N10-008: CompTIA Network+ Topic 6
Question #: 501
Topic #: 1
A network administrator is investigating reports about network performance and finds high utilization on a switch uplink. The administrator is unsure whether this is an anomaly or normal behavior that will require an upgrade to resolve. Which of the following should the administrator reference to gain historical perspective?
A. Device configuration review
B. ARP table export
C. Service-level agreement
D. Network performance baseline
Selected Answer: D
Question #: 502
Topic #: 1
A network administrator is troubleshooting a client’s device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which of the following tools would be the BEST option for the network administrator to use to further troubleshoot?
A. Tone generator
B. Multimeter
C. Optical time-domain reflectometer
D. Cable tester
Selected Answer: D
Question #: 503
Topic #: 1
A non-employee was able to enter a server room. Which of the following could have prevented this from happening?
A. A security camera
B. A biometric reader
C. OTP key fob
D. Employee training
Selected Answer: B
Question #: 504
Topic #: 1
A large number of PCs are obtaining an APIPA IP address, and a number of new computers were added to the network. Which of the following is MOST likely causing the PCs to obtain an APIPA address?
A. Rogue DHCP server
B. Network collision
C. Incorrect DNS settings
D. DHCP scope exhaustion
Selected Answer: D
Question #: 505
Topic #: 1
An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report.
The tool was configured to scan using the following information:
Network address: 172.28.16.0 –
CIDR: /22 –
The engineer collected the following information from the client workstation:
IP address: 172.28.17.206 –
Subnet mask: 255.255.252.0 –
Which of the following MOST likely explains why the tool is failing to detect some workstations?
A. The scanned network range is incorrect.
B. The subnet mask on the client is misconfigured.
C. The workstation has a firewall enabled.
D. The tool is unable to scan remote networks.
Selected Answer: B
Question #: 506
Topic #: 1
Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet?
A. Allow connections only to an internal proxy server.
B. Deploy an IDS system and place it in line with the traffic.
C. Create a screened network and move the devices to it.
D. Use a host-based network firewall on each device.
Selected Answer: A
Question #: 507
Topic #: 1
A network administrator notices excessive wireless traffic occurring on an access point after normal business hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit wireless access outside the building?
A. Set up a private VLAN.
B. Disable roaming on the WAP.
C. Change to a directional antenna.
D. Stop broadcasting of the SSID.
Selected Answer: C
Question #: 508
Topic #: 1
A technician thinks one of the router ports is flapping. Which of the following available resources should the technician use in order to determine if the router is flapping?
A. Audit logs
B. NetFlow
C. Syslog
D. Traffic logs
Selected Answer: C
Question #: 509
Topic #: 1
Which of the following layers is where TCP/IP port numbers identify which network application is receiving the packet and where it is applied?
A. 3
B. 4
C. 5
D. 6
E. 7
Selected Answer: B
Question #: 510
Topic #: 1
A user reports that a crucial fileshare is unreachable following a network upgrade that was completed the night before. A network technician confirms the problem exists. Which of the following troubleshooting steps should the network technician perform NEXT?
A. Establish a theory of probable cause.
B. Implement a solution to fix the problem.
C. Create a plan of action to resolve the problem.
D. Document the problem and the solution.
Selected Answer: C
Question #: 511
Topic #: 1
A network engineer is designing a wireless network that has the following requirements:
• Network speed must be higher than 100Mbps
• Must use the 2.4GHz and 5GHz bands
Which of the following 802.11 standards should the engineer select?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Selected Answer: D
Question #: 512
Topic #: 1
A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low. Which of the following is the MOST appropriate mechanism to handle this issue?
A. Traffic shaping
B. Flow control
C. NetFlow
D. Link aggregation
Selected Answer: A
Question #: 513
Topic #: 1
Which of the following protocols can be routed?
A. FCoE
B. Fibre Channel
C. iSCSI
D. NetBEUI
Selected Answer: C
Question #: 514
Topic #: 1
A Fortune 500 company would like to move its on-premises corporate email systems to a multitenant product hosted in the cloud where no maintenance of the underlying server OS or platform is required. Which of the following BEST represents the model the company should choose?
A. Public
B. Private
C. Hybrid
D. Community
Selected Answer: C
Question #: 515
Topic #: 1
Which of the following situations would require an engineer to configure subinterfaces?
A. In a router-on-a-stick deployment with multiple VLANs
B. In order to enable inter-VLAN routing on a multilayer switch
C. When configuring VLAN trunk links between switches
D. After connecting a router that does not support 802.1Q VLAN tags
Selected Answer: A
Question #: 516
Topic #: 1
At which of the following OSI model layers does a MAC filter list for a wireless infrastructure operate?
A. Physical
B. Network
C. Session
D. Data link
Selected Answer: D
Question #: 517
Topic #: 1
The Chief Executive Officer of a company wants to ensure business operations are not disrupted in the event of a disaster. The solution must have fully redundant equipment, real-time synchronization, and zero data loss. Which of the following should be prepared?
A. Cloud site
B. Warm site
C. Hot site
D. Cold site
Selected Answer: C
Question #: 518
Topic #: 1
An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?
A. STP
B. 802.1Q
C. Duplex
D. LACP
Selected Answer: D
Question #: 519
Topic #: 1
A company wants to mitigate unauthorized physical connectivity after implementing a hybrid work schedule. Which of the following will the company MOST likely configure?
A. Intrusion prevention system
B. DHCP snooping
C. ARP inspection
D. Port security
Selected Answer: D
Question #: 520
Topic #: 1
A customer cannot reach a web application on a local server. The network consultant suspects that the server is not accepting the HTTPS connection. Which of the following commands should the consultant run on the server to determine what is occurring?
A. route
B. arp
C. nmap
D. netstat
Selected Answer: D
Question #: 521
Topic #: 1
A help desk technician is troubleshooting a Windows server named SQL.local and wants to check which port a specific application is running on. Which of the following commands should the technician run?
A. dig
B. traceroute
C. arp
D. netstat
Selected Answer: D
Question #: 522
Topic #: 1
A network administrator is configuring a static DSL connection on the perimeter router to use a backup route to the fiber connection using OSPF routing. The administrator notices all traffic is going over the DSL connection and both links are working. Which of the following should the administrator do to adjust the routing settings for the fiber connection to be used by the router?
A. Add the DSL connection to the neighbor table for OSPF protocol
B. Change the routing protocol to EIGRP for the fiber connection
C. Increase the administrative distance of the DSL connection
D. Create a separate VLAN for the DSL connection
Selected Answer: C
Question #: 523
Topic #: 1
A Chief Information Officer wants to monitor network breaching in a passive, controlled manner. Which of the following would be BEST to implement?
A. Honeypot
B. Perimeter network
C. Intrusion prevention system
D. Port security
Selected Answer: A
Question #: 524
Topic #: 1
A technician monitors a switch interface and notices it is not forwarding frames on a trunked port. However, the cable and interfaces are in working order. Which of the following is MOST likely the cause of the issue?
A. STP policy
B. Flow control
C. 802.1Q configuration
D. Frame size
Selected Answer: C
Question #: 525
Topic #: 1
A wireless network technician is receiving reports from some users who are unable to see both of the corporate SSIDs on their mobile devices. A site survey was recently commissioned, and the results verified acceptable RSSI from both APs in all user areas. The APs support modern wireless standards and are all broadcasting their SSIDs. The following table shows some of the current AP settings:
Which of the following changes would result in all of the user devices being capable of seeing both corporate SSIDs?
A. Implementing the WPA2 Enterprise authentication standard
B. Implementing omnidirectional antennas for both APs
C. Configuring the highest power settings for both APs
D. Configuring both APs to use the 802.11ac wireless standard
Selected Answer: D
Question #: 526
Topic #: 1
An infrastructure company is implementing a cabling solution to connect sites on multiple continents. Which of the following cable types should the company use for this project?
A. Cat 7
B. Single-mode
C. Multimode
D. Cat 6
Selected Answer: B
Question #: 527
Topic #: 1
A user is required to log in to a main web application, which then grants the user access to all other programs needed to complete job-related tasks. Which of the following authentication methods does this setup describe?
A. SSO
B. RADIUS
C. TACACS+
D. Multifactor authentication
E. 802.1X
Selected Answer: A
Question #: 528
Topic #: 1
A company has a geographically remote office. In order to connect to the internet, the company has decided to use a satellite WAN link. Which of the following is the GREATEST concern for this type of connection?
A. Duplex
B. Collisions
C. Jitter
D. Encapsulation
Selected Answer: C
Question #: 529
Topic #: 1
A network technician is deploying multiple switches for a new office. The switches are separately managed and need to be cabled in to support dual firewalls in a HA setup. Which of the following should the technician enable to support proper stability of the network switches?
A. NTP
B. CDMA
C. STP
D. LACP
E. 802.1Q
Selected Answer: C
Question #: 530
Topic #: 1
Which of the following would be used to filter web traffic based on content?
A. Proxy server
B. Load balancer
C. Media converter
D. Access point
Selected Answer: A
Question #: 531
Topic #: 1
A bank installed a new smart TV to stream online video services, but the smart TV was not able to connect to the branch Wi-Fi. The next day, a technician was able to connect the TV to the Wi-Fi, but a bank laptop lost network access at the same time. Which of the following is the MOST likely cause?
A. DHCP scope exhaustion
B. AP configuration reset
C. Hidden SSID
D. Channel overlap
Selected Answer: D
Question #: 532
Topic #: 1
Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the MOST likely reason the users cannot connect to the network?
A. Mixed UTP and STP cables are being used.
B. The patch cables are not plenum rated.
C. The cable distance is exceeded.
D. An incorrect pinout on the patch cable is being used.
Selected Answer: D
Question #: 533
Topic #: 1
While troubleshooting a network outage, a technician discovers symptoms that indicate a patch cable is connecting the core switch to the router. A network engineer confirms the theory is plausible, and the technician tests the cable. The cable passes the test, and the technician properly plugs the cable back into the correct network ports. However, the network outage continues. Which of the following is the NEXT step the technician should take to troubleshoot the network outage?
A. Establish a new theory.
B. Verify full system functionality.
C. Establish a plan of action.
D. Continue to work the original theory.
Selected Answer: C
Question #: 534
Topic #: 1
A help desk supervisor discovers the following ticket excerpt while reviewing notes in a customer’s account:
Received report that customer was unable to use the scanner to read barcodes, the internet no longer worked, and the monitor was fuzzy. Arrived on site and began troubleshooting.
Confirmed monitor issue. Replaced VGA cable.
Confirmed scanner failure. Scanner USB cable was unattached. Reattached cable.
Confirmed internet issue. Duplicated on test laptop. Escalated to ISP.
Which of the following BEST describes what the technician was doing?
A. The technician was questioning the obvious.
B. The technician was implementing preventative measures.
C. The technician was approaching multiple problems individually.
D. The technician was determining if anything had changed.
Selected Answer: C
Question #: 535
Topic #: 1
Which of the following routing protocols should be implemented to create a route between a local area network and an ISP?
A. BGP
B. EIGRP
C. RIP
D. OSPF
Selected Answer: A
Question #: 536
Topic #: 1
A technician would like to implement a low-latency Wi-Fi network. Which of the following standards should the technician deploy for the network if the expected user bandwidth is 450Mbps?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Selected Answer: D
Question #: 537
Topic #: 1
Which of the following attacks, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network?
A. VLAN hopping
B. On-path attack
C. IP spoofing
D. Evil twin
Selected Answer: A
Question #: 538
Topic #: 1
A network administrator implements a group of access points, only changing the SSID, credentials, and IP address. Shortly after, users begin reporting poor quality and video loss while on video calls in the conference room. Which of the following should the administrator do to MOST effectively troubleshoot during business hours?
A. Remove the current antennas and replace them with directional antennas on each AP.
B. Disconnect the AP and move it closer to the conference room.
C. Configure separate channels on APs that are not supporting the conference room.
D. Reboot the switch and each AP at the same time.
Selected Answer: C
Question #: 539
Topic #: 1
A desktop support department has observed slow wireless speeds for a new line of laptops using the organization’s standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue?
A. Increasing wireless signal power
B. Installing a new WAP
C. Changing the protocol associated to the SSID
D. Updating the device wireless drivers
Selected Answer: D
Question #: 540
Topic #: 1
A technician needs to change an incoming fiber line into an RJ45 copper connection for uplinking a new switch. Which of the following would BEST satisfy this requirement?
A. Media converter
B. F-type connector
C. Small form-factor pluggable
D. Punchdown block
Selected Answer: A
Question #: 541
Topic #: 1
A new engineer at a company is working to understand the network. Which of the following diagrams should the engineer review to understand the paths traffic takes?
A. Physical
B. Logical
C. Wiring
D. Rack
Selected Answer: B
Question #: 542
Topic #: 1
A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?
A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 100MB speed
D. Full duplex and 100MB speed
Selected Answer: D
Question #: 543
Topic #: 1
A junior network engineer is trying to change the native network ID to a non-default value that can then be applied consistently throughout the network environment. Which of the following issues is the engineer attempting to prevent?
A. DDoS
B. ARP spoofing
C. VLAN hopping
D. Rogue DHCP
Selected Answer: C
Question #: 544
Topic #: 1
Which of the following BEST prevents unauthorized access to spare workstation inventory?
A. Asset tags
B. Tamper detection
C. Security camera
D. Locking cabinet
E. Smart lockers
Selected Answer: E
Question #: 545
Topic #: 1
A technician is troubleshooting network connectivity from a wall jack. Readings from a multimeter indicate extremely low ohmic values instead of the rated impedance from the switchport. Which of the following is the MOST likely cause of this issue?
A. Incorrect transceivers
B. Faulty LED
C. Short circuit
D. Upgraded OS version on switch
Selected Answer: C
Question #: 546
Topic #: 1
A user is experimenting with audio transmissions and would like the transmissions to reach several specific devices simultaneously over the IP network. The user requests assistance from a network technician to configure the appropriate features within the SOHO. Which of the following should the technician configure to meet the requirements?
A. Unicast
B. Multicast
C. Anycast
D. Broadcast
Selected Answer: B
Question #: 547
Topic #: 1
A retail store recently acquired the store next door. The owners would like this store to support Gigabit Ethernet for up to 328ft (100m). Which of the following is the MOST cost-effective solution?
A. Cat5
B. Cat 5e
C. Cat 6
D. Cat 7
Selected Answer: B
Question #: 548
Topic #: 1
Which of the following attacks becomes more effective because of global leakages of users’ passwords?
A. Dictionary
B. Brute-force
C. Phishing
D. Deauthentication
Selected Answer: A
Question #: 549
Topic #: 1
A network administration team for a medium-sized business has decided to segment the network, logically separating the finance and marketing teams in order to improve performance for both teams. The finance and marketing teams still need to access resources across the subnets, and the router has a single interface. Which of the following should the administrator configure in order to allow the traffic?
A. Port address translation
B. Classless masking
C. IPv6 tunneling
D. Subinterfaces
Selected Answer: D
Question #: 550
Topic #: 1
A network requirement calls for the network traffic of a specific department within a campus network to be monitored. The network has users from each department located in multiple buildings. Which of the following should be configured to meet this requirement? (Choose two.)
A. MDIX
B. 802.1Q
C. Jumbo frames
D. Port mirroring
E. Flow control
F. LACP
Selected Answer: BD
Question #: 551
Topic #: 1
A wireless technician is working to upgrade the wireless infrastructure for a company. The company currently uses the 802.11g wireless standard on all access points. The company requires backward compatibility and is requesting the least expensive solution. Which of the following should the technician recommend to the company?
A. 802.11a
B. 802.11ac
C. 802.11ax
D. 802.11n
Selected Answer: D
Question #: 552
Topic #: 1
An employee walked into a secure facility and allowed a newly hired employee to walk in as well. Which of the following is the BEST solution to prevent this from happening again?
A. “No tailgating” sign
B. Awareness training
C. Entry log
D. Camera
Selected Answer: B
Question #: 553
Topic #: 1
A network administrator is assisting a user who is unable to access network services by using hostname on Host 1. Another user in the same office is able to access the network services with no issue on Host 2. The network administrator runs a command on the affected machine and the working machine and compares the following output:
Which of the follow should the network administrator change to restore connectivity?
A. Change the default gateway on Host 1 to 192.168.1.1.
B. Change the IPv4 address on Host 2 to 192.168.0.112.
C. Reconfigure the subnet masks on both hosts.
D. Update the DNS server on Host 1 to 192.168.0.53.
Selected Answer: D
Question #: 554
Topic #: 1
Which of the following VPN types provides the highest security for a user who travels often but also has the highest bandwidth requirements to provide a satisfactory user experience?
A. Full-tunnel
B. Site-to-site
C. Clientless
D. Split-tunnel
Selected Answer: A
Question #: 555
Topic #: 1
A technician needs to map the path of a PC to the router. Which of the following tools should the technician use to accomplish this task?
A. traceroute
B. ping
C. ifconfig
D. netstat
Selected Answer: A
Question #: 556
Topic #: 1
A company is using a DHCP server with 12-hour leases for its device configurations. A user records the information that the DHCP server provides and uses the information to connect a device with a manual IP set. Over time, the user experiences intermittent connectivity and recurring connection timeouts. Which of the following is the MOST likely cause of the issue?
A. A duplicate IP address is on the network.
B. The user’s device is pointing to an incorrect DNS server.
C. The device is set to use an incorrect subnet.
D. The device is set to use an incorrect gateway.
Selected Answer: A
Question #: 557
Topic #: 1
A technician is concerned about unauthorized personnel moving assets that are installed in a data center server rack. The technician installs a networked sensor that sends an alert when the server rack door is opened. Which of the following did the technician install?
A. Cipher lock
B. Asset tags
C. Access control vestibule
D. Tamper detection
Selected Answer: D
Question #: 558
Topic #: 1
An administrator is preparing an organization for a potential disaster. The administrator configures the network switches and turns off the equipment in a data center. Which of the following is this scenario an example of?
A. Warm site
B. Cold site
C. Cloud site
D. Hot site
Selected Answer: A
Question #: 559
Topic #: 1
Which of the following is used to require network devices to authenticate before gaining access to a LAN?
A. 802.1Q
B. 802.1X
C. 802.11ax
D. 802.3af
Selected Answer: B
Question #: 560
Topic #: 1
Which of the following routing protocols is BEST suited for use on a perimeter router?
A. OSPF
B. RIPv2
C. EIGRP
D. BGP
Selected Answer: D
Question #: 561
Topic #: 1
A technician is investigating why a PC cannot reach a file server with the IP address 192.168.8.129. Given the following TCP/IP network configuration:
Which of the following configurations on the PC is incorrect?
A. Subnet mask
B. IPv4 address
C. Default gateway
D. IPv6 address
Selected Answer: A
Question #: 562
Topic #: 1
Which of the following layers of the OSI model lies between the transport layer and the network layer?
A. Application
B. Data link
C. Session
D. Presentation
Selected Answer: C
Question #: 563
Topic #: 1
Which of the following describes a network in which users and devices need to mutually authenticate before any network resource can be accessed?
A. Least privilege
B. Local authentication
C. Zero trust
D. Need to know
Selected Answer: C
Question #: 564
Topic #: 1
A technician is setting up DNS records on local servers for the company’s cloud DNS to enable access by hostname. Which of the following records should be used?
A. A
B. MX
C. CNAME
D. NS
Selected Answer: A
Question #: 565
Topic #: 1
A network administrator responds to a support ticket that was submitted by a customer who is having issues connecting to a website inside of the company network. The administrator verifies that the customer could not connect to a website using a URL. Which of the following troubleshooting steps would be BEST for the administrator to take?
A. Check for certificate issues.
B. Contact the ISP.
C. Attempt to connect to the site via IP address.
D. Check the NTP configuration.
Selected Answer: C
Question #: 566
Topic #: 1
A network administrator is creating a subnet for a remote office that has 53 network devices. An additional requirement is to use the most efficient subnet. Which of the following CIDR notations indicates the appropriate number of IP addresses with the LEAST amount of unused addresses?
A. /24
B. /26
C. /28
D. /32
Selected Answer: B
Question #: 567
Topic #: 1
A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO’s phone need?
A. WDMA
B. CDMA
C. GSM
D. SLA
Selected Answer: C
Question #: 568
Topic #: 1
A network technician is troubleshooting a connection to a local server and has verified that the RDP service is running on the server. After running a command, the technician receives the following output:
Which of the following MOST likely describes the issue?
A. A host-based firewall on the server is blocking the connection.
B. Too many collisions are occurring on the network segment.
C. A DoS attack is occurring locally.
D. A routing loop is in the network.
Selected Answer: A
Question #: 569
Topic #: 1
Which of the following would be used to indicate when unauthorized access to physical internal hardware has occurred?
A. Motion detectors
B. Radio frequency identification tags
C. Tamper evident seal
D. Locking racks
Selected Answer: C
Question #: 570
Topic #: 1
A network technician is investigating a trouble ticket for a user who does not have network connectivity. All patch cables between the wall jacks and computers in the building were upgraded over the weekend from Cat 5 to Cat 6. The newly installed cable is crimped with a TIA/EIA 568A on one end and a TIA/EIA 568B on the other end. Which of the following should the technician do to MOST likely fix the issue?
A. Ensure the switchport has PoE enabled.
B. Crimp the cable as a straight-through cable.
C. Ensure the switchport has STP enabled,
D. Crimp the cable as a rollover cable.
Selected Answer: B
Question #: 571
Topic #: 1
Which of the following is a valid alternative to maintain a deployed proxy technology while saving physical space in the data center by moving the network service to the virtualization infrastructure?
A. NFV
B. SDWAN
C. Networking as code
D. VIP
Selected Answer: A
Question #: 572
Topic #: 1
A network technician wants to identify which DNS servers a computer is configured to use. Which of the following commands should the technician use?
A. nbtstat
B. arp
C. nslookup
D. netstat
Selected Answer: C
Question #: 573
Topic #: 1
Which of the following routing protocols has routes that are classified with an administrative distance of 110?
A. BGP
B. OSPF
C. EIGRP
D. RIP
Selected Answer: B
Question #: 574
Topic #: 1
Which of the following focuses on application delivery?
A. DaaS
B. IaaS
C. SaaS
D. PaaS
Selected Answer: C
Question #: 575
Topic #: 1
A network engineer is concerned about VLAN hopping happening on the network. Which of the following should the engineer do to address this concern?
A. Configure private VLANs.
B. Change the default VLAN.
C. Implement ACLs on the VLAN.
D. Enable dynamic ARP inspection.
Selected Answer: B
Question #: 576
Topic #: 1
A network technician receives a support ticket concerning multiple users who are unable to access the company’s shared drive. The switch interface that the shared drive is connected to is displaying the following:
Which of the following is MOST likely the issue?
A. The switchport is shut down.
B. The cable is not plugged in.
C. The loopback is not set.
D. The bandwidth configuration is incorrect.
Selected Answer: B
Question #: 577
Topic #: 1
A customer calls the help desk to report that users are unable to access any network resources. The issue started earlier in the day when an employee rearranged the wiring closet. A technician goes to the site but does not observe any obvious damage. The statistics output on the switch indicates high CPU usage, and all the lights on the switch are blinking rapidly in unison. Which of the following is the MOST likely explanation for these symptoms?
A. The switch was rebooted and set to run in safe mode.
B. The line between the switch and the upstream router was removed.
C. A cable was looped and created a broadcast storm.
D. A Cat 6 cable from the modem to the router was replaced with Cat 5e.
Selected Answer: C
Question #: 578
Topic #: 1
A network administrator is troubleshooting a PC that cannot connect to the LAN. The administrator runs the ipconfig command at the command prompt and gets the following output:
Which of the following is misconfigured?
A. Subnet mask
B. Physical address
C. DNS server
D. DHCP server
Selected Answer: A
Question #: 579
Topic #: 1
A user stores large graphic files. The time required to transfer the files to the server is excessive due to network congestion. The user’s budget does not allow for the current switches to be replaced. Which of the following can be used to provide FASTER transfer times?
A. Half duplex
B. Jumbo frames
C. LACP
D. 802.1Q
Selected Answer: B
Question #: 580
Topic #: 1
A sales team at a company uses a SaaS solution primarily for videoconferencing and a CRM application that connects to a database server in the corporate data center. Which of the following VPN solutions would allow secure, remote access for sales staff to the CRM application without impacting videoconferencing traffic?
A. Clientless
B. Site-to-site
C. Split tunnel
D. Full tunnel
Selected Answer: C
Question #: 581
Topic #: 1
Which of the following would a network administrator configure to set NTP settings for a specific subnet within DHCP?
A. Reservation
B. Lease time
C. Scope options
D. Exclusion range
Selected Answer: C
Question #: 582
Topic #: 1
A network administrator creates a new network, 10.10.0.0/24, on a DHCP server. The administrator wants to ensure that 10.10.0.10-10.10.0.15 are not allocated to other devices. Which of the following features should the administrator configure?
A. Exclusion
B. Reservation
C. Scope
D. Relay
Selected Answer: A
Question #: 583
Topic #: 1
Which of the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between routers?
A. RIP
B. OSPF
C. BGP
D. EIGRP
Selected Answer: B
Question #: 584
Topic #: 1
An on-call network technician receives an automated email alert stating that a power supply on a firewall has just powered down. Which of the following protocols would BEST allow for this level of detailed device monitoring?
A. TFTP
B. TLS
C. SSL
D. SNMP
Selected Answer: D
Question #: 585
Topic #: 1
A technician is investigating a SAN switch that has a high number of CRC errors. Which of the following is the MOST likely cause of the errors?
A. Break in the fiber
B. Bad switch port
C. Mismatched duplex
D. Memory errors
Selected Answer: B
Question #: 586
Topic #: 1
A customer runs a DNS lookup service and needs a network technician to reconfigure the network to improve performance. The customer wants to ensure that servers are accessed based on whichever one is topographically closest to the destination. If the server does not respond, then the next topographically closest server should respond. Which of the following does the technician need to configure to meet the requirements?
A. Multicast addressing
B. Anycast addressing
C. Broadcast addressing
D. Unicast addressing
Selected Answer: B
Question #: 587
Topic #: 1
Which of the following would MOST likely be used to review disaster recovery information for a system?
A. Business continuity plan
B. Change management
C. System life cycle
D. Standard operating procedures
Selected Answer: A
Question #: 588
Topic #: 1
A network technician is troubleshooting a connection to a web server. The technician is unable to ping the server but is able to verify connectivity to the web service using Telnet. Which of the following protocols is being blocked by the firewall?
A. UDP
B. ARP
C. ICMP
D. TCP
Selected Answer: C
Question #: 589
Topic #: 1
A network administrator is configuring a firewall to allow for a new cloud-based email server. The company standard is to use SMTP to route email traffic. Which of the following ports, by default, should be reserved for this purpose?
A. 23
B. 25
C. 53
D. 110
Selected Answer: B
Question #: 590
Topic #: 1
Which of the following demarcation connections would be MOST appropriate to use with a cable modem being installed in a SOHO situation?
A. RG6
B. Cat 6
C. RJ11
D. Multimode fiber
Selected Answer: A
Question #: 591
Topic #: 1
A technician needs to allow a device to maintain the same IP address lease based on the physical address of a network card. Which of the following should the technician use?
A. MAC address reservation
B. Static IP address
C. Custom DNS server entry
D. IP address exclusion
Selected Answer: A
Question #: 592
Topic #: 1
A network technician is investigating why a core switch is logging excessive amounts of data to the syslog server. The running configuration of the switch showed the following logging information:
Which of the following changes should the technician make to BEST fix the issue?
A. Update the logging host IP.
B. Change to asynchronous logging.
C. Stop logging SSH events.
D. Adjust the logging level.
Selected Answer: D
Question #: 593
Topic #: 1
A network technician wants to find the shortest path from one node to every other node in the network. Which of the following algorithms will provide the FASTEST convergence time?
A. A static algorithm
B. A link-state algorithm
C. A distance-vector algorithm
D. A path-vector algorithm
Selected Answer: B
Question #: 594
Topic #: 1
After upgrading to a SOHO router that supports Wi-Fi 6, the user determines throughput has not increased. Which of the following is the MOST likely cause of the issue?
A. The wireless router is using an incorrect antenna type.
B. The user’s workstation does not support 802.11ax.
C. The encryption protocol is mismatched.
D. The network is experiencing interference.
Selected Answer: B
Question #: 595
Topic #: 1
A network administrator is troubleshooting a connection to a remote site. The administrator runs a command and sees the following output:
Which of the following is the cause of the connection issue?
A. Routing loop
B. Asymmetrical routing
C. Broadcast storm
D. Switching loop
Selected Answer: A
Question #: 596
Topic #: 1
While using a secure conference call connection over a corporate VPN, a user moves from a cellular connection to a hotel wireless network. Although the wireless connection and the VPN show a connected status, no network connectivity is present. Which of the following is the MOST likely cause of this issue?
A. MAC filtering is configured on the wireless connection.
B. The VPN and the WLAN connection have an encryption protocol mismatch.
C. The WLAN is using a captive portal that requires further authentication.
D. Wireless client isolation is enforced on the WLAN settings.
Selected Answer: C
Question #: 597
Topic #: 1
An engineer was asked to update an MX record for an upcoming project. Which of the following server types is MOST likely to be in scope for the project?
A. Email
B. Web
C. File
D. Database
Selected Answer: A
Question #: 598
Topic #: 1
A customer has an attached USB printer that needs to be shared with other users. The desktop team set up printer sharing. Now, the network technician needs to obtain the necessary information about the PC and share it with other users so they can connect to the printer. Which of the following commands should the technician use to get the required information? (Choose two.)
A. arp
B. route
C. netstat
D. tcpdump
E. hostname
F. ipconfig
Selected Answer: EF
Question #: 599
Topic #: 1
A help desk supervisor reviews the following excerpt of a call transcript:
Which of the following was the agent trying to accomplish with this exchange?
A. The agent was questioning the obvious.
B. The agent was verifying full system functionality.
C. The agent was identifying potential effects.
D. The agent was trying to duplicate the problem.
Selected Answer: D
Question #: 600
Topic #: 1
A technician received a report that some users in a large, 30-floor building are having intermittent connectivity issues. Users on each floor have stable connectivity, but do not have connectivity to other floors. Which of the following devices is MOST likely causing the issue?
A. User devices
B. Edge devices
C. Access switch
D. Core switch
Selected Answer: D