reading on the other side. Which of the following is MOST likely the issue?
A. External interference
B. Distance limitations
C. Channel overlap
D. Incorrect antenna type
QUESTION NO: 43
A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?
A. APIPA
B. MAC reservations
C. EUI-64
D. IPv4 to IPv6 tunnel
QUESTION NO: 44
A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?
A. IPSec
B. IGRP
C. L2TP
D. PPTP
QUESTION NO: 45
A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following disaster recovery solutions is the appropriate choice?
A. Hot site
B. Business continuity
C. File backups
D. Virtual snapshot
QUESTION NO: 46
A network technician receives a new firmware update for a network device. The technician wants to ensure the file has not been tampered with. Which of the following techniques should the technician use to ensure the integrity of the file?
A. Cyclic redundancy check
B. System integrity check
C. Hash comparison
D. Root guard
QUESTION NO: 47
An AP is configured to authenticate clients by using their Active Directory username and password. The AP uses UDP to connect to the authentication service, which then queries Active
Directory. Which of the following authentication services is being used by the AP in this scenario?
A. RADIUS
B. TACACS+
C. LDAP
D. Kerberos
QUESTION NO: 48
Which of the following should be configured on the network to achieve performance for the FCoE storage traffic?
A. PoE
B. DHCP snooping
C. Jumbo frames
D. Virtual IP
QUESTION NO: 49
A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?
A. 10.10.50.0/30
B. 172.16.20.0/30
C. 192.1.0.124/30
D. 192.168.0.192/24
E. 192.170.10.0/24
QUESTION NO: 50
A network technician notices that most of the nodes in the 10.10.74.0/23 address space return either 1 or 2 node hop after running a tracert; however, some of the new servers are showing a hop count larger than 10. Which of the following is the MOST likely reason for this?
A. New servers are being provisioned in the cloud.
B. Those servers have host-based firewalls.
C. Some of the servers are configured to use different gateways.
D. Part of the subnet is configured to use different VLANs.
QUESTION NO: 51
A technician has a remote site that often has congestion issues. When this happens, the remote router cannot be managed using SSH because the session drops. Which of the following is a possible solution to the issue?
A. Out-of-band management
B. HTTPS management URL
C. Client-to-site VPN
D. Router ACL
QUESTION NO: 52
A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?
A. DHCP scope
B. DHCP lease
C. Default gateway
D. DNS zone
QUESTION NO: 53
Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?
A. ATM
B. Frame relay
C. MPLS
D. PPP
QUESTION NO: 54
A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?
A. CDMA
B. GSM
C. TDMA
D. CSMA
QUESTION NO: 55
A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day’s upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?
A. Confirm the patch’s MD5 hash prior to the upgrade.
B. Schedule the switches to reboot after an appropriate amount of time.
C. Download each switch’s current configuration before the upgrade.
D. Utilize FTP rather than TFTP to upload the patch.
QUESTION NO: 56
A network technician is segmenting network traffic into various broadcast domains. Which of the following should the network technician utilize?
A. VLAN
B. STP
C. ACL
D. BPDU
QUESTION NO: 57
After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of
169.254.112.137. Which of the following is MOST likely causing the issue?
A. DHCP scope exhaustion
B. Improper DNS setting
C. Incorrect ACL setting
D. Port-security violation
QUESTION NO: 58
A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?
A. TLS
B. Remote file access
C. Split tunneling
D. HTTPS
QUESTION NO: 59
A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users’ devices to the company network. To complete this step, which of the following should be used to secure the remote network location?
A. Host-based firewalls
B. WPA2/WPA
C. Open access
D. Port filtering
QUESTION NO: 60
The length of an IPv6 address is:
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits