N10-008: CompTIA Network+ Topic 7
Question #: 601
Topic #: 1
A help desk technician discovers the following note while reviewing tickets in a customer’s account:
Was able to confirm customer’s problem with the system. Will upgrade system to latest version and monitor for further connectivity problems per developer’s instructions.
Which of the following describes what the technician was documenting with this note?
A. The technician was approaching multiple problems individually.
B. The technician was establishing a plan of action and identifying potential effects.
C. The technician was testing a theory to determine the cause.
D. The technician was identifying the problem by gathering information.
Selected Answer: B
Question #: 602
Topic #: 1
The results of a recently completed site survey indicate a significant, undesired RSSI in the parking lot and other exterior areas near the main building. The wireless technician would like to mitigate access to the wireless network in exterior access areas. The current access point settings are listed in the following table:
Which of the following is the BEST step for the technician to take to resolve the issue?
A. Reconfigure AP2 and AP3 for non-overlapping channels.
B. Implement directional antennas on AP1 and AP2.
C. Raise the power settings on AP2 and AP3.
D. Change the SSID on AP1 and AP2.
Selected Answer: B
Question #: 603
Topic #: 1
A network technician is selecting new network hardware, and availability is the main concern. Which of the following availability concepts should the technician consider?
A. RTO
B. MTTR
C. MTBF
D. RPO
Selected Answer: C
Question #: 604
Topic #: 1
A new company moved into a corporate center. Users in the shared lobby are experiencing disconnects on their mobile devices. Which of the following is the BEST tool a network technician could use to troubleshoot the issue?
A. Port scanner
B. Protocol analyzer
C. NetFlow analyzer
D. Wi-Fi analyzer
Selected Answer: D
Question #: 605
Topic #: 1
Two companies want to build an encrypted tunnel between them and use a PSK for initial authentication. Which of the following is the BEST protocol for the companies to use?
A. VPN
B. SSL
C. TLS
D. IPSec
Selected Answer: D
Question #: 606
Topic #: 1
While troubleshooting a network, a VoIP systems engineer discovers a significant inconsistency in the amount of time required for data to reach its destination and return. Which of the following terms BEST describes this issue?
A. Bandwidth
B. Latency
C. Jitter
D. Throughput
Selected Answer: C
Question #: 607
Topic #: 1
A network technician is configuring a wireless access point and wants to only allow company-owned devices to associate with the network. The access point uses PSKs, and a network authentication system does not exist on the network. Which of the following should the technician implement?
A. Captive portal
B. Guest network isolation
C. MAC filtering
D. Geofencing
Selected Answer: C
Question #: 608
Topic #: 1
Which of the following network topologies BEST describes a central device connected to multiple independent devices?
A. Mesh
B. Ring
C. Hub-and-spoke
D. Bus
Selected Answer: C
Question #: 609
Topic #: 1
A network administrator is reviewing north-south traffic to determine whether a security threat exists. Which of the following explains the type of traffic the administrator is reviewing?
A. Data flowing between application servers
B. Data flowing between the perimeter network and application servers
C. Data flowing in and out of the data center
D. Data flowing between local on-site support and backup servers
Selected Answer: C
Question #: 610
Topic #: 1
A network technician is installing a wireless network in an office building. After performing a site survey, the technician determines the area is very saturated on the 2.4GHz and the 5GHz bands. Which of the following wireless standards should the network technician implement?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
Selected Answer: B
Question #: 611
Topic #: 1
A network technician discovered multiple failed logins on a production server. Upon investigation, the technician determined that a client plugged a personal laptop in to the corporate LAN, which allowed malware on the laptop to probe the network. Which of the following would have prevented this unauthorized device?
A. Port security
B. Bring your own device policy
C. Patch management
D. Changing default passwords
Selected Answer: A
Question #: 612
Topic #: 1
Following a fire in a data center, an executive is concerned about the amount of data that must be reentered. Which of the following describes the executive’s concern?
A. RTO
B. MTBF
C. MMTR
D. RPO
Selected Answer: A
Question #: 613
Topic #: 1
A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?
A. 110
B. 66
C. Bix
D. Krone
Selected Answer: A
Question #: 614
Topic #: 1
A network engineer turned on logging to assist with troubleshooting a suspected configuration issue. Which of the following would provide the network engineer with the most informative log information?
A. FATAL
B. ERROR
C. DEBUG
D. WARN
Selected Answer: C
Question #: 615
Topic #: 1
Which of the following cloud deployment models involves servers that are hosted at a company’s property and are only used by that company?
A. Public
B. Private
C. Hybrid
D. Community
Selected Answer: B
Question #: 616
Topic #: 1
A technician needs to find the MAC address of a connecting router. Which of the following commands should the technician use?
A. arp
B. traceroute
C. nslookup
D. ping
Selected Answer: A
Question #: 617
Topic #: 1
A network engineer is installing hardware in a newly renovated data center. Major concerns that were addressed during the renovation included air circulation, building power redundancy, and the need for continuous monitoring. The network engineer is creating alerts based on the following operation specifications:
A. Environmental monitoring alerts for humidity greater than 95%
B. SIEM to parse syslog events for a failed power supply
C. SNMP traps to report when the chassis temperature exceeds 95°F (35°C)
D. UPS monitoring to report when input voltage drops below 220VAC
Selected Answer: B
Question #: 618
Topic #: 1
A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Selected Answer: D
Question #: 619
Topic #: 1
Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?
A. The switch is oversubscribed and cannot handle the additional throughput.
B. The printer is tying up the server with DHCP discover messages.
C. The web server’s back end was designed for only single-threaded applications.
D. The workstation was configured with a static IP that is the same as the server.
Selected Answer: D
Question #: 620
Topic #: 1
Which of the following routing protocols uses an autonomous system number?
A. IS-IS
B. EIGRP
C. OSPF
D. BGP
Selected Answer: D
Question #: 621
Topic #: 1
A network administrator is designing a new network for a company that has frequent power spikes. The company wants to ensure that employees can keep working and the server will remain operational. Which of the following is the best solution for the administrator to recommend?
A. Generator
B. Cold site
C. Redundant power supplies
D. Uninterruptible power supply
Selected Answer: D
Question #: 622
Topic #: 1
Which of the following OSI model layers are responsible for handling packets from the sources to the destination and checking for errors? (Choose two.)
A. Physical
B. Session
C. Data link
D. Network
E. Presentation
F. Application
Selected Answer: CD
Question #: 623
Topic #: 1
Which of the following fiber connector types is the most likely to be used on a network interface card?
A. LC
B. SC
C. ST
D. MPO
Selected Answer: A
Question #: 624
Topic #: 1
Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
A. Site-to-site VPN
B. SSH tunnel
C. API gateway
D. Dedicated line
Selected Answer: A
Question #: 625
Topic #: 1
Which of the following would most likely be considered for an IDF installation in a secure facility?
A. Full-size body scanners
B. Iris scanner
C. RFID badge readers
D. Smart deadbolt
Selected Answer: D
Question #: 626
Topic #: 1
Which of the following is the most secure way to provide site-to-site connectivity?
A. VXLAN
B. IKE
C. GRE
D. IPSec
Selected Answer: D
Question #: 627
Topic #: 1
Which of the following security methods uses physical characteristics of a person to authorize access to a location?
A. Access control vestibule
B. Palm scanner
C. PIN pad
D. Digital card reader
E. Photo ID
Selected Answer: B
Question #: 628
Topic #: 1
Which of the following are environmental factors that should be considered when installing equipment in a building? (Choose two.)
A. Fire suppression system
B. UPS location
C. Humidity control
D. Power load
E. Floor construction type
F. Proximity to nearest MDF
Selected Answer: AC
Question #: 629
Topic #: 1
A network administrator requires redundant routers on the network, but only one default gateway is configurable on a workstation. Which of the following will allow for redundant routers with a single IP address?
A. EIGRP
B. VRRP
C. MPLS
D. STP
Selected Answer: B
Question #: 630
Topic #: 1
Which of the following antenna types would most likely be used in a network repeater that is housed in a central point in a home office?
A. Omnidirectional
B. Parabolic
C. High-gain
D. Patch
Selected Answer: A
Question #: 631
Topic #: 1
A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10GB connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?
A. Port mirroring
B. Log aggregation
C. Flow data
D. Packet capture
Selected Answer: C
Question #: 632
Topic #: 1
A network administrator needs to implement routing capabilities in a hypervisor. Which of the following should the administrator most likely implement?
A. VPC
B. Firewall
C. NFV
D. laaS
Selected Answer: C
Question #: 633
Topic #: 1
A network technician crimped a length of UTP with TIA\EIA-568A on one end and TIA\EIA-568B on the other. Which of the following cable types did the technician create?
A. Crossover cable
B. Patch cable
C. Twinaxial cable
D. Rollover cable
Selected Answer: A
Question #: 634
Topic #: 1
A network engineer designed and implemented a new office space with the following characteristics:
One month after the office space was implemented, users began reporting dropped signals when entering another room and overall poor connections to the 5GHz network. Which of the following should the engineer do to best resolve the issue?
A. Use non-overlapping channels.
B. Reconfigure the network to support 2.4GHz
C. Upgrade to WPA3.
D. Change to directional antennas.
Selected Answer: B
Question #: 635
Topic #: 1
Which of the following security concepts is related to ensuring that encrypted data is not edited while in transit?
A. Zero trust
B. Integrity
C. Availability
D. Confidentiality
Selected Answer: B
Question #: 636
Topic #: 1
A network technician is troubleshooting internet connectivity issues with users in a subnet. From a host, the technician runs tcpdump and then attempts to navigate to a website using a web browser. The technician receives the following output:
Afterward, the browser displays an error. Which of the following explains this issue?
A. A routing loop is within the network.
B. The host is configured with incorrect DNS settings.
C. A broadcast storm is occurring on the subnet.
D. The host is missing a route to the website.
Selected Answer: B
Question #: 637
Topic #: 1
After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?
A. Inspect the connectors for any wires that are touching or exposed.
B. Restore default settings on the connected devices.
C. Terminate the connections again.
D. Check for radio frequency interference in the area.
Selected Answer: A
Question #: 638
Topic #: 1
A user took a laptop on a trip and made changes to the network parameters while at the airport. The user can access all internet websites but not corporate intranet websites. Which of the following is the most likely cause of the issue?
A. Duplicate IP address
B. Duplicate SSID
C. Incorrect DNS
D. Incorrect subnet mask
Selected Answer: C
Question #: 639
Topic #: 1
Which of the following best describe the functions of Layer 2 of the OSI model? (Choose two.)
A. Local addressing
B. Error preventing
C. Logical addressing
D. Error detecting
E. Port addressing
F. Error correcting
Selected Answer: AD
Question #: 640
Topic #: 1
A network administrator wants to implement an authentication process for temporary access to an organization’s network. Which of the following technologies would facilitate this process?
A. Captive portal
B. Enterprise authentication
C. Ad hoc network
D. WPA3
Selected Answer: A
Question #: 641
Topic #: 1
Which of the following would be best suited for use at the access layer in a three-tier architecture system?
A. Router
B. Multilayer switch
C. Layer 2 switch
D. Access point
Selected Answer: C
Question #: 642
Topic #: 1
Following the implementation of a BYOD policy, some users in a high-density environment report slowness over the wireless connection. Some wireless controller reports indicate high latency and airttime contention. Which of the following is the most probable root cause?
A. The AP is configured with 2.4GHz frequency, which the new personal devices do not support.
B. The AP is configured with 2.4GHz frequency without band-steering capabilities.
C. The AP is configured with 5Ghz frequency with band-steering capabilities.
D. The AP is configured with 5Ghz frequency, which the new personal devices do not support
Selected Answer: B
Question #: 643
Topic #: 1
A company’s VoIP phone connection is cutting in and out. Which of the following should be configured to resolve this issue?
A. 802.1Q tagging
B. Jumbo frames
C. Native VLAN
D. Link aggregation
Selected Answer: C
Question #: 644
Topic #: 1
A network technician is configuring a wireless network that consists of multiple APs for better coverage and allows roaming between the APs. Which of the following types of SSIDs should the technician configure?
A. Basic Service Set
B. Independent Basic Service Set
C. Extended Service Set
D. Distribution System Service
Selected Answer: C
Question #: 645
Topic #: 1
A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?
A. Change the email client configuration to match the MX record.
B. Reduce the TTL record prior to the MX record change.
C. Perform a DNS zone transfer prior to the MX record change.
D. Update the NS record to reflect the IP address change.
Selected Answer: B
Question #: 646
Topic #: 1
Which of the following network topologies contains a direct connection between every node in the network?
A. Mesh
B. Hub-and-spoke
C. Star
D. Point-to-point
Selected Answer: A
Question #: 647
Topic #: 1
Which of the following layers of the OSI model is responsible for end-to-end encryption?
A. Presentation
B. Application
C. Session
D. Transport
Selected Answer: D
Question #: 648
Topic #: 1
A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is most needed?
A. Temperature sensor in the network MOF
B. Water sensor in the network MDF
C. Temperature sensor in the data center
D. Water sensor in the data center
Selected Answer: B
Question #: 649
Topic #: 1
A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task?
A. Port security
B. Port tagging
C. Port mirroring
D. Media access control
Selected Answer: C
Question #: 650
Topic #: 1
A company is designing a new complex. The primary and alternate data centers will be in separate buildings 6.2mi (10km) apart and will be connected via fiber. Which of the following types of SFP is the best choice?
A. 10GBASE-SR
B. 10000BASE-LX
C. 10GBASE-LR
D. 1000BASE-SX
Selected Answer: C
Question #: 651
Topic #: 1
Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
A. Intrusion prevention system
B. Load balancer
C. Access logging
D. Endpoint encryption
Selected Answer: A
Question #: 652
Topic #: 1
A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
A. Least privilege network access
B. Dynamic inventories
C. Central policy management
D. Zero-touch provisioning
E. Configuration drift prevention
F. Subnet range limits
Selected Answer: AC
Question #: 653
Topic #: 1
Which of the following passwords would provide the best defense against a brute-force attack?
A. ThisIsMyPasswordForWork
B. Qwerty!@#$
C. Password!1
D. T5!8j5
Selected Answer: A
Question #: 654
Topic #: 1
Which of the following is most likely to be implemented to actively mitigate intrusions on a host device?
A. HIDS
B. NIDS
C. HIPS
D. NIPS
Selected Answer: C
Question #: 655
Topic #: 1
A network administrator wants to know which systems on the network are at risk of a known vulnerability. Which of the following should the administrator reference?
A. SLA
B. Patch management policy
C. NDA
D. Site survey report
E. CVE
Selected Answer: E
Question #: 656
Topic #: 1
A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?
A. NGFW
B. Proxy
C. Layer 3 switch
D. Load balancer
Selected Answer: A
Question #: 657
Topic #: 1
Which of the following architectures would allow the network-forwarding elements to adapt to new business requirements with the least amount of operating effort?
A. Software-defined network
B. Spine and leaf
C. Three-tier
D. Backbone
Selected Answer: A
Question #: 658
Topic #: 1
A customer lost the connection to the telephone system. The administration console is configured with multiple network interfaces and is connected to multiple switches. The network administrator troubleshoots and verifies the following:
• The support team is able to connect remotely to the administration console.
• Rebooting the switch shows solid link and activity lights even on unused ports.
• Rebooting the telephone system does not bring the system back online.
• The console is able to connect directly to individual modules successfully.
Which of the following is the most likely reason the customer lost the connection?
A. A switch failed.
B. The console software needs to be reinstalled.
C. The cables to the modules need to be replaced.
D. A module failed.
Selected Answer: A
Question #: 659
Topic #: 1
A network security technician is designing a solution for a secure remote access scheme with the following requirements:
• The solution must allow for users at multiple locations to access corporate resources.
• The on-premises equipment will not handle non-corporate, resource-bound traffic.
Which of the following should the network security technician consider when designing the solution? (Choose two.)
A. Clientless VPN
B. Personal VPN
C. Full-tunnel VPN
D. Client-to-site VPN
E. Site-to-site VPN
F. Split-tunnel VPN
Selected Answer: DF
Question #: 660
Topic #: 1
Which of the following uses an automated script to make configuration changes when interacting with a web application?
A. SSH
B. FTP
C. API
D. GUI
Selected Answer: C
Question #: 661
Topic #: 1
Which of the following ports is used for secure email?
A. 25
B. 110
C. 143
D. 587
Selected Answer: D
Question #: 662
Topic #: 1
A network administrator wants to install new VoIP switches in small network closet but is concerned about the current heat level of the room. Which of the following should the administrator take into consideration before installing the new equipment?
A. The power load of the switches
B. The humidity in the room
C. The fire suppression system
D. The direction of airflow within the switches
Selected Answer: D
Question #: 663
Topic #: 1
Which of the following is the next step to take after successfully testing a root cause theory?
A. Determine resolution steps.
B. Duplicate the problem in a lab.
C. Present the theory for approval.
D. Implement the solution to the problem.
Selected Answer: A
Question #: 664
Topic #: 1
A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?
A. Configure ACLs.
B. Implement a captive portal.
C. Enable port security.
D. Disable unnecessary services.
Selected Answer: C
Question #: 665
Topic #: 1
Which of the following does OSPF use to communicate routing updates?
A. Unicast
B. Anycast
C. Multicast
D. Broadcast
Selected Answer: C
Question #: 666
Topic #: 1
A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?
A. dig
B. nmap
C. tracert
D. nslookup
Selected Answer: B
Question #: 667
Topic #: 1
A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?
A. Perimeter network
B. Honeypot
C. Zero trust infrastructure
D. Network segmentation
Selected Answer: B
Question #: 668
Topic #: 1
An organization has a factory automation solution that requires accurate timing between devices. Which of the following should the network administrator implement?
A. PTP
B. NTP
C. NTS
D. DoT
Selected Answer: B
Question #: 669
Topic #: 1
A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?
A. A separate scope for the file server using a /32 subnet
B. A reservation for the server based on the MAC address
C. A static IP address within the DHCP IP range
D. A SLAAC for the server
Selected Answer: C
Question #: 670
Topic #: 1
Which of the following ports is a secure protocol?
A. 20
B. 23
C. 443
D. 445
Selected Answer: C
Question #: 672
Topic #: 1
Users are moving back into an office that had been vacant for a while. Ten workstations are hooked up in the office, but one workstation cannot obtain a link with the switch. A network engineer checks the documentation and cable labeling, and everything is hooked up as expected. The engineer moves the connection to a different switchport. but a link still cannot be obtained. When the engineer puts a tone generator on the infrastructure cable, no tone is heard at the far end. Which of the following issues is the engineer MOST likely trying to find?
A. A bad switchport
B. A break in the cable
C. A cable short
D. Cable interference
Selected Answer: B
Question #: 673
Topic #: 1
A network administrator is working to configure a new device to provide Layer 2 connectivity to various endpoints including several WAPs. Which of the following devices will the administrator MOST likely configure?
A. WLAN controller
B. Cable modem
C. Load balancer
D. Switch
E. Hub
Selected Answer: D
Question #: 674
Topic #: 1
A network deployment engineer is deploying a new single-channel 10G optical connection. Which of the following optics should the engineer MOST likely use to satisfy this requirement?
A. QSFP
B. QSFP+
C. SFP
D. SFP+
Selected Answer: D
Question #: 675
Topic #: 1
Which of the following is an advantage of using the cloud as a redundant data center?
A. The process of changing cloud providers is easy.
B. Better security for company data is provided.
C. The initial capital expenses are lower.
D. The need for backups is eliminated.
Selected Answer: C
Question #: 676
Topic #: 1
A network administrator corrected a rule on a misconfigured firewall. Which of the following should the administrator do NEXT when applying the network troubleshooting methodology?
A. Verify full system functionality.
B. Document actions and lessons learned.
C. Establish a theory of probable cause.
D. Identify potential effects.
Selected Answer: A
Question #: 677
Topic #: 1
Which of the following technologies would MOST likely be used to prevent the loss of connection between a virtual server and network storage devices?
A. Multipathing
B. VRRP
C. Port aggregation
D. NIC teaming
Selected Answer: A
Question #: 678
Topic #: 1
Which of the following services provides the network information for the address when IPv6 is used for SLAAC addressing?
A. EUI-64
B. IPv6 unicast routing
C. Router advertisement
D. DHCPv6
Selected Answer: C
Question #: 679
Topic #: 1
A network engineer needs to enable device monitoring using authentication and encryption. Which of the following protocols offers this option?
A. ESP
B. SNMPv3
C. NetFlow
D. SSLv3
Selected Answer: B
Question #: 680
Topic #: 1
Users are reporting performance issues when attempting to access the main fileshare server. Which of the following steps should a network administrator perform NEXT based on the network troubleshooting methodology?
A. Implement a fix to resolve the connectivity issues.
B. Determine if anything has changed.
C. Establish a theory of probable cause.
D. Document all findings, actions, and lessons learned.
Selected Answer: B
Question #: 681
Topic #: 1
A network administrator is implementing process changes based on recommendations following a recent penetration test. The testers used a method to gain access to the network that involved exploiting a publicly available and fixed remote code execution vulnerability in the VPN appliance. Which of the following should the administrator do to BEST prevent this from happening again?
A. Change default passwords on internet-facing hardware.
B. Implement robust ACLs with explicit deny-all entries.
C. Create private VLANs for management plane traffic.
D. Routinely upgrade all network equipment firmware.
Selected Answer: D
Question #: 682
Topic #: 1
A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?
A. Increase the bandwidth allocation to the computer.
B. Install an access switch in the annex and run fiber to the distribution switch.
C. Run a Cat 7 cable from the computer to the distribution switch.
D. Enable the computer to support jumbo frames.
Selected Answer: B
Question #: 684
Topic #: 1
A technician is troubleshooting intermittent connectivity between devices and viewing the following syslog entries from a switch:
21 Feb 2022 16:02:0231 NOTIFICATION %LINK-I-DOWN: G1/10
21 Feb 2022 16:02:0262 NOTIFICATION %LINK-I-UP: G1/10
21 Feb 2022 16:03:5321 NOTIFICATION %LINK-I-DOWN: G1/10
21 Feb 2022 16:03:7873 NOTIFICATION %LINK-I-UP: G1/10
Which of the following are these entries indicative of?
A. DDoS attack
B. Jitter
C. Latency
D. Link flapping
Selected Answer: D
Question #: 685
Topic #: 1
Which of the following can be used to aggregate logs from different devices and would make analysis less difficult?
A. Syslog
B. SIEM
C. Event logs
D. NetFlow
Selected Answer: B
Question #: 686
Topic #: 1
A network administrator is checking to see if anything has changed. Which of the following steps of the troubleshooting methodology is involved?
A. Identify the problem.
B. Test the theory.
C. Establish a theory.
D. Document findings.
Selected Answer: A
Question #: 687
Topic #: 1
An older web server on a screened subnet is serving unencrypted web traffic. The server is not capable of serving HTTPS traffic directly, but the firewall is capable of doing so. Which of the following should be done to encrypt all traffic coming into the web server from outside the network? (Choose two.)
A. A certificate should be installed on the server.
B. Incoming port 80 traffic at the firewall should be forwarded to port 443 on the server.
C. Incoming port 80 traffic at the firewall should be forwarded to port 80 on the server.
D. Incoming port 443 traffic at the firewall should be forwarded to port 80 on the server.
E. A certificate should be installed on the firewall.
F. A proxy server should be installed on the screened subnet.
Selected Answer: DE
Question #: 688
Topic #: 1
A network manager wants to set up a remote access system for the engineering staff. Access to this system will be over a public IP and secured with an ACL. Which of the following best describes this system?
A. VPN
B. Secure Shell
C. Jump server
D. API
Selected Answer: A
Question #: 689
Topic #: 1
A company is hosting a secure server that requires all connections to the server to be encrypted. A junior administrator needs to harden the web server. The following ports on the web server are open:
Which of the following ports should be disabled?
A. 22
B. 80
C. 443
D. 587
Selected Answer: B
Question #: 690
Topic #: 1
Which of the following IP transmission types encrypts all of the transmitted data?
A. ESP
B. AH
C. GRE
D. UDP
E. TCP
Selected Answer: A
Question #: 691
Topic #: 1
A user is unable to reach any resources on the internet. A technician goes to the site and obtains the following output from the workstation:
Which of the following commands should the technician use to correct the issue?
A. route ADD 0.0.0.0 MASK 0.0.0.0 10.10.51.10 metric 35
B. route CHANGE 10.10.51.0 MASK 255.255.255.255 10.10.52.1 metric 5
C. route CHANGE 10.10.51.255 MASK 255.0.0.0 On-Link metric 1
D. route DELETE 127.255.255.255
Selected Answer: A
Question #: 692
Topic #: 1
A network manager wants to view network traffic for devices connected to a switch. A network engineer connects an appliance to a free port on the switch and needs to configure the switch port connected to the appliance. Which of the following is the best option for the engineer to enable?
A. Trunking
B. Port mirroring
C. Full duplex
D. SNMP
Selected Answer: B
Question #: 693
Topic #: 1
An IT administrator needs to connect older smart-plug devices to the network. The administrator wants to prevent future issues from occurring by using an 802.11 standard that only operates on the 2.4GHz frequency. Which of the following standards should the administrator choose?
A. 802.11a
B. 802.11ac
C. 802.11ax
D. 802.11b
Selected Answer: D
Question #: 694
Topic #: 1
A network contains 25 access points. Which of the following devices would be best to change configurations on all the devices remotely?
A. WLAN controller
B. Load balancer
C. Bridge
D. Layer 3 switch
Selected Answer: A
Question #: 695
Topic #: 1
Which of the following is used to estimate the average life span of a device?
A. RTO
B. RPO
C. MTBF
D. MTTR
Selected Answer: C
Question #: 696
Topic #: 1
An IT administrator is creating an alias to the primary customer’s domain. Which of the following DNS record types does this represent?
A. CNAME
B. MX
C. A
D. PTR
Selected Answer: A
Question #: 697
Topic #: 1
Which of the following is a characteristic of the application layer?
A. It relies upon other layers for packet delivery.
B. It checks independently for packet loss.
C. It encrypts data in transit.
D. It performs address translation.
Selected Answer: A
Question #: 698
Topic #: 1
Which of the following is the best VPN to use for only encrypting and routing data for a specific destination?
A. Split-tunnel
B. Site-to-site
C. Client
D. Layer 2
Selected Answer: A
Question #: 699
Topic #: 1
Which of the following is used when a workstation sends a DHCP broadcast to a server on another LAN?
A. Reservation
B. Dynamic assignment
C. Helper address
D. DHCP offer
Selected Answer: C
Question #: 700
Topic #: 1
An administrator is adjusting the routing policy to ensure the headquarters location can connect to a new out-of-state branch office via BGP. Which of the following types of networks is being described?
A. PAN
B. MAN
C. LAN
D. WAN
Selected Answer: D