A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).
A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Firewall rules:
Permit 192.168.5.16/28192.168.5.0/28
Permit 192.168.5.0/24192.168.4.0/24
Permit 192.168.4.0/24192.168.5.0/24
Deny 192.168.5.0/28192.168.5.16/28
Deny 192.168.14.0/24192.168.5.16/28
Deny 192.168.0.0/24192.168.5.0/24
An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?
A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?
A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?
Which of the following would a network administrator use to scan a network for vulnerabilities?
Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?
A network technician is configuring a new firewall for placement into an existing network infrastructure. The existing network is connected to the Internet by a broadband connection. Which of the following represents the BEST location for the new firewall?
Which of the following is used to determine whether or not a user’s account is authorized to access a server remotely?
Which of the following security appliances are used to only identify traffic on individual systems?
PKI is a method of user authentication which uses which of the following?
Which of the following uses SSL encryption?
If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
A user authenticated to more than one website using their same credentials is an example of:
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall. Using the default port numbers, which of the following should the administrator configure? (Select TWO).
An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT?
A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition?
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?
Which of the following is a value that can be received from a DHCP server?
Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?
Building ABuilding BBuilding C
Channel: 1Channel: 6Channel: 11
Encryption: WPA2Encryption: OpenEncryption: WPA2
SSID. CorpSSID. GuestSSID. Sales
A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?
An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?
A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?
Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
Which of the following performance benefits would multiple domain controllers BEST provide?
A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?
The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?
A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?
A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?
An IP address assigned from a DHCP server is said to be which of the following?
Which of the following antenna types has a flat circular radiation pattern?
Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
Which of the following switches is used with ARP to display the cache entry for a specific IP address?
A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
Which of the following requires congestion to occur before enabling traffic prioritization?
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?
An administrator can use packet tags to configure which of the following?
A content filter is MOST likely installed on which of the following servers?
A technician is troubleshooting a network connectivity issue on a laptop. The technician wants to verify the NIC is functioning on the laptop. Which of the following commands should the technician use?
A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?
Which of the following tools allows an administrator to identify a cable?
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?
Which of the following would a technician do to monitor remote traffic through an access point?
Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?
When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?
A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use?
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
Which of the following BEST describes a load balancer?
A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?
An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?
A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?
A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?
At which of the following locations does the responsibility of a Telco provider cease?
Which of the following network topologies is MOST likely used in remote access VPN?
Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards.
Which of the following is the correct tool?
A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).
The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?
A technician is sorting patch cables into four bins labeled coaxial, crossover, straight-through, and fiber. The technician has a cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of the cable start with a green wire. Into which of the following bins should this cable be placed?
A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?
Which of the following network topologies describes a network where each node is connected to multiple devices?
Which of the following WAN technologies has the highest latency?
Which of the following is a common LAN protocol used for a SOHO?
Which of the following is a requirement for bridging with 802.11a?
A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:
1-----------1
2-----------2
3-----------3
4-----------4
5-----------5
6-----------6
7-----------7
8-----------8
Which of the following should the technician do NEXT?
Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?
Which of the following network media connectors can use a MAXIMUM of two copper wire pairs?
A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following problems to occur?
Which of the following WAN technologies uses an analog phone line to transmit data?
Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?
Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?
A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?
Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?
Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?
Which of the following connectors is used for coaxial copper cable?
Which of the following is used to allow multiple sources on a single optical cable?
Which of the following describes a manually entered route?
Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?
Which of the following uses port 23 by default?
Which of the following is the definition of a DNS server?
Which of the following is the unit used to transfer information at Layer 2 of the OSI model?
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).
A user arrives at a new house and the Internet provider states the connection will run through the cable. If the user wants to install multiple PCs, which of the following will the user need in order to establish a connection? (Select TWO).
A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing?
Which of the following would be considered a Class C private address?
At which of the following layers do frames exist? (Select TWO).
Which of the following protocols works at the LOWEST layer of the OSI model?
A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer’s IP addresses:
192.168.2.70
192.168.2.100
192.168.2.125
192.168.2.130
When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?
Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?
Which of the following DHCP properties defines the size of the pool of available IP addresses?
An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using?
Which of the following correctly lists the layers of the OSI model starting at Layer 1?
Which of the following protocols exchange the latest information that has changed in the routing table?
Which of the following uses a 128-bit addressing scheme?
Which of the following OSI layers allows users to access network services such as file sharing?
Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:
IP address: 192.168.0.124
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.254
Which is MOST likely preventing the user from accessing the Internet?
Which of the following protocols are used to provide accurate time to network devices?
Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?
Which of the following BEST describes the definition of DHCP?