March Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA N10-007 CompTIA Network+ N10-007 Exam Practice Test

Demo: 103 questions
Total 688 questions

CompTIA Network+ N10-007 Questions and Answers

Question 1

Which of the following can be used to enable and translate the communication between legacy non-IP phone systems with solutions for voice communications that can run over the Internet?

Options:

A.

Media converter

B.

RTP

C.

ISDN service

D.

VoIP gateway

E.

SIP trunk

Question 2

Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network. Upon further inspection, the technician finds an employee has plugged a rogue wireless router Into the corporate network. Which of the following settings would have prevented this situation?

Options:

A.

DHCP snooping

B.

DHCP relay

C.

DHCP leasing

D.

DHCP options

Question 3

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

Options:

A.

Transceiver mismatch

B.

VLAN mismatch

C.

Port security

D.

Damaged cable

E.

Duplex mismatch

Question 4

A user reports a laptop wireless connection is working at the user's desk but not in a recent building addition. A network administrator logs into the wireless controller, searches for the user's MAC address, and receives the following results:

Which of the following describes the reason for the issue?

Options:

A.

Frequency mismatch

B.

Distance limitation

C.

Channel overlap

D.

Wrong SSID

Question 5

Which of the following would MOST likely contain information about credential reuse?

Options:

A.

Acceptable use policy

B.

Password policy

C.

Non-disclosure agreement

D.

Remote access policy

Question 6

A technician receives a report that Joe. an existing user is unable to access the network. Joe confirms that he had full access the previous clay. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe Is able to access the network. Which of the following is the MOST likely cause of this issue?

Options:

A.

Incorrect pin-out

B.

Bad port

C.

Transceiver mismatch

D.

Incorrect cable type

Question 7

The main purpose of jumbo frames is to increase the:

Options:

A.

timeout value to ensure critical data is received

B.

VLAN ID field to allow for higher-numbered VLANs.

C.

MTU size to pass more data quicker

D.

TTL value to pass data further across the network

Question 8

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?

Options:

A.

A network tap

B.

A proxy server

C.

A UTM appliance

D.

A content filter

Question 9

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator

recommend to assist with detecting these activities?

Options:

A.

Implement file integrity monitoring.

B.

Change the default credentials.

C.

Use SSL encryption.

D.

Update the web-server software.

Question 10

Which of the following accurately describes a warm site in datacenter disaster recovery?

Options:

A.

An online standby datacenter that is fully equipped without company data

B.

A backup datacenter location that is ready for equipment to be installed

C.

A backup datacenter location that is fully equipped bot not online

D.

An online, standby datacenter that is fully equipped with all company data

Question 11

A network administrator installed a WAP to extend the network. However, the company wants to contain the signal so it does not extend beyond the company's parking structure. Which of the following solutions would work BEST?

Options:

A.

Create MAC filtering.

B.

Change the channel.

C.

Change the encryption.

D.

Install a directional antenna.

Question 12

A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?

Options:

A.

DB9

B.

RJ11

C.

RJ45

D.

DB25

Question 13

An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?

Options:

A.

5

B.

7

C.

10

D.

15

Question 14

A network technician just completed the installation of a new switch; however, endpoints connected to the switch are unable to receive an IP address. The technician realizes the clients are not on the

same subnet as the DHCP server. Which of the following would be the BEST method to resolve the issue?

Options:

A.

Install a second DHCP server.

B.

Configure DHCP reservations.

C.

Use DHCP relay.

D.

Expand the DHCP scopes

Question 15

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

Options:

A.

A VPN concentrator

B.

A load balancer

C.

A wireless controller

D.

A RADIUS server

Question 16

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

Options:

A.

10BASE-T

B.

100BASE-T

C.

1000BASE-LX

D.

1000BASE-SX

Question 17

A network technician needs to install new network cables. The technician will be running the cables in the air return space above the drop ceiling. Which of the following cable types should be installed?

Options:

A.

Plenum

B.

Coaxial

C.

Shielded twisted pair

D.

Fiber optic

Question 18

You have been tasked with implementing an ACL on the router that will:

1. Permit appropriate, secure remote-access technologies from the management network to all other local network segments. Explicitly deny all other traffic from the management network

2. Ensure the user subnet cannot remotely menage devices in the Linux and Windows Server segments

3. Prohibit any traffic that has not been specifically allowed.

Options:

Question 19

A network technician needs to replace a failed hard drive on a server at the company's large, remote datacenter Which of the following types of documentation should be reviewed to locate this server easily?

Options:

A.

Logical diagrams

B.

Rack diagrams

C.

Change management

D.

Standard operating procedures

Question 20

Devices on a network will need to obtain DHCP leases from a server on a different network. Which of the following must the engineer Implement for DHCP to forward requests to the designated server?

Options:

A.

Trunking

B.

A forward lookup zone

C.

A proxy server

D.

An IP helper

Question 21

A network technician is attempting to resolve an issue for two users. The users unplugged and moved their laptops to a different cubicle to work together. The NIC LED Is lit on both laptops, but the users are not able to access the network resources. Which of the following is MOST likely preventing access?

Options:

A.

Port security

B.

Auto-MDIX

C.

BDPU guard

D.

DHCP snooping

Question 22

A customer warns to be able to separate traffic on a local network without using a router. Which of the following should a technician install?

Options:

A.

A multilayer switch

B.

A wireless controller

C.

A load balancer

D.

A VPN concentrator

E.

A UTM appliance

Question 23

A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall?

Options:

A.

Secure SNMP

B.

Port security

C.

Implicit deny

D.

DHCP snooping

Question 24

To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

Options:

A.

WPA2-Personal

B.

WPA2-Enterprise

C.

WPA

D.

WEP

Question 25

Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?

Options:

A.

EIGRP

B.

BGP

C.

IPv6

D.

MPLS

Question 26

A company recently upgraded a legacy firewall to an NGFW Which of the following can be deployed without extra hardware to restrict access to offending websites?

Options:

A.

A UTM appliance

B.

Content filtering

C.

An IPS

D.

A proxy server

Question 27

An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

Options:

A.

MS-CHAP

B.

RADIUS

C.

LDAPS

D.

RSTP

Question 28

A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the company’s network? (Choose three.)

Options:

A.

67

B.

68

C.

161

D.

636

E.

1720

F.

5060

G.

5061

Question 29

Which of the following protocols is used during web browsing to resolve website names?

Options:

A.

HTTP

B.

LDAP

C.

SNMP

D.

DNS

Question 30

The lack of which of the following components might make a virtual router less efficient than a physical router?

Options:

A.

ASIC

B.

Hardware MAC

C.

Jumbo frame

D.

MPLS

Question 31

A network technician needs to visit a datacenter. To be admitted, the security officer requests to see a driver's license, and then directs the technician to a fingerprint scanner. Which of the following authentication factors is the facility requiring for admittance? (Select TWO).

Options:

A.

Something you have

B.

Something you know

C.

Something you do

D.

Something you are

E.

Somewhere you are

Question 32

A company recently experienced a breach that brought its business to a halt. An attacker was able to access its intemal systems, run elevated commands to retrieve sensitive data, and then remove

critical OS files. The company wants to stop such attacks in the future. Which of the following should a technician recommend?

Options:

A.

IDS

B.

ICS

C.

ISDN

D.

IDF

E.

IPS

Question 33

A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the technician configure?

Options:

A.

ac

B.

b

C.

g

D.

n

Question 34

A Chief Information Officer (CIO) wants to improve the availability of a company's SQL database Which of the following technologies should be utilized to achieve maximum availability?

Options:

A.

Clustering

B.

Port aggregation

C.

NIC teaming

D.

Snapshots

Question 35

A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?

Options:

A.

The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS

B.

The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the

administrator.

C.

The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch

D.

The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to management.

Question 36

A network technician has provisioned a new Linux instance in public cloud provider’s IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server’s public IP address securely to start a console session. Which of the following remote access methods should the technician use?

Options:

A.

SSH

B.

Telnet

C.

VNC

D.

RDP

Question 37

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

Options:

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Question 38

A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed?

Options:

A.

1000BaseLX SFP

B.

Duplex GBIC

C.

Duplex SFP+

D.

Bidirectional SFP

Question 39

A network engineer at a large company is restricting Internet browsing on the corporate WAN to only business-related external websites. Which of the following is the BEST solution to achieve this goal while avoiding the need to configure this restriction on each PC?

Options:

A.

Web application firewall

B.

Content filter

C.

IPS

D.

VPN concentrator

Question 40

A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware?

Options:

A.

RDP

B.

SSH

C.

TFTP

D.

Telnet

Question 41

A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?

Options:

A.

other users in the marketing department to see if they are also having connectivity issues.

B.

Reboot the email server and verify connectivity once it is up again.

C.

Check the router and firewall to see if ACLs or firmware have changed in the last 24 hours.

D.

Check for network connectivity on the user’s PC and reinstall the email client.

Question 42

Which of the following should be performed on a regular basis to prevent unauthorized access to a company network? (Choose two.)

Options:

A.

Packet analysis

B.

Reviewing baselines

C.

Vulnerability scanning

D.

Patch management

E.

Log archiving

Question 43

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Instructions

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit’ button.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 44

A network technician installed a new host on the network. The host is not connecting to the company’s cloud servers. The technician attemtps to ping a server using the AP address with no success. Checking the IP address using ipconfing displays:

Which of the following should the technician perform NEXT to determine where the issue is located?

Options:

A.

Modify the default gateway address and ping the server to test connectivity.

B.

Change the DNS servers to be on the same subnet as the host.

C.

Modify the router’s ACL to allow port 80 to exit the network.

D.

Perform a tracert command to locate where the packet is dropped.

Question 45

A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following Is MOST likely the issue?

Options:

A.

EMI

B.

TX/RX reverse

C.

Open/short

D.

Attenuation

Question 46

A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?

Options:

A.

WPA-PSK

B.

EAP-TLS

C.

AES-CCMP

D.

WEP-TKIP

Question 47

A company hires another firm to test the integrity of its information security controls. This is an example of

Options:

A.

role separation.

B.

device hardening

C.

risk assessment

D.

penetration testing.

Question 48

A network technician has deployed an application that can remotely control desktops with different operating systems. The technician needs to be able to use a single client application for this control. Which of the following has the technician utilized?

Options:

A.

RDP

B.

VPN

C.

VNC

D.

SSH

Question 49

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

Options:

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Question 50

A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the ceiling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation'?

Options:

A.

Plenum

B.

PVC

C.

Single-mode

D.

Cat 7

Question 51

Which of the following should be configured to allow for IP-to-name resolutions?

Options:

A.

CNAME

B.

A

C.

PTR

D.

NS

Question 52

A network technician is creating a diagram of network termination points in the building. The technician diagrammed the core network room and now needs to diagram the auxiliary network closets. Which of the following is the technician MOST likely going to add to the diagram?

Options:

A.

IDF

B.

MDF

C.

VRF

D.

TDM

Question 53

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods would meet this requirement?

Options:

A.

PEAP

B.

WP2-PSK

C.

Captive portal

D.

EAP-TLS

Question 54

Which of the following is used to define the duration during which a client can use an IP address?

Options:

A.

MAC reservation

B.

IP helper

C.

Pool

D.

Lease time

Question 55

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

Options:

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Question 56

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

Options:

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter

Question 57

A network technician wants to gain a better understanding of network trends to determine if they are over capacity. Which of the following processes should the technician use?

Options:

A.

Log review

B.

Port scanning

C.

Vulnerability scanning

D.

Traffic analysis

Question 58

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?

Options:

A.

Powerline extender

B.

Ethernet-over-power adapter

C.

Power-over-Ethernet switch

D.

Power distribution unit

E.

Ethernet power controller

Question 59

Which of the following devices would allow a network administrator to block an application at Layer7 on the network?

Options:

A.

Firewall

B.

NGFW

C.

Router

D.

Spam filter

Question 60

A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?

Options:

A.

Change the default credentials.

B.

Verify the firmware file hash.

C.

Disable unused switch ports.

D.

Apply patches and updates.

Question 61

A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest?

Options:

A.

SMF

B.

Cat 3

C.

Cat 5

D.

Cat 6

E.

RG-6

Question 62

Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?

Options:

A.

Transceiver mismatch

B.

Crosstalk

C.

Jitter

D.

Open/short on the cable

Question 63

An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?

Options:

A.

Ensure the host-based firewall allows TCP port 3389.

B.

Log in to the border firewall and ensure TCP port 3389 Is allowed.

C.

Check the iptables configuration for TCP port 3389.

D.

Use netstat to determine If there Is a connection to TCP port 3389.

Question 64

A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall. Which of the following should the technician use to troubleshoot?

Options:

A.

WiFi analyzer

B.

Bandwidth speed tester

C.

Dig

D.

Packet sniffer

Question 65

Which of the following BEST describes the characteristics of a differential backup solution?

Options:

A.

Backs up files with the creation or modified date as the current date.

B.

Backs up all files and sets the archive bit.

C.

Backs up files with a date earlier than today’s date with a clear archive bit.

D.

Backs up files with the archive bit set but does not clear the bit.

Question 66

A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?

Options:

A.

Attenuation

B.

Incorrect pin-out

C.

Damaged cable

D.

Switch configuration

Question 67

A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this?

Options:

A.

Change management

B.

Rack diagram

C.

Network configuration

D.

Network diagram

Question 68

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

Options:

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Question 69

When deploying UTP cables In a networking environment, which of the following are acceptable standards? (Select TWO).

Options:

A.

10Base2

B.

10Base5

C.

10GBaseT

D.

1000BaseLX

E.

1000BaseSX

F.

1000BaseT

Question 70

Which of the following operate only within the UDP protocol?

Options:

A.

Frames

B.

Datagrams

C.

Segments

D.

Packets

Question 71

A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.)

Options:

A.

Site-to-site VPN

B.

Client-to-site VPN

C.

RDP

D.

SSH

E.

SFTP

F.

Captive portal

Question 72

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

Options:

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Question 73

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Question 74

A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?

Options:

A.

Verify user credentials.

B.

Generate new keys and certificates.

C.

Disable unnecessary services.

D.

Hash files that will be stored.

Question 75

A network technician is reviewing the following output from a router:

Which of the following is this an example of?

Options:

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Question 76

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

Options:

A.

1

B.

2

C.

3

D.

4

E.

5

Question 77

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

Options:

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Question 78

The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

Options:

A.

Frequency mismatch

B.

Crosstalk

C.

Interference

D.

Channel overlap

Question 79

A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?

Options:

A.

Bridge

B.

WAP

C.

Hub

D.

Switch

Question 80

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

Options:

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Question 81

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Question 82

A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with:

Ping request could not find host

Which of the following is the MOST likely misconfiguration?

Options:

A.

Incorrect netmask

B.

DNS

C.

DHCP

D.

SSL certificate

Question 83

A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer’s request?

Options:

A.

Connect the five PCs to a hub that is not connected to the corporate network.

B.

Connect the five PCs to a switching router and assign the PCs to a separate VLAN.

C.

Connect the five PCs to a hardware firewall that is connected to the router.

D.

Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.

Question 84

A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?

Options:

A.

802.1X

B.

Captive portal

C.

Port security

D.

NAC

Question 85

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

Options:

A.

164.10.12.0/24

B.

164.10.12.64/29

C.

164.10.12.128/26

D.

164.10.12.191/28

Question 86

Which of the following WAN transmission mediums is the fastest and can travel the longest distance?

Options:

A.

Satellite

B.

Copper

C.

Wireless

D.

Fiber

Question 87

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

Options:

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Question 88

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

Options:

A.

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network.

B.

An IDS will detect traffic anomalies, alert and log them, and block the traffic.

C.

An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic.

D.

An IPS will detect traffic anomalies, alert and log them, and allow them through the network.

E.

An IPS will detect previously unknown traffic signatures, and alert and log them.

F.

An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Question 89

A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

Options:

A.

Diagram symbols

B.

Rack diagram

C.

Logical diagram

D.

Port locations

Question 90

Which of the following OSI layers contains the LLC function?

Options:

A.

Network

B.

Data link

C.

Session

D.

Transport

Question 91

A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all

buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?

Options:

A.

The SMTP relays in the datacenter

B.

The MAC address reservations

C.

The IP helper address on the switch

D.

The ARP forwarding on the switch

Question 92

Which of the following is an IPv6 transition mechanism in which network devices utilize IPv4 and IPv6 at the same time?

Options:

A.

6to4

B.

ISATAP

C.

Teredo

D.

Dual stack

Question 93

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

Options:

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Question 94

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)

Options:

A.

Change the default credentials.

B.

Disable unnecessary services.

C.

Secure the physical access.

D.

Generate new encryption keys.

E.

Enable HTTPS access.

F.

Turn on WPS.

Question 95

A new DSL circuit was installed to replace the cable service and is not functioning. A network administrator needs to create a cable to connect the circuit. Which of the following connector types should the network administrator use on the cable?

Options:

A.

RJ11

B.

RJ45

C.

DB-25

D.

BNC

Question 96

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?

Options:

A.

Pre-shared key

B.

Open

C.

EAP-TLS

D.

WPA2

Question 97

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

Options:

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Question 98

A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

Options:

A.

Standard operating procedures

B.

Wiring diagram

C.

Inventory documentation

D.

Network baseline

Question 99

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Options:

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Question 100

A corporation has been the target of hackers who exploited TCP port 80. The network administrator is tasked with securing connections to the web server. Which of the following protocols should be implemented to BEST secure the web server? (Choose two.)

Options:

A.

HTTPS

B.

SSH

C.

TLS

D.

VNC

E.

RDP

F.

SFTP

Question 101

A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?

Options:

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Question 102

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

Options:

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Question 103

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

Options:

A.

Avoiding common passwords

B.

File hashing

C.

Disabling unused IP ports

D.

Using secure protocols

Demo: 103 questions
Total 688 questions