N10-008: CompTIA Network+ Topic 3
Question #: 201
Topic #: 1
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?
A. Clientless VPN
B. Virtual desktop
C. Virtual network computing
D. mGRE tunnel
Selected Answer: A
Question #: 202
Topic #: 1
A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1
Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.
Which of the following is the MOST likely cause for the failure?
A. The network engineer is using the wrong protocol.
B. The network engineer does not have permission to configure the device.
C. SNMP has been secured with an ACL.
D. The switchport the engineer is trying to configure is down.
Selected Answer: A
Question #: 203
Topic #: 1
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data
Selected Answer: D
Question #: 204
Topic #: 1
A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?
A. Link aggregation
B. Jumbo frames
C. Port security
D. Flow control
E. Lower FTP port
Selected Answer: B
Question #: 205
Topic #: 1
Which of the following devices have the capability to allow communication between two different subnetworks? (Choose two.)
A. IDS
B. Access point
C. Layer 2 switch
D. Layer 3 switch
E. Router
F. Media converter
Selected Answer: DE
Question #: 206
Topic #: 1
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
A. SSO
B. LDAP
C. EAP
D. TACACS+
Selected Answer: A
Question #: 207
Topic #: 1
An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?
A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps
Selected Answer: A
Question #: 208
Topic #: 1
A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch:
Which of the following is a cause of the issue on port 1/3?
A. Speed
B. Duplex
C. Errors
D. VLAN
Selected Answer: A
Question #: 209
Topic #: 1
Which of the following would be used when connecting devices that have different physical characteristics?
A. A proxy server
B. An industrial control system:
C. A load balancer
D. A media converter
Selected Answer: D
Question #: 210
Topic #: 1
A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?
A. MTBF
B. MTTR
C. RPO
D. RTO
Selected Answer: A
Question #: 211
Topic #: 1
A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Choose two.)
A. Data loss prevention policy
B. BYOD policy
C. Acceptable use policy
D. Non-disclosure agreement
E. Disaster recovery plan
F. Physical network diagram
Selected Answer: EF
Question #: 212
Topic #: 1
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
A. Hybrid
B. Elasticity
C. IaaS
D. Multitenancy
Selected Answer: D
Question #: 213
Topic #: 1
A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?
A. Enable IGMP snooping on the switches.
B. Implement another DHCP server.
C. Reconfigure port tagging for the video traffic.
D. Change the SSID of the APs.
Selected Answer: A
Question #: 214
Topic #: 1
The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?
A. Redundant power supplies
B. Uninterruptible power supply
C. Generator
D. Power distribution unit
Selected Answer: C
Question #: 215
Topic #: 1
A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?
A. show interface
B. show config
C. show route
D. show arp
Selected Answer: A
Question #: 216
Topic #: 1
A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line?
A. netstat
B. netstat -a
C. netstat -e
D. netstat -n
Selected Answer: D
Question #: 217
Topic #: 1
Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)
A. TIA-568-A – TIA-568-B
B. TIA-568-B – TIA-568-B
C. RJ11
D. RJ45
E. F-type
Selected Answer: BD
Question #: 218
Topic #: 1
A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?
A. Captive portal
B. Geofencing
C. Wireless client isolation
D. Role-based access
Selected Answer: A
Question #: 219
Topic #: 1
A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?
A. A
B. AAAA
C. CNAME
D. PTR
Selected Answer: B
Question #: 220
Topic #: 1
A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an
APIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing?
A. DHCP exhaustion
B. A rogue DHCP server
C. A DNS server outage
D. An incorrect subnet mask
Selected Answer: A
Question #: 221
Topic #: 1
A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?
A. Validate the findings in a top-to-bottom approach.
B. Duplicate the issue, if possible.
C. Establish a plan of action to resolve the issue.
D. Document the findings and actions.
Selected Answer: C
Question #: 222
Topic #: 1
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
A. Client-to-site VPN
B. Clientless VPN
C. RDP
D. Site-to-site VPN
E. SSH
Selected Answer: D
Question #: 223
Topic #: 1
A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used?
A. Divide-and-conquer
B. Top-to-bottom
C. Bottom-to-top
D. Determine if anything changed
Selected Answer: A
Question #: 224
Topic #: 1
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A. An increase in network security using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network
D. An improvement in network efficiency by increasing the useful packet payload
Selected Answer: B
Question #: 225
Topic #: 1
Which of the following needs to be tested to achieve a Cat 6a certification for a company’s data cabling?
A. RJ11
B. LC ports
C. Patch panel
D. F-type connector
Selected Answer: C
Question #: 226
Topic #: 1
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
A. MTTR
B. MOU
C. NDA
D. SLA
Selected Answer: D
Question #: 227
Topic #: 1
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?
A. Active-active
B. Warm
C. Cold
D. Cloud
Selected Answer: B
Question #: 228
Topic #: 1
Which of the following would be used to forward requests and replies between a DHCP server and client?
A. Relay
B. Lease
C. Scope
D. Range
Selected Answer: A
Question #: 229
Topic #: 1
Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time?
A. Using a tone generator and wire map to determine the fault location
B. Using a multimeter to locate the fault point
C. Using an OTDR in one end of the optic cable to get the fiber length information
D. Using a spectrum analyzer and comparing the current wavelength with a working baseline
Selected Answer: C
Question #: 230
Topic #: 1
A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?
A. The configuration of the encryption protocol
B. Interference from other devices
C. Insufficient bandwidth capacity
D. Duplicate SSIDs
Selected Answer: B
Question #: 231
Topic #: 1
Which of the following is a benefit of the spine-and-leaf network topology?
A. Increased network security
B. Stable network latency
C. Simplified network management
D. Eliminated need for inter-VLAN routing
Selected Answer: C
Question #: 232
Topic #: 1
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?
A. Adjust the proper logging level on the new firewall.
B. Tune the filter for logging the severity level on the syslog server.
C. Activate NetFlow traffic between the syslog server and the firewall.
D. Restart the SNMP service running on the syslog server.
Selected Answer: A
Question #: 233
Topic #: 1
A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company’s network hardware.
The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:
Which of the following actions would MOST likely reduce this issue? (Choose two.)
A. Change to WPA encryption.
B. Change the DNS server to 10.1.10.1.
C. Change the default gateway to 10.0.0.1.
D. Change the DHCP scope end to 10.1.10.250.
E. Disable AP isolation.
F. Change the subnet mask to 255.255.255.192.
G. Reduce the DHCP lease time to four hours.
Selected Answer: DG
Question #: 234
Topic #: 1
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
A. Packet capture
B. iPerf
C. NetFlow analyzer
D. Internet speed test
Selected Answer: C
Question #: 235
Topic #: 1
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this
BEST represent?
A. SSO
B. Zero Trust
C. VPN
D. Role-based access control
Selected Answer: B
Question #: 236
Topic #: 1
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
A. Changing the VLAN of the web server
B. Changing the server’s IP address
C. Implementing an ACL
D. Installing a rule on the firewall connected to the web server
Selected Answer: C
Question #: 237
Topic #: 1
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceroute from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings?
A. Asymmetric routing
B. A routing loop
C. A switch loop
D. An incorrect gateway
Selected Answer: A
Question #: 238
Topic #: 1
A technician is troubleshooting reports that a networked printer is unavailable. The printer’s IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure?
A. Incorrect VLAN
B. DNS failure
C. DHCP scope exhaustion
D. Incorrect gateway
Selected Answer: A
Question #: 239
Topic #: 1
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system’s security configuration. Which of the following BEST describes the security principle in use?
A. Network access control
B. Least privilege
C. Multifactor authentication
D. Separation of duties
Selected Answer: D
Question #: 240
Topic #: 1
A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will the technician MOST likely use to accomplish this task?
A. A bridge
B. A media converter
C. A repeater
D. A router
Selected Answer: B
Question #: 241
Topic #: 1
After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes.
Which of the following would be BEST to use for these notifications?
A. Traps
B. MIB
C. NetFlow
D. Syslog
Selected Answer: A
Question #: 242
Topic #: 1
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
A. SNMP
B. Link state
C. Syslog
D. QoS
E. Traffic shaping
Selected Answer: A
Question #: 243
Topic #: 1
At which of the following OSI model layers does an IMAP client run?
A. Layer 2
B. Layer 4
C. Layer 6
D. Layer 7
Selected Answer: D
Question #: 244
Topic #: 1
Which of the following would be the MOST cost-effective recovery solution for a company’s lower-priority applications?
A. Warm site
B. Cloud site
C. Hot site
D. Cold site
Selected Answer: A
Question #: 245
Topic #: 1
Which of the following network devices can perform routing between VLANs?
A. Layer 2 switch
B. Layer 3 switch
C. Load balancer
D. Bridge
Selected Answer: B
Question #: 246
Topic #: 1
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified in the SLA.
Which of the following would BEST help measure the throughput?
A. iPerf
B. Ping
C. NetFlow
D. Netstat
Selected Answer: A
Question #: 247
Topic #: 1
A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
A. Perform a site survey.
B. Review the AP placement.
C. Monitor channel utilization.
D. Test cable attenuation.
Selected Answer: C
Question #: 248
Topic #: 1
Which of the following is the primary function of the core layer of the three-tiered model?
A. Routing
B. Repeating
C. Bridging
D. Switching
Selected Answer: D
Question #: 249
Topic #: 1
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
A. AES encryption
B. Channel to the highest frequency within the band
C. TKIP encryption protocol
D. Dynamic selection of the frequency
Selected Answer: A
Question #: 250
Topic #: 1
To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the following can be configured to fulfill this requirement?
A. QoS traffic classification
B. Port mirroring
C. Flow control
D. Link Aggregation Control Protocol
Selected Answer: B
Question #: 251
Topic #: 1
Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic?
A. RIP
B. EIGRP
C. OSPF
D. BGP
Selected Answer: D
Question #: 252
Topic #: 1
A technician is consolidating a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
A. Seamless roaming
B. Basic service set
C. WPA
D. MU-MIMO
Selected Answer: A
Question #: 253
Topic #: 1
Which of the following is used to provide disaster recovery capabilities to spin up all critical devices using internet resources?
A. Cloud site
B. Hot site
C. Cold site
D. Warm site
Selected Answer: A
Question #: 254
Topic #: 1
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
A. Virus
B. Botnet
C. ARP spoofing
D. DDoS
Selected Answer: D
Question #: 255
Topic #: 1
Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring?
A. Jitter
B. Bandwidth
C. Latency
D. Giants
Selected Answer: B
Question #: 256
Topic #: 1
An international company is transferring its IT assets, including a number of WAPs, from the United States to an office in Europe for deployment. Which of the following considerations should the company research before implementing the wireless hardware?
A. WPA2 cipher
B. Regulatory impacts
C. CDMA configuration
D. 802.11 standards
Selected Answer: B
Question #: 257
Topic #: 1
A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network?
A. Ensure all guests sign an NDA.
B. Disable unneeded switchports in the area.
C. Lower the radio strength to reduce Wi-Fi coverage in the waiting area.
D. Enable MAC filtering to block unknown hardware addresses.
Selected Answer: B
Question #: 258
Topic #: 1
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information.
Which of the following actions should the network technician take to prevent data loss?
A. Disable the user account.
B. Lock the phone.
C. Turn off the service.
D. Execute remote wipe.
Selected Answer: D
Question #: 259
Topic #: 1
A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue?
A. Verifying if an encryption protocol mismatch exists.
B. Verifying if a captive portal is active for the WLAN.
C. Verifying the minimum RSSI for operation in the device’s documentation.
D. Verifying EIRP power settings on the access point.
Selected Answer: B
Question #: 260
Topic #: 1
Which of the following topologies requires the MOST connections when designing a network?
A. Mesh
B. Star
C. Bus
D. Ring
Selected Answer: A
Question #: 261
Topic #: 1
A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the following is MOST likely the cause of the issue?
A. Port security
B. Port tagging
C. Port aggregation
D. Port mirroring
Selected Answer: A
Question #: 262
Topic #: 1
A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected?
A. Isolating the guest network
B. Securing SNMP
C. MAC filtering
D. Disabling unneeded switchports
Selected Answer: A
Question #: 263
Topic #: 1
An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF?
A. Temperature
B. Humidity
C. Smoke
D. Electrical
Selected Answer: B
Question #: 264
Topic #: 1
A network administrator is reviewing the network device logs on a syslog server. The messages are normal, but the time stamps on the messages are incorrect.
Which of the following actions should the administrator take to ensure the log message time stamps are correct?
A. Change the NTP settings on the network device.
B. Change the time on the syslog server.
C. Update the network device firmware.
D. Adjust the timeout settings on the syslog server.
E. Adjust the SSH settings on the network device.
Selected Answer: A
Question #: 265
Topic #: 1
Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)
A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link.
C. The connection has duplexing configuration issues.
D. Halogen light fixtures are causing interference.
E. One of the technicians installed a loopback adapter.
F. The RSSI was not strong enough on the link.
Selected Answer: AB
Question #: 266
Topic #: 1
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
A. EIGRP
B. BGP
C. IPv6
D. MPLS
Selected Answer: B
Question #: 267
Topic #: 1
A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests?
A. 10.10.10.10
B. 127.0.0.1
C. 192.168.0.1
D. 255.255.255.0
Selected Answer: B
Question #: 268
Topic #: 1
An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?
A. Spanning Tree Protocol
B. Open Shortest Path First
C. Port mirroring
D. An interior gateway protocol
Selected Answer: A
Question #: 269
Topic #: 1
During a risk assessment, which of the following should be considered when planning to mitigate high CPU utilization of a firewall?
A. Recovery time objective
B. Uninterruptible power supply
C. NIC teaming
D. Load balancing
Selected Answer: D
Question #: 270
Topic #: 1
A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation?
A. Latency
B. Jitter
C. Speed
D. Bandwidth
Selected Answer: C
Question #: 271
Topic #: 1
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
A. Elastic computing
B. Scalable networking
C. Hybrid deployment
D. Multitenant hosting
Selected Answer: A
Question #: 272
Topic #: 1
A technician discovered that some information on the local database server was changed during a file transfer to a remote server. Which of the following should concern the technician the MOST?
A. Confidentiality
B. Integrity
C. DDoS
D. On-path attack
Selected Answer: B
Question #: 273
Topic #: 1
During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report:
Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client?
A. Electrical
B. Humidity
C. Flooding
D. Temperature
Selected Answer: D
Question #: 274
Topic #: 1
After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information?
A. SNMP OID values
B. NetFlow data export
C. Network baseline configurations
D. Security information and event management
Selected Answer: D
Question #: 275
Topic #: 1
Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs?
A. Split tunnel
B. Full tunnel
C. Site-to-site tunnel
D. Virtual desktop
Selected Answer: D
Question #: 276
Topic #: 1
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. Out-of-band access
B. Split-tunnel connections
C. Virtual network computing
D. Remote desktop gateways
Selected Answer: A
Question #: 277
Topic #: 1
An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment?
A. Uptime
B. NetFlow baseline
C. SNMP traps
D. Interface statistics
Selected Answer: A
Question #: 278
Topic #: 1
Which of the following can be used to decrease latency during periods of high utilization of a firewall?
A. Hot site
B. NIC teaming
C. HA pair
D. VRRP
Selected Answer: C
Question #: 279
Topic #: 1
A network administrator needs to configure a server to use the most accurate NTP reference available. Which of the following NTP devices should the administrator select?
A. Stratum 1
B. Stratum 2
C. Stratum 3
D. Stratum 4
Selected Answer: A
Question #: 280
Topic #: 1
Which of the following devices is used to configure and centrally manage access points installed at different locations?
A. Wireless controller
B. Load balancer
C. Proxy server
D. VPN concentrator
Selected Answer: A
Question #: 281
Topic #: 1
A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer?
A. Port duplex settings
B. Port aggregation
C. ARP settings
D. VLAN tags
E. MDIX settings
Selected Answer: D
Question #: 282
Topic #: 1
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
A. Flow control
B. Jumbo frames
C. Duplex
D. Port mirroring
Selected Answer: A
Question #: 283
Topic #: 1
Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem?
A. F-type
B. RJ45
C. LC
D. RJ11
Selected Answer: A
Question #: 284
Topic #: 1
Which of the following provides guidance to an employee about restricting non-business access to the company’s videoconferencing solution?
A. Acceptable use policy
B. Data loss prevention
C. Remote access policy
D. Standard operating procedure
Selected Answer: A
Question #: 285
Topic #: 1
Which of the following would MOST likely utilize PoE?
A. A camera
B. A printer
C. A hub
D. A modem
Selected Answer: A
Question #: 286
Topic #: 1
A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate?
A. Configuring DHCP snooping on the switch
B. Preventing broadcast messages leaving the client network
C. Blocking ports 67/68 on the client network
D. Enabling port security on access ports
Selected Answer: A
Question #: 287
Topic #: 1
Which of the following can have multiple VLAN interfaces?
A. Hub
B. Layer 3 switch
C. Bridge
D. Load balancer
Selected Answer: B
Question #: 288
Topic #: 1
A network technician needs to ensure that all files on a company’s network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?
A. FTP
B. TFTP
C. SMTP
D. SFTP
Selected Answer: D
Question #: 289
Topic #: 1
A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not.
Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?
A. MAC table
B. Neighbor Discovery Protocol
C. ARP table
D. IPConfig
E. ACL table
Selected Answer: C
Question #: 290
Topic #: 1
Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
A. 2
B. 4
C. 19
D. 100
Selected Answer: C
Question #: 291
Topic #: 1
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation, coordination, and termination of the call?
A. Session
B. Physical
C. Transport
D. Data link
Selected Answer: A
Question #: 292
Topic #: 1
A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk.
B. Immediately shut down the vulnerable application server.
C. Install a network access control agent on the server.
D. Deploy a new server to host the application.
Selected Answer: A
Question #: 293
Topic #: 1
A company is utilizing multifactor authentication for data center access. Which of the following is the MOST effective security mechanism against physical intrusions due to stolen credentials?
A. Biometrics security hardware
B. Access card readers
C. Access control vestibule
D. Motion detection cameras
Selected Answer: A
Question #: 294
Topic #: 1
A help desk technician is concerned that a client’s network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?
A. Run the show interface command on the switch.
B. Run the traceroute command on the server.
C. Run iperf on the technician’s desktop.
D. Ping the client’s computer from the router.
E. Run a port scanner on the client’s IP address.
Selected Answer: A
Question #: 295
Topic #: 1
An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?
A. Fiber
B. Leased line
C. Satellite
D. Metro optical
Selected Answer: C
Question #: 296
Topic #: 1
A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?
A. Single-mode
B. Coaxial
C. Cat 6a
D. Twinaxial
Selected Answer: A
Question #: 297
Topic #: 1
A network engineer developed a plan of action to resolve an ongoing issue. Which of the following steps should the engineer take NEXT?
A. Verify full system functionality and implement preventative measures.
B. Implement the solution to resolve the problem.
C. Document findings, actions, outcomes, and lessons learned.
D. Establish a theory of probable cause.
Selected Answer: B
Question #: 298
Topic #: 1
Which of the following documents would be used to define uptime commitments from a provider, along with details on measurement and enforcement?
A. NDA
B. SLA
C. MOU
D. AUP
Selected Answer: B
Question #: 299
Topic #: 1
Switch 3 was recently added to an existing stack to extend connectivity to various parts of the network. After the update, new employees were not able to print to the main networked copiers from their workstations. Following are the port configurations for the switch stack in question:
Switch 1:
Switch 2:
Switch 3:
Which of the following should be configured to resolve the issue? (Choose two.)
A. Enable the printer ports on Switch 3.
B. Reconfigure the duplex settings on the printer ports on Switch 3.
C. Reconfigure the VLAN on all printer ports to VLAN 20.
D. Enable all ports that are shut down on the stack.
E. Reconfigure the VLAN on the printer ports on Switch 3.
F. Enable wireless APs on Switch 3.
Selected Answer: AE
Question #: 300
Topic #: 1
A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files. Which of the following DHCP services can be used to accomplish this task?
A. Scope options
B. Exclusion ranges
C. Lease time
D. Relay
Selected Answer: A