N10-008: CompTIA Network+ Topic 4
Question #: 301
Topic #: 1
An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?
A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing
Selected Answer: A
Question #: 302
Topic #: 1
A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers?
A. Coaxial over Ethernet
B. Internet Small Computer Systems Interface
C. Fibre Channel
D. Gigabit interface converter
Selected Answer: C
Question #: 303
Topic #: 1
A customer wants to log in to a vendor’s server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server?
A. Secure Sockets Layer
B. Site-to-site VPN
C. Remote desktop gateway
D. Client-to-site VPN
Selected Answer: A
Question #: 304
Topic #: 1
A user calls the IT department to report being unable to log in after locking the computer. The user resets the password, but later in the day the user is again unable to log in after locking the computer. Which of the following attacks against the user is MOST likely taking place?
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing
Selected Answer: A
Question #: 305
Topic #: 1
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection. Which of the following settings should provide better network stability?
A. Client association timeout
B. RSSI roaming threshold
C. RF attenuation ratio
D. EIRP power setting
Selected Answer: B
Question #: 306
Topic #: 1
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot when a network is experiencing a number of CRC errors?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Selected Answer: A
Question #: 307
Topic #: 1
Which of the following uses the link-state routing algorithm and operates within a single autonomous system?
A. EIGRP
B. OSPF
C. RIP
D. BGP
Selected Answer: B
Question #: 308
Topic #: 1
A network administrator is designing a wireless network. The administrator must ensure a rented office space has a sufficient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?
A. Polarization
B. Channel utilization
C. Channel bonding
D. Antenna type
E. MU-MIMO
Selected Answer: D
Question #: 309
Topic #: 1
An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern’s work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?
A. Insufficient power at the antennas
B. PoE and UTP incompatibility
C. Electromagnetic interference
D. Wrong cable pinout
Selected Answer: C
Question #: 310
Topic #: 1
Several users with older devices are reporting intermittent connectivity while in an outdoor patio area. After some research, the network administrator determines that an outdoor WAP might help with the issue. However, the company does not want the signal to bleed into the building and cause interference. Which of the following should the network administrator perform to BEST resolve the issue?
A. Disable the SSID broadcast on the WAP in the patio area.
B. Install a WAP and enable 5GHz only within the patio area.
C. Install a directional WAP in the direction of the patio.
D. Install a repeater on the back wall of the patio area.
Selected Answer: C
Question #: 311
Topic #: 1
Which of the following is most likely to have the HIGHEST latency while being the most accessible?
A. Satellite
B. DSL
C. Cable
D. 4G
Selected Answer: A
Question #: 312
Topic #: 1
Which of the following is used to elect an STP root?
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch’s root port
Selected Answer: A
Question #: 313
Topic #: 1
Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
A. netstat -a
B. ifconfig
C. ip addr
D. ipconfig /all
Selected Answer: D
Question #: 314
Topic #: 1
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user’s computer and verifies that pings fail to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?
A. netstat
B. ipconfig
C. nslookup
D. traceroute
Selected Answer: D
Question #: 315
Topic #: 1
An employee reports to a network administrator that internet access is not working. Which of the following should the administrator do FIRST?
A. Establish a theory of probable cause.
B. Identify symptoms.
C. Determine if anything has changed.
D. Ask the user to restart the computer.
Selected Answer: C
Question #: 316
Topic #: 1
A security engineer is installing a new IDS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?
A. Install a network tap for the IDS.
B. Configure ACLs to route traffic to the IDS.
C. Install an additional NIC into the IDS.
D. Install a loopback adapter for the IDS.
E. Add an additional route on the router for the IDS.
Selected Answer: A
Question #: 317
Topic #: 1
An employee working in a warehouse facility is experiencing interruptions in mobile applications while walking around the facility. According to a recent site survey, the WLAN comprises autonomous APs that are directly connected to the internet, providing adequate signal coverage. Which of the following is the BEST solution to improve network stability?
A. Implement client roaming using an extended service deployment employing a wireless controller.
B. Remove omnidirectional antennas and adopt a directional bridge.
C. Ensure all APs of the warehouse support MIMO and Wi-Fi 4.
D. Verify that the level of EIRP power settings is set to the maximum permitted by regulations.
Selected Answer: A
Question #: 318
Topic #: 1
Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?
A. MPLS
B. mGRE
C. EIGRP
D. VRRP
Selected Answer: A
Question #: 319
Topic #: 1
While walking from the parking lot to an access-controlled door, an employee sees an authorized user open the door. Then the employee notices that another person catches the door before it closes and goes inside. Which of the following attacks is taking place?
A. Tailgating
B. Piggybacking
C. Shoulder surfing
D. Phishing
Selected Answer: A
Question #: 320
Topic #: 1
Given the following information:
Which of the following would cause performance degradation between PC A and PC B?
A. Attenuation
B. Interference
C. Decibel loss
D. Incorrect pinout
Selected Answer: A
Question #: 321
Topic #: 1
An engineer recently decided to upgrade the firmware on a router. During the upgrade, the help desk received calls about a network outage, and a critical ticket was opened. The network manager would like to create a policy to prevent this from happening in the future. Which of the following documents should the manager create?
A. Change management
B. Incident response
C. Standard operating procedure
D. System life cycle
Selected Answer: A
Question #: 322
Topic #: 1
A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices?
A. WPA2-Enterprise
B. WPA-Enterprise
C. WPA-PSK
D. WPA2-PSK
Selected Answer: C
Question #: 323
Topic #: 1
Which of the following ports should be used to securely receive mail that is synchronized across multiple devices?
A. 25
B. 110
C. 443
D. 993
Selected Answer: D
Question #: 324
Topic #: 1
A network administrator is getting reports of some internal users who cannot connect to network resources. The users state they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue?
A. The client DHCP scope is fully utilized.
B. The wired network is experiencing electrical interference.
C. The captive portal is down and needs to be restarted.
D. SNMP traps are being received.
E. The packet counter on the router interface is high.
Selected Answer: A
Question #: 325
Topic #: 1
A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application. Which of the following actions will BEST support the administrator’s response?
A. Generate a network baseline report for comparison.
B. Export the firewall traffic logs.
C. Collect the router’s NetFlow data.
D. Plot interface statistics for dropped packets.
Selected Answer: C
Question #: 326
Topic #: 1
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Choose two.)
A. 22
B. 23
C. 69
D. 443
E. 587
F. 8080
Selected Answer: BC
Question #: 327
Topic #: 1
A technician is configuring a static IP address on a new device in a newly created subnet. The work order specifies the following requirements:
• The IP address should use the highest address available in the subnet.
• The default gateway needs to be set to 172.28.85.94.
• The subnet mask needs to be 255.255.255.224.
Which of the following addresses should the engineer apply to the device?
A. 172.28.85.93
B. 172.28.85.95
C. 172.28.85.254
D. 172.28.85.255
Selected Answer: A
Question #: 328
Topic #: 1
A network technician is troubleshooting an area where the wireless connection to devices is poor. The technician theorizes that the signal-to-noise ratio in the area is causing the issue. Which of the following should the technician do NEXT?
A. Run diagnostics on the relevant devices.
B. Move the access point to a different location.
C. Escalate the issue to the vendor’s support team.
D. Remove any electronics that might be causing interference.
Selected Answer: B
Question #: 329
Topic #: 1
Which of the following must be functioning properly in order for a network administrator to create an accurate timeline during a troubleshooting process?
A. NTP
B. IP helper
C. Syslog
D. MySQL
Selected Answer: A
Question #: 330
Topic #: 1
A large metropolitan city is looking to standardize the ability for police department laptops to connect to the city government’s VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers. Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city’s needs?
A. 5G
B. LTE
C. Wi-Fi 4
D. Wi-Fi 5
E. Wi-Fi 6
Selected Answer: B
Question #: 331
Topic #: 1
Which of the following physical security methods is the MOST effective to prevent tailgating?
A. Biometrics in an access control vestibule
B. IP cameras with motion detection
C. Smart lockers with tamper protection
D. Badge readers plus a PIN pad
Selected Answer: A
Question #: 332
Topic #: 1
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. RST
B. FIN
C. ICMP Time Exceeded
D. Redirect
Selected Answer: A
Question #: 333
Topic #: 1
A company’s data center is hosted at its corporate office to ensure greater control over the security of sensitive data. During times when there are increased workloads, some of the company’s non-sensitive data is shifted to an external cloud provider. Which of the following cloud deployment models does this describe?
A. Hybrid
B. Community
C. Public
D. Private
Selected Answer: A
Question #: 334
Topic #: 1
A network engineer needs to create a subnet that has the capacity for five VLANs, with the following number of clients to be allowed on each:
Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?
A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24
Selected Answer: B
Question #: 335
Topic #: 1
A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch. Which of the following cable connectors should be used?
A. RJ45
B. LC
C. MT
D. F-type
Selected Answer: B
Question #: 336
Topic #: 1
A company is deploying a SAN at headquarters and a branch office 1,000mi (1,609km) away that will access small amounts of data. Which of the following types of connections would be MOST cost effective to implement?
A. iSCSI
B. FCoE
C. Ethernet
D. FC
Selected Answer: A
Question #: 337
Topic #: 1
A company wants to add a local redundant data center to its network in case of failure at its primary location. Which of the following would give the LEAST amount of redundancy for the company’s network?
A. Cold site
B. Hot site
C. Cloud site
D. Warm site
Selected Answer: A
Question #: 338
Topic #: 1
A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect: however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information:
Which of the following is MOST likely causing this connection failure?
A. Transmission speed
B. Incorrect passphrase
C. Channel overlap
D. Antenna cable attenuation/signal loss
Selected Answer: B
Question #: 339
Topic #: 1
A technician manages a DHCP scope but needs to allocate a portion of the scope’s subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?
A. Dynamic assignment
B. Exclusion range
C. Address reservation
D. IP helper
Selected Answer: B
Question #: 340
Topic #: 1
Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?
A. The switch was configured with port security.
B. Newly added machines are running into DHCP conflicts.
C. The IPS was not configured to recognize the new users.
D. Recently added users were assigned to the wrong VLAN
Selected Answer: D
Question #: 341
Topic #: 1
A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technician MOST likely use?
A. Flow control
B. Traffic shaping
C. VLAN tagging
D. Network performance baselines
Selected Answer: C
Question #: 342
Topic #: 1
Network users reported that a recent firmware upgrade to a firewall did not resolve the issue that prompted the upgrade. Which of the following should be performed NEXT?
A. Reopen the service ticket, request a new maintenance window, and roll back to the anterior firmware version.
B. Gather additional information to ensure users’ concerns are not been caused by a different issue with similar symptoms.
C. Employ a divide-and-conquer troubleshooting methodology by engaging the firewall vendor’s support.
D. Escalate the issue to the IT management team in order to negotiate a new SLA with the user’s manager.
Selected Answer: B
Question #: 343
Topic #: 1
An administrator would like to allow Windows clients from outside the office to access workstations without using third-party software. Which of the following access methods would meet this requirement?
A. Remote desktop gateway
B. Split tunnel
C. Site-to-site VPN
D. VNC
Selected Answer: A
Question #: 344
Topic #: 1
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list
Selected Answer: A
Question #: 345
Topic #: 1
A network engineer is investigating issues on a Layer 2 switch. The department typically shares a switchport during meetings for presentations, but after the first user shares, no other users can connect. Which of the following is MOST likely related to this issue?
A. Spanning Tree Protocol is enabled on the switch.
B. VLAN trunking is enabled on the switch.
C. Port security is configured on the switch.
D. Dynamic ARP inspection is configured on the switch.
Selected Answer: C
Question #: 346
Topic #: 1
A company’s primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?
A. Diverse paths
B. Load balancing
C. Multipathing
D. Virtual Router Redundancy Protocol
Selected Answer: A
Question #: 348
Topic #: 1
A company’s web server is hosted at a local ISP. This is an example of:
A. colocation.
B. an on-premises data center.
C. a branch office.
D. a cloud provider.
Selected Answer: A
Question #: 349
Topic #: 1
A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat?
A. An approved vendor with on-site offices
B. An infected client that pulls reports from the firm
C. A malicious attacker from within the same country
D. A malicious attacker attempting to socially engineer access into corporate offices
Selected Answer: B
Question #: 350
Topic #: 1
Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:
A. an acceptable use policy.
B. a memorandum of understanding.
C. data loss prevention.
D. a non-disclosure agreement.
Selected Answer: C
Question #: 351
Topic #: 1
A technician is trying to install a VoIP phone, but the phone is not turning on. The technician checks the cable going from the phone to the switch, and the cable is good. Which of the following actions is needed for this phone to work?
A. Add a PoE injector.
B. Enable MDIX.
C. Use a crossover cable.
D. Reconfigure the port.
Selected Answer: A
Question #: 352
Topic #: 1
Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification
Selected Answer: A
Question #: 353
Topic #: 1
A client utilizes mobile tablets to view high-resolution images and videos via Wi-Fi within a corporate office building. The previous administrator installed multiple high-density APs with Wi-Fi 5, providing maximum coverage, but the measured performance is still below expected levels. Which of the following would provide the BEST solution?
A. Channel bonding
B. EIRP power settings
C. Antenna polarization
D. A directional antenna
Selected Answer: A
Question #: 354
Topic #: 1
A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket:
• The server’s IP address can be pinged from the client PCs.
• Access to the web resource works correctly when on the server’s console.
• No clients can access the server’s data via URL.
• The server does not have a firewall configured.
• No ACLs are preventing connectivity from the client’s network.
• All services on the server are operating normally, which was confirmed by the server team.
Which of the following actions will resolve the issue?
A. Reset port security on the switchport connecting the server.
B. Adjust the web server’s NTP setting to match the client settings.
C. Configure A records for the web server.
D. Install the correct MIB on the web server.
Selected Answer: C
Question #: 355
Topic #: 1
Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?
A. Data link
B. Network
C. Transport
D. Session
Selected Answer: A
Question #: 356
Topic #: 1
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
A. a divide-and-conquer approach.
B. a bottom-up approach.
C. a top-to-bottom approach.
D. implementing a solution.
Selected Answer: A
Question #: 357
Topic #: 1
Which of the following is the NEXT step to perform network troubleshooting after identifying an issue?
A. Implement a solution.
B. Establish a theory.
C. Escalate the issue.
D. Document the findings.
Selected Answer: B
Question #: 358
Topic #: 1
A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do?
A. Confirm that memory usage on the network devices in the IDF is normal.
B. Access network baseline data for references to an air conditioning issue.
C. Verify severity levels on the corporate syslog server.
D. Check for SNMP traps from a network device in the IDF.
E. Review interface statistics looking for cyclic redundancy errors.
Selected Answer: B
Question #: 359
Topic #: 1
Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices?
A. Twisted cable with a minimum Cat 5e certification
B. Multimode fiber with an SC connector
C. Twinaxial cabling using an F-type connector
D. Cable termination using TIA/EIA-568-B
Selected Answer: A
Question #: 360
Topic #: 1
A technician is installing the Wi-Fi infrastructure for legacy industrial machinery at a warehouse. The equipment only supports 802.11a and 802.11b standards. Speed of transmission is the top business requirement. Which of the following is the correct maximum speed for this scenario?
A. 11Mbps
B. 54Mbps
C. 128Mbps
D. 144Mbps
Selected Answer: B
Question #: 361
Topic #: 1
Which of the following would be the BEST choice to connect branch sites to a main office securely?
A. VPN headend
B. Proxy server
C. Bridge
D. Load balancer
Selected Answer: A
Question #: 362
Topic #: 1
Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated significant network issues occur. Which of the following is the MOST likely cause for the WAN instability?
A. A CDP neighbor has changed
B. Asymmetrical routing
C. A switching loop
D. An incorrect IP address
Selected Answer: B
Question #: 363
Topic #: 1
During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue?
A. Traps
B. MIB
C. OID
D. Baselines
Selected Answer: A
Question #: 364
Topic #: 1
Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network?
A. Layer 1
B. Layer 3
C. Layer 6
D. Layer 7
Selected Answer: C
Question #: 365
Topic #: 1
Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?
A. SDWAN
B. MAN
C. PAN
D. MPLS
Selected Answer: A
Question #: 366
Topic #: 1
A Chief Executive Officer and a network administrator came to an agreement with a vendor to purchase new equipment for the data center. A document was drafted so all parties would be informed about the scope of the project before it started. Which of the following terms BEST describes the document used?
A. Contract
B. Project charter
C. Memorandum of understanding
D. Non-disclosure agreement
Selected Answer: C
Question #: 367
Topic #: 1
ARP spoofing would normally be a part of:
A. an on-path attack.
B. DNS poisoning.
C. a DoS attack.
D. a rogue access point.
Selected Answer: A
Question #: 368
Topic #: 1
A corporation is looking for a method to secure all traffic between a branch office and its data center in order to provide a zero-touch experience for all staff members who work there. Which of the following would BEST meet this requirement?
A. Site-to-site VPN
B. VNC
C. Remote desktop gateway
D. Virtual LANs
Selected Answer: A
Question #: 369
Topic #: 1
A company cell phone was stolen from a technician’s vehicle. The cell phone has a passcode, but it contains sensitive information about clients and vendors. Which of the following should also be enabled?
A. Factory reset
B. Autolock
C. Encryption
D. Two-factor authentication
Selected Answer: D
Question #: 370
Topic #: 1
An organization is interested in purchasing a backup solution that supports the organization’s goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations?
A. MTTR
B. RTO
C. MTBF
D. RPO
Selected Answer: B
Question #: 371
Topic #: 1
During an annual review of policy documents, a company decided to adjust its recovery time frames. The company agreed that critical applications can be down for no more than six hours, and the acceptable amount of data loss is no more than two hours. Which of the following should be documented as the RPO?
A. Two hours
B. Four hours
C. Six hours
D. Eight hours
Selected Answer: A
Question #: 372
Topic #: 1
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 80.87.78.0 – 80.87.78.14
B. 80.87.78.0 – 80.87.78.110
C. 80.87.78.1 – 80.87.78.62
D. 80.87.78.1 – 80.87.78.158
Selected Answer: C
Question #: 373
Topic #: 1
An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?
A. Subinterfaces
B. Link aggregation
C. Load balancing
D. Tunneling
Selected Answer: A
Question #: 374
Topic #: 1
An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?
A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP
Selected Answer: A
Question #: 375
Topic #: 1
The following DHCP scope was configured for a new VLAN dedicated to a large deployment of 325 IoT sensors:
The first 244 IoT sensors were able to connect to the TFTP server, download the configuration file, and register to an IoT management system. The other sensors are being shown as offline. Which of the following should be performed to determine the MOST likely cause of the partial deployment of the sensors?
A. Check the gateway connectivity to the TFTP server.
B. Check the DHCP network scope.
C. Check whether the NTP server is online.
D. Check the IoT devices for a hardware failure.
Selected Answer: B
Question #: 376
Topic #: 1
A network technician receives a report from the server team that a server’s network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data:
Which of the following should the network technician perform to correct the issue?
A. Replace the Cat 5 patch cable with a Cat 6 cable.
B. Install a crossover cable between the server and the switch.
C. Reset the switchport configuration.
D. Use NetFlow data from the switch to isolate the issue.
E. Disable MDIX on the switchport and reboot the server.
Selected Answer: A
Question #: 377
Topic #: 1
Which of the following would be BEST to install to find and block any malicious users within a network?
A. IDS
B. IPS
C. SCADA
D. ICS
Selected Answer: B
Question #: 378
Topic #: 1
Which of the following can be used to validate domain ownership by verifying the presence of pre-agreed content contained in a DNS record?
A. SOA
B. SRV
C. AAA
D. TXT
Selected Answer: D
Question #: 379
Topic #: 1
Network traffic is being compromised by DNS poisoning every time a company’s router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router?
A. Change the device’s default password.
B. Disable router advertisement guard.
C. Activate control plane policing.
D. Disable unneeded network services.
Selected Answer: A
Question #: 380
Topic #: 1
A network administrator installed a new data and VoIP network. Users are now experiencing poor call quality when making calls. Which of the following should the administrator do to increase VoIP performance?
A. Configure a voice VLAN.
B. Configure LACP on all VoIP phones.
C. Configure PoE on the network.
D. Configure jumbo frames on the network.
Selected Answer: A
Question #: 381
Topic #: 1
A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?
A. Implement CDMA.
B. Change from omni to directional.
C. Change the SSID.
D. Change the frequency.
Selected Answer: D
Question #: 382
Topic #: 1
Which of the following issues are present with RIPv2? (Choose two.)
A. Route poisoning
B. Time to converge
C. Scalability
D. Unicast
E. Adjacent neighbors
F. Maximum transmission unit
Selected Answer: BC
Question #: 383
Topic #: 1
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Choose two.)
A. SNMPv3
B. SSH
C. Telnet
D. IPSec
E. ESP
F. Syslog
Selected Answer: AB
Question #: 384
Topic #: 1
An administrator wants to increase the availability of a server that is connected to the office network. Which of the following allows for multiple NICs to share a single IP address and offers maximum performance while providing fault tolerance in the event of a NIC failure?
A. Multipathing
B. Spanning Tree Protocol
C. First Hop Redundancy Protocol
D. Elasticity
Selected Answer: A
Question #: 385
Topic #: 1
A network administrator has received calls every day for the past few weeks from three users who cannot access the network. The administrator asks all the users to reboot their PCs, but the same users still cannot access the system. The following day, three different users report the same issue, and the administrator asks them all to reboot their PCs; however, this does not fix the issue. Which of the following is MOST likely occurring?
A. Incorrect firewall settings
B. Inappropriate VLAN assignment
C. Hardware failure
D. Overloaded CAM table in switch
E. DHCP scope exhaustion
Selected Answer: E
Question #: 386
Topic #: 1
A network administrator is investigating a network event that is causing all communication to stop. The network administrator is unable to use SSH to connect to the switch but is able to gain access using the serial console port. While monitoring port statistics, the administrator sees the following:
Which of the following is MOST likely causing the network outage?
A. Duplicate IP address
B. High collisions
C. Asynchronous route
D. Switch loop
Selected Answer: B
Question #: 387
Topic #: 1
A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue?
A. Incorrect VLAN setting
B. Insufficient DHCP scope
C. Improper NIC setting
D. Duplicate IP address
Selected Answer: B
Question #: 388
Topic #: 1
A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?
A. Network performance baselines
B. VLAN assignments
C. Routing table
D. Device configuration review
Selected Answer: D
Question #: 389
Topic #: 1
Which of the following would enable a network technician to implement dynamic routing?
A. An IPS
B. A bridge
C. A Layer 3 switch
D. A hub
Selected Answer: C
Question #: 390
Topic #: 1
Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth?
A. Cat 5e
B. Cat 6a
C. Cat 7
D. Cat 8
Selected Answer: D
Question #: 391
Topic #: 1
Which of the following is a valid and cost-effective solution to connect a fiber cable into a network switch without available SFP ports?
A. Use a media converter and a UTP cable
B. Install an additional transceiver module and use GBICs
C. Change the type of connector from SC to F-type
D. Use a loopback adapter to make the connection
Selected Answer: A
Question #: 392
Topic #: 1
A network device needs to discover a server that can provide it with an IPv4 address. Which of the following does the device need to send the request to?
A. Default gateway
B. Broadcast address
C. Unicast address
D. Link local address
Selected Answer: B
Question #: 393
Topic #: 1
Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor’s data center?
A. DaaS
B. IaaS
C. PaaS
D. SaaS
Selected Answer: B
Question #: 394
Topic #: 1
A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of attacks BEST describes this finding?
A. Rogue access point
B. Evil twin
C. ARP spoofing
D. VLAN hopping
Selected Answer: A
Question #: 395
Topic #: 1
While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch.
While reviewing the interface information in the switch CLI, the technician notes the port is operating at 100FD but shows many RX and TX errors. The technician moves the computer to another switchport and experiences the same issues.
Which of the following is MOST likely the cause of the low data rate and port errors?
A. Bad switchports
B. Faulty drivers
C. Cable length
D. Incorrect pin-out
Selected Answer: D
Question #: 396
Topic #: 1
A technician is contracted to install a redundant cluster of devices from the ISP in case of hardware failure within the network. Which of the following would provide BEST redundant solution in Layer 2 devices?
A. Multiple routers
B. Multiple switches
C. Multiple firewalls
D. Multiple bridges
Selected Answer: B
Question #: 397
Topic #: 1
Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?
A. Software development life-cycle policy
B. User acceptance testing plan
C. Change management policy
D. Business continuity plan
Selected Answer: D
Question #: 398
Topic #: 1
A security vendor needs to add a note to the DNS to validate the ownership of a company domain before services begin. Which of the following records did the security company MOST likely ask the company to configure?
A. TXT
B. AAAA
C. CNAME
D. SRV
Selected Answer: A
Question #: 399
Topic #: 1
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Enable logging
D. Configuring an access control list
Selected Answer: A
Question #: 400
Topic #: 1
A help desk engineer needs to configure two servers to have the same public IP addresses. Which of the following technologies should the engineer use?
A. NAT
B. VIP
C. DNS caching
D. RFC 1918
E. SDWAN
Selected Answer: A