Comptia Network+ Flashcards
B. Add a layer 3 switch and create a VLAN.
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?A. Add a router and enable OSPF.B. Add a layer 3 switch and create a VLAN.C. Add a bridge between two switches.D. Add a firewall and implement proper ACL.
A. Layer 3 switch
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?A. Layer 3 switchB. Proxy serverC. Layer 2 switchD. Smart hub
D. Reservations
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?A. LeasesB. Helper addressesC. ScopesD. Reservations
A. Default gatewayB. Subnet maskF. DNS servers
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE).A. Default gatewayB. Subnet maskC. ReservationsD. TFTP serverE. Lease expiration time of 1 dayF. DNS serversG. Bootp
B. Implement a split horizon DNS
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?A. Configure NAT on the firewallB. Implement a split horizon DNSC. Place the server in the DMZD. Adjust the proper internal ACL
D. Mail server
When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?A. Load balancerB. FTP serverC. Firewall DMZD. Mail server
D. MPLS
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?A. BGPB. OSPFC. IS-ISD. MPLS
C. Analog modem
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?A. Multilayer switchB. Access pointC. Analog modemD. DOCSIS modem
A. RS-232
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?A. RS-232B. 802.3C. ATMD. Token ring
B. BNC
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?A. 66 blockB. BNCC. F-connectorD. RJ-11
D. RG6
An F-connector is used on which of the following types of cabling?A. CAT3B. Single mode fiberC. CAT5D. RG6
B. 1000Base-SRE. 10GBase-SR
A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).A. 1000Base-LRB. 1000Base-SRC. 1000Base-TD. 10GBase-LRE. 10GBase-SRF. 10GBase-T
C. Ring
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?A. StarB. BusC. RingD. Mesh
A. Star
A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?A. StarB. RingC. MeshD. Bus
B. Star
Which of the following network topologies has a central, single point of failure?A. RingB. StarC. HybridD. Mesh
A. CAN
Which of the following refers to a network that spans several buildings that are within walking distance ofeach other?A. CANB. WANC. PAND. MAN
A. PAN
Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?A. PANB. LANC. WLAND. MAN
B. Loopback
Which of the following describes an IPv6 address of ::1?A. BroadcastB. LoopbackC. ClasslessD. Multicast
B. 192.168.1.254
Which of the following is an example of an IPv4 address?A. 192:168:1:55B. 192.168.1.254C. 00:AB:FA:B1:07:34D. ::1
B. 127.0.0.1
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?A. 10.0.0.1B. 127.0.0.1C. 172.16.1.1D. 192.168.1.1
E. /30
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connectedrouters. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?A. /24B. /32C. /28D. /29E. /30
A. APIPA
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?A. APIPAB. MACC. StaticD. Public
D. BGP
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?A. Load balancerB. VRRPC. OSPFD. BGP
C. SYSLOG server
Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location?A. TACACS+ serverB. Single sign-onC. SYSLOG serverD. Wi-Fi analyzer
C. SIEM
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?A. Event logB. SyslogC. SIEMD. SNMP
C. iSCSI
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?A. HTTPSB. Fibre channelC. iSCSID. MS-CHAP
C. Baseline
A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?A. Regression testB. Speed testC. BaselineD. Statement of work
B. Network device CPU issues
It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?A. Network device power issuesB. Network device CPU issuesC. Storage area network issuesD. Delayed responses from RADIUS
E. Interface link status
A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54" Which of the following is being monitored to trigger the alarm?A. Speed and duplex mismatchB. Wireless channel utilizationC. Network device CPUD. Network device memoryE. Interface link status
D. Change duplex to full
The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?Output:Fast Ethernet 0 is up, line protocol is upInt ip address is 10.20.130.5/25MTU 1500 bytes, BW10000 kbit, DLY 100 usecReliability 255/255, Tx load 1/255, Rx load 1/255Encapsulation ospf, loopback not setKeep alive 10Half duplex, 100Mb/s, 100 Base Tx/FxReceived 1052993 broadcasts0 input errors983881 packets output, 768588 bytes0 output errors, 0 collisions, 0 resetsA. Set the loopback addressB. Change the IP addressC. Change the slash notationD. Change duplex to full
B. Recent backups
The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?A. Vendor documentationB. Recent backupsC. Physical IP addressD. Physical network diagram
B. Asset management
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?A. Network mapB. Asset managementC. Change managementD. Baselines
D. Configure a test lab for updates
A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?A. Configure an automated patching serverB. Virtualize the servers and take daily snapshotsC. Configure a honeypot for application testingD. Configure a test lab for updates
A. Implement an environment to test the enhancements.
A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed.Which of the following will mitigate production outages before the enhancements are deployed?A. Implement an environment to test the enhancements.B. Implement ACLs that only allow management access to the enhancements.C. Deploy an IPS on the production network.D. Move the software team's workstations to the DMZ.
D. Install the software in a test environment
A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST?A. Remove all user accounts on the serverB. Isolate the server logically on the networkC. Block all HTTP traffic to the serverD. Install the software in a test environment
A. Security through isolation
Network segmentation provides which of the following benefits?A. Security through isolationB. Link aggregationC. Packet flooding through all portsD. High availability through redundancy
E. Roll back the drivers to the previous version.
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible?A. Reformat and install the compatible drivers.B. Reset Ann's equipment configuration from a backup.C. Downgrade the PC to a working patch level.D. Restore Ann's PC to the last known good configuration.E. Roll back the drivers to the previous version.
B. A minor release upgrade of a production router.
Which of the following requires the network administrator to schedule a maintenance window?A. When a company-wide email notification must be sent.B. A minor release upgrade of a production router.C. When the network administrator's laptop must be rebooted.D. A major release upgrade of a core switch in a test lab.
B. Install recommended updates
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit?A. Utilize a FTP serviceB. Install recommended updatesC. Send all log files through SMTPD. Configure the firewall to block port 22
A. Ensure patches are deployed
An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item?A. Ensure patches are deployedB. Install an IDS on the networkC. Configure the firewall to block traffic on port 443D. Implement a VPN for employees
D. Patch management
A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?A. Host-based intrusion detection systemsB. Acceptable use policiesC. Incident response teamD. Patch management
A. VTP
Which of the following protocols must be implemented in order for two switches to share VLAN information?A. VTPB. MPLSC. STPD. PPTP
B. Spanning tree
A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation?A. Port mirroringB. Spanning treeC. ARP inspectionD. VLAN
D. TRUNK
A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?A. DHCPB. Split horizonC. CIDRD. TRUNK
A. 802.1q is not configured on the switch port
A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem?A. 802.1q is not configured on the switch portB. APIPA has been misconfigured on the VLANC. Bad SFP in the PC's 10/100 NICD. OS updates have not been installed
A. DWDM
Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths?A. DWDMB. SONETC. ADSLD. LACP
C. LACP
When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?A. Port mirroringB. 802.1wC. LACPD. VTP
A. PoE
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?A. PoEB. Port bondingC. VLAND. Trunking
C. Shared secret key is mismatched
A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?A. Username is misspelled is the device configuration fileB. IDS is blocking RADIUSC. Shared secret key is mismatchedD. Group policy has not propagated to the device
D. Increase the number of virtual terminals available
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue?A. Increase installed memory and install a larger flash module.B. Increase the number of VLANs configured on the switch.C. Decrease the number of VLANs configured on the switch.D. Increase the number of virtual terminals available.
D. MIMO
A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?A. MU-MIMOB. LWAPPC. PoED. MIMO
D. Patch
A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?A. YagiB. Omni-directionalC. ParabolicD. Patch
B. VLAN hopping
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?A. Smurf attackB. VLAN hoppingC. BluesnarfingD. Spear phishing
A. Compromised system
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without anyresponse from the server. Which of the following is the BEST explanation that describes this scenario?A. Compromised systemB. Smurf attackC. SQL injection attackD. Man-in-the-middle
C. TEMPEST
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted?A. DWDMB. MIMOC. TEMPESTD. DOCSIS
A. Install host-based anti-malware software
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?A. Install host-based anti-malware softwareB. Implement MAC filtering on all wireless access pointsC. Add an implicit deny to the core router ACLD. Block port 80 outbound on the company firewallE. Require users to utilize two-factor authentication
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?A. The VoIP phone would request a new phone number from the unified communications server.B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.D. The VoIP phone would request a different configuration from the unified communications server.
D. SNMPv3
A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner?A. S/MIMEB. SYSLOGC. PGPD. SNMPv3E. RSH
C. SNMPv3
A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?A. WPA2B. IPv6C. SNMPv3D. RIPv2
A. SSL
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?A. SSLB. DNSSECC. WPA2D. MTU
C. Web content filtering
A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?A. ARP inspectionB. Intrusion detection systemC. Web content filteringD. Port filtering
A. 802.1x
A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?A. 802.1xB. 802.1pC. Single sign-onD. Kerberos
B. MAC filtering
A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points?A. Port forwardingB. MAC filteringC. TLS/TTLSD. IP ACL
C. Provide an MD5 hash for each file
A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?A. Use TFTP for tested and secure downloadsB. Require biometric authentication for patch updatesC. Provide an MD5 hash for each fileD. Implement a RADIUS authentication
C. Man trapsD. BiometricsE. Cipher locks
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).A. RSAB. PasswordsC. Man trapsD. BiometricsE. Cipher locksF. VLANsG. 3DES
B. Proximity readers
Which of the following physical security controls prevents an attacker from gaining access to a network closet?A. CCTVsB. Proximity readersC. Motion sensorsD. IP cameras
C. A host-based firewall which allows all outbound communication
A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?A. A cloud-based antivirus system with a heuristic and signature based engineB. A network based firewall which blocks all inbound communicationC. A host-based firewall which allows all outbound communicationD. A HIDS to inspect both inbound and outbound network communication
C. Software firewall
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?A. Hardware firewallB. Proxy serverC. Software firewallD. GRE tunneling
A. 11, 10, 12, 13
A firewall ACL is configured as follows:10. Deny Any Trust to Any DMZ eq to TCP port 2211. Allow 10.200.0.0/16 to Any DMZ eq to Any12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 44313. Deny Any Trust to Any DMZ eq to AnyA technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?A. 11, 10, 12, 13B. 12, 10, 11, 13C. 13, 10, 12, 11D. 13, 12, 11, 10
D. Add the system to the DMZ
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?A. Disable the network based firewallB. Implicit deny all traffic on networkC. Configure a VLAN on Layer 2 switchD. Add the system to the DMZ
C. Posture assessment
The ability to make access decisions based on an examination of Windows registry settings, antivirussoftware, and AD membership status is an example of which of the following NAC features?A. Quarantine networkB. Persistent agentsC. Posture assessmentD. Non-persistent agents
C. Guest network
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?A. Quarantine networkB. Core networkC. Guest networkD. Wireless network
B. Isolated corporate resources
Which of the following is a security benefit gained from setting up a guest wireless network?A. Optimized device bandwidthB. Isolated corporate resourcesC. Smaller ACL changesD. Reduced password resets
B. Stop and escalate to the proper authorities
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform?A. Erase the files created by the virusB. Stop and escalate to the proper authoritiesC. Check the remaining directories for more .mp4 filesD. Copy the information to a network drive to preserve the evidence
D. Chain of custody
A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?A. Document the sceneB. Forensics reportC. Evidence collectionD. Chain of custody
D. Determine if anything has changed.
A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?A. Establish a theory of probable cause.B. Document actions and findings.C. Determine next steps to solve the problem.D. Determine if anything has changed.
C. Is the user able to access any network resources?
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?A. Does the printer have toner?B. Are there any errors on the printer display?C. Is the user able to access any network resources?D. Is the printer powered up?
B. Establish a plan to locate the rogue DHCP server.
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A. Document the findings and action taken.B. Establish a plan to locate the rogue DHCP server.C. Remove the rogue DHCP server from the network.D. Identify the root cause of the problem.
C. The WAP is using AES encryptionE. The WAP is using the 5GHz
A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition.myClient$ wificard --getinfoagrCtlRSSI:-72agrExtRSSI:0state:runningop mode: stationlastTxRate:178MaxRate:300802.11 auth:openlink auth:wpa2-pskBSSID:0F:33:AE:F1:02:0ASSID:CafeWirelessChannel:149,1Given this output, which of the following has the technician learned about the wireless network? (Select TWO).A. The WAP is using RC4 encryptionB. The WAP is using 802.11aC. The WAP is using AES encryptionD. The WAP is using the 2.4GHz channelE. The WAP is using the 5GHz
D. ipconfig
An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP?A. tracertB. pingC. digD. ipconfigE. netstat
C. Configure the firewall to allow echo reply in and echo request out of the network
A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert:1 * Request timed out.2 * Request timed out.3 * Request timed out.The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network?A. Enable split horizon to allow internal tracert commands to pass through the firewallB. Enable IGMP messages out and block IGMP messages into the networkC. Configure the firewall to allow echo reply in and echo request out of the networkD. Install a backdoor to access the router to allow tracert messages to pass through
D. tracert
A network technician has received comments from several users that cannot reach a particular website. Which of the following commands would provide the BEST information about the path taken across the network to this website?A. pingB. netstatC. telnetD. tracert
B. Run the following command on the administrator's workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0e
After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is 192.168.0.10/23?A. Use the reset button on the back of the firewall to restore it to its factory default, and then log ontoB. Run the following command on the administrator's workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0eC. Use an SNMP tool to query the firewall properties and determine the correct management IP addressD. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1
B. show mac address-table
A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?A. nbtstat -aB. show mac address-tableC. show interface statusD. show ip access-listE. nslookup hostname
D. Toner probe
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?A. Cable certifierB. MultimeterC. Cable testerD. Toner probe
B. The user is connected to the wrong SSID.
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares andprinters. Which of the following has happened to the user?A. The user is connected using the wrong channel.B. The user is connected to the wrong SSID.C. The user is experiencing an EMI issue.D. The user is connected to the wrong RADIUS server.
D. Bad wiring
A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?A. EMIB. RFIC. Cross-talkD. Bad wiring
A. The wrong wavelength was demuxed from the multiplexer.
A technician is tasked with connecting a router to a DWDM. The technician connects the router to themultiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause?A. The wrong wavelength was demuxed from the multiplexer.B. The SFP in the multiplexer is malfunctioning.C. There is a dirty connector on the fiber optic cable.D. The fiber optic cable is bent in the management tray.
D. Bend radius exceeded
While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?A. Maximum cable length exceededB. Dirty connectorsC. RF interference caused by impedance mismatchD. Bend radius exceeded
A. The gateway is misconfigured on the new router.
A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?A. The gateway is misconfigured on the new router.B. The subnet mask is incorrect on the new router.C. The gateway is misconfigured on the edge router.D. The SSID is incorrect on the new router.
C. DHCP server
While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem?A. Default gateway addressB. Misconfigured DNSC. DHCP serverD. NIC failure
D. Missing default gateway
A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility:Network DestinationNetmaskGatewayInterface192.168.1.0 255.255.255.0192.168.1.254eth0192.168.1.10255.255.255.255192.168.1.10eth0127.0.0.1255.0.0.0On-Linlo127.0.0.0255.0.0.0On-Linklo255.255.255.255255.255.255.255102.168.1.10eth0Which of the following is the reason for the computer issue, given the above output?A. Wrong default gateway netmaskB. Incorrect default gateway addressC. Default gateway on the wrong interfaceD. Missing default gateway
E. The router interface is configured with the incorrect IP address.F. The default gateway is configured incorrectly.
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:Interface A:IP address: 10.10.150.16Subnet mask: 255.255.255.240Default gateway: 10.10.150.32Speed: 1000 MbpsDuplex: AutoState: No ShutdownNone of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO).A. There is a duplex mismatch between the router and ISP.B. The router interface is turned off.C. The interface is set to the incorrect speed.D. The router is configured with the incorrect subnet mask.E. The router interface is configured with the incorrect IP address.F. The default gateway is configured incorrectly.
C. Incorrect VLAN assignment
A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem?A. Damaged cableB. Duplex mismatchC. Incorrect VLAN assignmentD. Speed mismatch
A. Update the DNS server with the proxy server information.
A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue?A. Update the DNS server with the proxy server information.B. Implement a split horizon DNS server.C. Reboot the web proxy and then reboot the DNS server.D. Put the proxy server on the other side of the demarc.
B. Via HTTP using the default username and password
Two weeks after installation, a network technician is now unable to log onto any of the newly installedcompany switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?A. Via SSH using the RADIUS shared secretB. Via HTTP using the default username and passwordC. Via console using the administrator's passwordD. Via SNMP using the default RO community
D. The interface status will show line protocol down.
A network technician is troubleshooting a problem at a remote site. It has been determined that theconnection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action?A. The normal amount of errors and the connection problem has been resolved.B. The interface status will indicate that the port is administratively down.C. The traffic will flow, but with excessive errors.D. The interface status will show line protocol down.
D. Split horizon
Which of the following helps prevent routing loops?A. Routing tableB. Default gatewayC. Route summarizationD. Split horizon
C. Local hosts file
After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked?A. Server host fileB. Subnet maskC. Local hosts fileD. Duplex settings
B. Satellite
Which of the following WAN technologies is associated with high latency?A. T1B. SatelliteC. CableD. OCx
B. Physical layer
When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?A. Transport layerB. Physical layerC. Network layerD. Session layer
A. Layer 1
A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved?A. Layer 1B. Layer 2C. Layer 3D. Layer 4E. Layer 7
A. Layer 2E. Data link
When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO).A. Layer 2B. Layer 3C. Layer 5D. Transport layerE. Data linkF. Physical layer
A. Network
A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output:SRC MACSRC IPDST MACDST IP00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:120005:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring?A. NetworkB. ApplicationC. Data linkD. Transport
A. CSMA/CD
Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?A. CSMA/CDB. OSPFC. DOCSISD. BGP
C. 802.11 AP
Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?A. FirewallB. RouterC. 802.11 APD. Switch
A. 802.11a
The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used?A. 802.11aB. 802.11bC. 802.11gD. 802.1x
C. 802.11b
A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network?A. 802.11aB. 802.11acC. 802.11bD. 802.11g
B. 802.11ac
A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?A. 802.11gB. 802.11acC. 802.11bD. 802.11a
A. 802.11ac with 2 spatial streams and an 80MHz bandwidth
A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need?A. 802.11ac with 2 spatial streams and an 80MHz bandwidthB. 802.11ac with 3 spatial streams and a 20MHz bandwidthC. 802.11ac with 3 spatial streams and a 40MHz bandwidthD. 802.11ac with 4 spatial streams and a 160MHz bandwidth
B. Confirm the new host is compatible with 10BaseT Ethernet
A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect?A. Confirm the new host is using 10GBaseSR due to the manufacturing environmentB. Confirm the new host is compatible with 10BaseT EthernetC. Confirm the existing 10Base2 equipment is using the proper frame typeD. Confirm that CSMA/CD is disabled on the Ethernet network
C. AUP
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?A. SOPB. BEPC. AUPD. SLA
B. SLA
A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the:A. MLA.B. SLA.C. SOW.D. MOU.
C. SOW
A customer has engaged a company to improve the availability of all of the customer's services andapplications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?A. MLAB. MOUC. SOWD. SLA
B. MSDS
A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted?A. HCLB. MSDSC. SLAD. HVAC
A. Fire suppression
An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?A. Fire suppressionB. Mantraps at the entryC. HVACD. UPS and battery backups
B. MDF
Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?A. 110 blockB. MDFC. DSUD. CSU
D. Datagram
Which of the following PDUs is used by a connectionless protocol?A. FramesB. SegmentsC. StreamsD. Datagram
A. 20B. 21
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).A. 20B. 21C. 22D. 23E. 67F. 68
D. Port 69 is blocked on a router between the network segments
A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error?A. Only FTP can be used to copy configurations from switchesB. Anonymous users were not used to log into the TFTP serverC. An incorrect password was used and the account is now lockedD. Port 69 is blocked on a router between the network segments
B. 3389
A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened?A. 445B. 3389C. 5004D. 5060