N10-008: CompTIA Network+ Topic 5
Question #: 401
Topic #: 1
A switch is connected to another switch. Incompatible hardware causes a surge in traffic on both switches. Which of the following configurations will cause traffic to pause, allowing the switches to drain buffers?
A. Speed
B. Flow control
C. 802.1Q
D. Duplex
Selected Answer: B
Question #: 402
Topic #: 1
Which of the following records can be used to track the number of changes on a DNS zone?
A. SOA
B. SRV
C. PTR
D. NS
Selected Answer: A
Question #: 403
Topic #: 1
A network administrator is investigating a performance issue on a dual-link connection — VPN and MPLS — to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected for the VPN connection. Which of the following will MOST likely point to the root cause of the issue?
A. Checking the routing tables on both sides to ensure there is no asymmetric routing
B. Checking on the partner network for a missing route pointing to the VPN connection
C. Running iPerf on both sides to confirm the delay that is measured is accurate
D. Checking for an incorrect VLAN assignment affecting the MPLS traffic
Selected Answer: A
Question #: 404
Topic #: 1
Which of the following is a requirement when certifying a network cabling as Cat 7?
A. Ensure the patch panel is certified for the same category.
B. Limit 10Gb transmissions to 180ft (55m).
C. Use F-type connectors on the network terminations.
D. Ensure the termination standard is TIA/EIA-568-A.
Selected Answer: D
Question #: 405
Topic #: 1
Which of the following architectures is used for FTP?
A. Client-server
B. Service-oriented
C. Connection-oriented
D. Data-centric
Selected Answer: A
Question #: 406
Topic #: 1
Which of the following bandwidth management techniques uses butters at the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization
Selected Answer: A
Question #: 407
Topic #: 1
An engineer needs to verify the external record for SMTP traffic. The engineer logged in to the server and entered the nslookup command. Which of the following commands should the engineer send before entering the DNS name?
A. set type=A
B. ls -d company.mail.com
C. set domain=company.mail.com
D. set querytype=MX
Selected Answer: D
Question #: 408
Topic #: 1
A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation. Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt?
A. The ARP table
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switch
Selected Answer: C
Question #: 409
Topic #: 1
A company is reviewing ways to cut the overall cost of its IT budget. A network technician suggests removing various computer programs from the IT budget and only providing these programs on an as-needed basis. Which of the following models would meet this requirement?
A. Multitenancy
B. IaaS
C. SaaS
D. VPN
Selected Answer: C
Question #: 410
Topic #: 1
An IP address is maintained despite a failing UPS that causes a workstation to restart several times. Which of the following would allow this to occur?
A. DHCP reservation
B. DHCP scope
C. Name server
D. Root DNS server
Selected Answer: A
Question #: 411
Topic #: 1
A network administrator wants to control new router deployments via the use of application programming interfaces (APIs). This would be an example of:
A. software-defined networking.
B. a three-tiered architecture.
C. collapsed backbone.
D. top-of-rack switching.
Selected Answer: A
Question #: 412
Topic #: 1
A technician is equipped with a tablet, a smartphone, and a laptop to troubleshoot a switch with the help of support over the phone. However, the technician is having issues interconnecting all these tools in troubleshooting the switch. Which of the following should the technician use to gain connectivity?
A. PAN
B. WAN
C. LAN
D. MAN
Selected Answer: A
Question #: 413
Topic #: 1
Users within a corporate network need to connect to the internet, but corporate network policy does not allow direct connections. Which of the following is MOST likely to be used?
A. Proxy server
B. VPN client
C. Bridge
D. VLAN
Selected Answer: A
Question #: 414
Topic #: 1
A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?
A. Site-to-site
B. Secure Shell
C. In-band management
D. Remote desktop connection
Selected Answer: A
Question #: 415
Topic #: 1
A technician is checking network devices to look for opportunities to improve security. Which of the following tools would BEST accomplish this task?
A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner
Selected Answer: C
Question #: 416
Topic #: 1
Which of the following describes when an active exploit is used to gain access to a network?
A. Penetration testing
B. Vulnerability testing
C. Risk assessment
D. Posture assessment
E. Baseline testing
Selected Answer: A
Question #: 417
Topic #: 1
A homeowner frequently has guests visit and would like to install a wireless router for their personal devices. The homeowner wants to ensure that the wireless router is compatible with the widest range of devices possible. Which of the following standards should a technician suggest?
A. 802 11ac
B. 802.11b
C. 802.11g
D. 802.11n
Selected Answer: D
Question #: 418
Topic #: 1
A GRE tunnel has been configured between two remote sites. Which of the following features, when configured, ensures the GRE overhead does not affect payload?
A. Jumbo frames
B. Auto medium-dependent interface
C. Interface crossover
D. Collision detection
Selected Answer: A
Question #: 419
Topic #: 1
Which of the following attacks MOST likely utilizes a botnet to disrupt traffic?
A. DDoS
B. Deauthentication
C. Social engineering
D. Ransomware
E. DNS poisoning
Selected Answer: A
Question #: 420
Topic #: 1
A network administrator is looking at switch features and is unsure whether to purchase a model with PoE. Which of the following devices that commonly utilize PoE should the administrator consider? (Choose two.)
A. VoIP phones
B. Cameras
C. Printers
D. Cable modems
E. Laptops
F. UPSs
Selected Answer: AB
Question #: 421
Topic #: 1
All packets arriving at an interface need to be fully analyzed. Which of the following features should be used to enable monitoring of the packets?
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
Selected Answer: D
Question #: 422
Topic #: 1
Which of the following record types would be used to define where SIP is found?
A. SRV
B. CNAME
C. A
D. MX
Selected Answer: A
Question #: 423
Topic #: 1
Which of the following is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols?
A. OSPF
B. RIP
C. EIGRP
D. BGP
Selected Answer: C
Question #: 424
Topic #: 1
A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN
Selected Answer: A
Question #: 425
Topic #: 1
A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC’s IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
Selected Answer: B
Question #: 426
Topic #: 1
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. Notifications
C. Alert
D. Errors
Selected Answer: B
Question #: 427
Topic #: 1
An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, the administrator sees the following entries:
Which of the following firewall rules is MOST likely causing the issue?
A. Rule 1
B. Rule 2
C. Rule 3
D. Rule 4
Selected Answer: B
Question #: 428
Topic #: 1
Which of the following would be the MOST likely attack used to bypass an access control vestibule?
A. Tailgating
B. Phishing
C. Evil twin
D. Brute-force
Selected Answer: A
Question #: 429
Topic #: 1
A company is considering shifting its business to the cloud. The management team is concerned about the availability of the third-party cloud service. Which of the following should the management team consult to determine the promised availability of the cloud provider?
A. Memorandum of understanding
B. Business continuity plan
C. Disaster recovery plan
D. Service-level agreement
Selected Answer: D
Question #: 430
Topic #: 1
A new company recently moved into an empty office space. Within days, users in the next office began noticing increased latency and packet drops with their Wi-Fi-connected devices. Which of the following is the MOST likely reason for this issue?
A. Channel overlap
B. Distance from the AP
C. Bandwidth latency
D. Disabled WPS
E. Network congestion
Selected Answer: A
Question #: 431
Topic #: 1
A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit the company’s needs?
A. SFTP
B. Fibre Channel
C. iSCSI
D. FTP
Selected Answer: C
Question #: 432
Topic #: 1
A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible?
A. Install motion detection.
B. Install cameras.
C. Install tamper detection.
D. Hire a security guard.
Selected Answer: B
Question #: 433
Topic #: 1
A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?
A. Port tagging
B. Port security
C. Port mirroring
D. Port aggregation
Selected Answer: B
Question #: 434
Topic #: 1
A cafeteria is facing lawsuits related to criminal internet access that was made over its guest network. The marketing team, however, insists on keeping the cafeteria’s phone number as the wireless passphrase. Which of the following actions would improve wireless security while accommodating the marketing team and accepting the terms of use?
A. Setting WLAN security to use EAP-TLS
B. Deploying a captive portal for user authentication
C. Using geofencing to limit the area covered by the WLAN
D. Configuring guest network isolation
Selected Answer: B
Question #: 435
Topic #: 1
An administrator would like to have two servers at different geographical locations provide fault tolerance and high performance while appearing as one URL to users. Which of the following should the administrator implement?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Warm site
Selected Answer: A
Question #: 436
Topic #: 1
An IT technician successfully connects to the corporate wireless network at a bank. While performing some tests, the technician observes that the physical address of the DHCP server has changed even though the network connection has not been lost. Which of the following would BEST explain this change?
A. Server upgrade
B. Duplicate IP address
C. Scope exhaustion
D. Rogue server
Selected Answer: D
Question #: 437
Topic #: 1
An ISP is providing internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out. Which of the following terminations should the technician use when running a cable from the ISP’s port to the front desk?
A. F-type connector
B. TIA/EIA-568-B
C. LC
D. SC
Selected Answer: B
Question #: 438
Topic #: 1
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NVF
B. SDWAN
C. VIP
D. MPLS
Selected Answer: A
Question #: 439
Topic #: 1
A network technician needs to ensure the company’s external mail server can pass reverse lookup checks. Which of the following records would the technician MOST likely configure?
A. PTR
B. AAAA
C. SPF
D. CNAME
Selected Answer: A
Question #: 440
Topic #: 1
A network administrator views a network pcap and sees a packet containing the following:
Which of the following are the BEST ways for the administrator to secure this type of traffic? (Choose two.)
A. Migrate the network to IPv6.
B. Implement 802.1 X authentication.
C. Set a private community string.
D. Use SNMPv3.
E. Incorporate SSL encryption.
F. Utilize IPSec tunneling.
Selected Answer: CD
Question #: 441
Topic #: 1
A network technician is troubleshooting a network issue for employees who have reported issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees’ building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?
A. The connection type is not rated for that distance.
B. A broadcast storm is occurring on the subnet.
C. The cable run has interference on it.
D. The connection should be made using a Cat 6 cable.
Selected Answer: A
Question #: 442
Topic #: 1
Which of the following is a security flaw in an application or network?
A. A threat
B. A vulnerability
C. An exploit
D. A risk
Selected Answer: B
Question #: 443
Topic #: 1
An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics in the switch’s CLI, the administrator discovers the uplink is at 100% utilization. However, the administrator is unsure how to identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?
A. SNMP
B. Traps
C. Syslog
D. NetFlow
Selected Answer: D
Question #: 444
Topic #: 1
Two new network switches located in different buildings are connected together with single-mode fiber. However, no link exists between the two switches. Which of the following steps should the technician perform FIRST to troubleshoot the issue?
A. Reverse TX/RX on the fiber patch cord at one building.
B. Replace the fiber patch cords in both buildings.
C. Clean the fiber patch cord connectors in both buildings.
D. Connect the fiber patch cord to an OTDR at one building.
Selected Answer: A
Question #: 445
Topic #: 1
Which of the following OSI model layers would allow a user to access and download files from a remote computer?
A. Session
B. Presentation
C. Network
D. Application
Selected Answer: D
Question #: 446
Topic #: 1
A new office space is being designed. The network switches are up, but no services are running yet. A network engineer plugs in a laptop configured as a DHCP client to a switch. Which of the following IP addresses should be assigned to the laptop?
A. 10.1.1.1
B. 169.254.1.128
C. 172.16.128.128
D. 192.168.0.1
Selected Answer: B
Question #: 447
Topic #: 1
An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?
A. 110
B. 143
C. 587
D. 636
Selected Answer: C
Question #: 448
Topic #: 1
Which of the following BEST describes a split-tunnel client-to-server VPN connection?
A. The client sends all network traffic down the VPN tunnel.
B. The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability.
C. The client sends some network traffic down the VPN tunnel and other traffic to the local gateway.
D. The client connects to multiple remote sites at the same time.
Selected Answer: C
Question #: 449
Topic #: 1
Which of the following is the MOST secure connection used to inspect and provide controlled internet access when remote employees are connected to the corporate network?
A. Site-to-site VPN
B. Full-tunnel VPN
C. Split-tunnel VPN
D. SSH
Selected Answer: B
Question #: 450
Topic #: 1
An engineer is troubleshooting poor performance on the network that occurs during work hours. Which of the following should the engineer do to improve performance?
A. Replace the patch cables.
B. Create link aggregation.
C. Create separation rules on the firewall.
D. Create subinterfaces on the existing port.
Selected Answer: B
Question #: 451
Topic #: 1
A customer reports there is no access to resources following the replacement of switches. A technician goes to the site to examine the configuration and discovers redundant links between two switches. Which of the following is the reason the network is not functional?
A. The ARP cache has become corrupt.
B. CSMA/CD protocols have failed.
C. STP is not configured.
D. The switches are incompatible models.
Selected Answer: C
Question #: 452
Topic #: 1
Users are reporting poor wireless performance in some areas of an industrial plant. The wireless controller is measuring a low EIRP value compared to the recommendations noted on the most recent site survey. Which of the following should be verified or replaced for the EIRP value to meet the site survey’s specifications? (Choose two.)
A. AP transmit power
B. Channel utilization
C. Signal loss
D. Update ARP tables
E. Antenna gain
F. AP association time
Selected Answer: AE
Question #: 453
Topic #: 1
A coffee shop owner hired a network consultant to provide recommendations for installing a new wireless network. The coffee shop customers expect high speeds even when the network is congested. Which of the following standards should the consultant recommend?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
Selected Answer: B
Question #: 454
Topic #: 1
A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?
A. Capture a network baseline.
B. Perform an environmental review.
C. Read the network logs.
D. Run a bandwidth test.
Selected Answer: A
Question #: 455
Topic #: 1
A company has multiple offices around the world. The computer rooms in some office locations are too warm. Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put in place to automate temperature readings with internal resources?
A. Implement NetFlow.
B. Hire a programmer to write a script to perform the checks.
C. Utilize ping to measure the response.
D. Use SNMP with an existing collector server.
Selected Answer: D
Question #: 456
Topic #: 1
Which of the following architectures reduces network latency by enforcing a limit on the number of switching devices on the frame’s path between any internal hosts?
A. Spine and leaf
B. Software-defined network
C. Three-tiered
D. Collapsed core
Selected Answer: D
Question #: 457
Topic #: 1
A network administrator is decommissioning a server. Which of the following will the network administrator MOST likely consult?
A. Onboarding and offboarding policies
B. Business continuity plan
C. Password requirements
D. Change management documentation
Selected Answer: D
Question #: 458
Topic #: 1
A technician is investigating an issue with connectivity at customer’s location. The technician confirms that users can access resources locally but not over the internet. The technician theorizes that the local router has failed and investigates further. The technician’s testing results show that the router is functional; however, users still are unable to reach resources on the internet. Which of the following describes what the technician should do NEXT?
A. Document the lessons learned.
B. Escalate the issue.
C. Identify the symptoms.
D. Question users for additional information.
Selected Answer: B
Question #: 459
Topic #: 1
On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator check after successfully testing the cable that was wired for TIA/EIA-568A on both ends?
A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches
Selected Answer: A
Question #: 460
Topic #: 1
The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents. Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?
A. Change the default permissions to implicit deny.
B. Configure uniform ACLs to employees and NAC for contractors.
C. Deploy an RDP server to centralize the access to the network.
D. Implement role-based access control.
Selected Answer: D
Question #: 463
Topic #: 1
Which of the following types of planes propagates routing information in an SDWAN solution?
A. Orchestration plane
B. Management plane
C. Control plane
D. Data plane
Selected Answer: C
Question #: 464
Topic #: 1
A technician is running new Cat 5e cables to a server room. Which of the following tools should the technician use to terminate the cables at the patch panel?
A. Multimeter
B. Cable crimper
C. Toner probe
D. Punchdown tool
Selected Answer: D
Question #: 465
Topic #: 1
A disaster recovery team needs a solution that would best meet the following requirements:
• The server infrastructure has been pre-installed
• The fail-over location offers basic life support.
• The fail-over location provides basic network connectivity.
• Minimizing cost is preferred over quicker business recovery times
• The expected time for services to be fully operational is days.
Which of the following sites would meet the requirements?
A. Cold site
B. Cloud site
C. Warm site
D. Hot site
Selected Answer: C
Question #: 466
Topic #: 1
A technician troubleshoots a computer that has intermittent network connectivity and notices the termination point is loose. The technician also observes that the patch cable has already been replaced.
Which of the following should the technician do NEXT?
A. Use a tone generator to trace the cable
B. Use a multimeter to determine if PoE is available on the switchport
C. Use a cable crimper to replace the RJ45 connector on the patch cable
D. Use a punchdown tool to reseat the copper in the wall jack
Selected Answer: A
Question #: 467
Topic #: 1
A company wants to invest in new hardware for the core network infrastructure. The management team requires that the infrastructure be capable of being repaired in less than 60 minutes if any major part fails. Which of the following metrics is MOST likely associated with this requirement?
A. RPO
B. MTTR
C. FHRP
D. MTBF
Selected Answer: B
Question #: 468
Topic #: 1
Which of the following devices and encapsulations are found at the data link layer? (Choose two.)
A. Session
B. Frame
C. Firewall
D. Switch
E. Packet
F. Router
Selected Answer: BD
Question #: 469
Topic #: 1
After rebooting an AP, a user is no longer able to connect to the enterprise LAN. A technician plugs a laptop in to the same network jack and receives the IP 169.254.0.200. Which of the following is MOST likely causing the issue?
A. DHCP scope exhaustion
B. Signal attenuation
C. Channel overlap
D. Improper DNS configuration
Selected Answer: A
Question #: 470
Topic #: 1
A network administrator is concerned about a rainbow table being used to help access network resources. Which of the following must be addressed to reduce the likelihood of a rainbow table being effective?
A. Password policy
B. Remote access policy
C. Acceptable use policy
D. Data loss prevention policy
Selected Answer: A
Question #: 471
Topic #: 1
Which of the following describes the ability of a corporate IT department to expand its cloud-hosted VM environment with minimal effort?
A. Scalability
B. Load balancing
C. Multitenancy
D. Geo-redundancy
Selected Answer: A
Question #: 472
Topic #: 1
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
A. Packet capture
B. iPerf
C. SIEM log review
D. Internet speed test
Selected Answer: B
Question #: 473
Topic #: 1
Which of the following can be used to decrease latency during periods of high utilization of a firewall?
A. Hot site
B. Content inspection
C. HA pair
D. VRRP
Selected Answer: C
Question #: 474
Topic #: 1
A customer calls the help desk to report that a Windows PC is unable to open any websites or access any server shares. The help desk technician suspects there is an issue with the configuration. Which of the following commands should the technician issue FIRST to troubleshoot the issue?
A. tracert
B. netstat
C. arp
D. ipconfig
E. nmap
Selected Answer: D
Question #: 475
Topic #: 1
A network technician needs to select an AP that will support at least 1.3Gbps and 5GHz only. Which of the following wireless standards must the AP support to meet the requirements?
A. B
B. AC
C. AX
D. N
E. G
Selected Answer: B
Question #: 476
Topic #: 1
Which of the following devices would be used to extend the range of a wireless network?
A. A repeater
B. A media converter
C. A router
D. A switch
Selected Answer: A
Question #: 477
Topic #: 1
Which of the following redundant devices creates broadcast storms when connected together on a high-availability network?
A. Switches
B. Routers
C. Access points
D. Servers
Selected Answer: A
Question #: 478
Topic #: 1
A technician is investigating a misconfiguration on a Layer 3 switch. When the technician logs in and runs a command, the following data is shown:
Which of the following commands generated this output?
A. show route
B. show config
C. show interface
D. tcpdump
E. netstat -s
Selected Answer: A
Question #: 479
Topic #: 1
An IT technician is working on a support ticket regarding an unreachable website. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?
A. ipconfig
B. tracert
C. arp
D. netstat
Selected Answer: B
Question #: 480
Topic #: 1
An ISP configured an internet connection to provide 20Mbps, but actual data rates are occurring at 10Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?
A. Throughput
B. Latency
C. Bandwidth
D. Jitter
Selected Answer: A
Question #: 481
Topic #: 1
An application team is deploying a new application. The application team would like the network team to monitor network performance and create alerts if fluctuations in the round-trip time occur for that traffic. Which of the following should the network team monitor to meet this requirement?
A. Bandwidth
B. Latency
C. Loss
D. Cyclic redundancy check
Selected Answer: B
Question #: 482
Topic #: 1
A network administrator is configuring Neighbor Discovery Protocol in an IPv6 network to ensure an attacker cannot spoof link-layer addresses of network devices. Which of the following should the administrator implement?
A. MAC filtering
B. Router Advertisement Guard
C. Port security
D. DNSSEC
Selected Answer: B
Question #: 483
Topic #: 1
A network architect is developing documentation for an upcoming IPv4/IPv6 dual-stack implementation. The architect wants to shorten the following IPv6 address: ef82:0000:0000:0000:0000:1ab1:1234:1bc2. Which of the following is the MOST appropriate shortened version?
A. ef82:0:1ab1:1234:1bc2
B. ef82:0::1ab1:1234:1bc2
C. ef82:0:0:0:0:1ab1:1234:1bc2
D. ef82::1ab1:1234:1bc2
Selected Answer: D
Question #: 484
Topic #: 1
Which of the following default ports is MOST likely used to send availability and environmental messages about specific devices across the network?
A. 23
B. 53
C. 389
D. 514
E. 3306
Selected Answer: D
Question #: 485
Topic #: 1
A newly installed multifunction copier needs to be set up so scanned documents can be emailed to recipients. Which of the following ports from the copier’s IP address should be allowed?
A. 22
B. 25
C. 53
D. 80
Selected Answer: B
Question #: 486
Topic #: 1
Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?
A. WLAN controller
B. Load balancer
C. SIEM solution
D. Syslog server
Selected Answer: A
Question #: 487
Topic #: 1
A PC and a network connectivity, and a help desk technician is attempting to resolve the issue. The technician plans to run a constant ping command from a Windows workstation while testing various possible reasons for the connectivity issue. Which of the following should the technician use?
A. ping -w
B. ping -i
C. ping -s
D. ping -t
Selected Answer: D
Question #: 488
Topic #: 1
Which of the following is the MOST effective security control to keep a company’s physical perimeter protected against intrusions leveraged by social-engineering techniques?
A. Employee training
B. Biometric lockers
C. Access control vestibule
D. Motion detection
Selected Answer: A
Question #: 489
Topic #: 1
A customer called the help desk to report a network issue. The customer recently added a hub between the switch and the router in order to duplicate the traffic flow to a logging device. After adding the hub, all the other network components that were connected to the switch slowed more than expected. Which of the following is the MOST likely cause of the issue?
A. Duplex mismatch
B. Flow control failure
C. STP malfunction
D. 802.1Q disabled
Selected Answer: A
Question #: 490
Topic #: 1
A fiber patch cable, which was being stored in an unsecure telecommunications closet with janitorial supplies, was damaged and caused an outage. A network technician replaced the broken cable with a new cable from a sealed bag. However, this solution did not resolve the outage. Which of the following is the MOST likely explanation?
A. Incorrect pinout
B. Incorrect transceivers
C. Reversed transmit and receive
D. Dirty optical cables
Selected Answer: C
Question #: 491
Topic #: 1
An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment?
A. Uptime
B. NetFlow baseline
C. Review TTL stats
D. Interface statistics
Selected Answer: A
Question #: 492
Topic #: 1
A technician uses a badge to enter a security checkpoint on a corporate campus. An unknown individual quickly walks in behind the technician without speaking. Which of the following types of attacks did the technician experience?
A. Tailgating
B. Evil twin
C. On-path
D. Piggybacking
Selected Answer: A
Question #: 493
Topic #: 1
A company is opening a new building on the other side of its campus. The distance from the closest building to the new building is 1,804ft (550m). The company needs to connect the networking equipment in the new building to the other buildings on the campus without using a repeater. Which of the following transceivers should the company use?
A. 10GBASE-SW
B. 10GBASE-LR
C. 10GBASE-LX4 over multimode fiber
D. 10GBASE-SR
Selected Answer: B
Question #: 494
Topic #: 1
An AP uses a 98ft (30m) Cat 6 cable to connect to an access switch. The cable is wired through a duct close to a three-phase motor installation. Anytime the three-phase is turned on, all users connected to the switch experience high latency on the network. Which of the following is MOST likely the cause of the issue?
A. Interference
B. Attenuation
C. Open circuit
D. Short circuit
Selected Answer: A
Question #: 495
Topic #: 1
An IT technician installs five old switches in a network. In addition to the low port rates on these switches, they also have improper network configurations. After three hours, the network becomes overwhelmed by continuous traffic and eventually shuts down. Which of the following is causing the issue?
A. Broadcast storm
B. Collisions
C. IP settings
D. Routing loops
Selected Answer: A
Question #: 496
Topic #: 1
An engineer is designing a network topology for a company that maintains a large on-premises private cloud. A design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal server IP ranges. Which of the following defense strategies helps meet this requirement?
A. Implementing a screened subnet
B. Deploying a honeypot
C. Utilizing network access control
D. Enforcing a Zero Trust model
Selected Answer: A
Question #: 497
Topic #: 1
Many IP security cameras use RTSP to control media playback. Which of the following default transport layer port numbers does RTSP use?
A. 445
B. 554
C. 587
D. 5060
Selected Answer: B
Question #: 498
Topic #: 1
Which of the following would be increased by adding encryption to data communication across the network?
A. Availability
B. Integrity
C. Accountability
D. Confidentiality
Selected Answer: D
Question #: 499
Topic #: 1
A network technician is working at a new office location and needs to connect one laptop to another to transfer files. The laptops are newer models and do not have Ethernet ports. Access points are not available either. Which of the following types of wireless network SSIDs does the network technician need to configure to be able to connect the laptops together?
A. Independent Basic Service Set
B. Extended Service Set
C. Distribution System Service
D. Basic Service Set
Selected Answer: A
Question #: 500
Topic #: 1
An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization’s requirements?
A. Cloud site
B. Cold site
C. Warm site
D. Hot site
Selected Answer: A