Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA N10-007 CompTIA Network+ N10-007 Exam Practice Test

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008
Page: 1 / 69
Total 688 questions

CompTIA Network+ N10-007 Questions and Answers

Question 1

A customer has submitted a request for a new wireless connection In the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration?

Options:

A.

The LAN and WLAN should be configured In the same zone with dynamic DENY ALL rules.

B.

The LAN and WLAN should be configured in the DMZ so traffic is denied automatically.

C.

The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours.

D.

The LAN and WLAN should be configured In separate zones with a firewall in between.

Question 2

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

Options:

A.

Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.

B.

Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.

C.

Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

D.

Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

Question 3

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

Options:

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Question 4

Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

Options:

A.

Disable unused ports.

B.

Reset the two-factor token.

C.

Disable virtual ports.

D.

Upgrade the firmware.

Question 5

Which of the following should be configured to allow for IP-to-name resolutions?

Options:

A.

CNAME

B.

A

C.

PTR

D.

NS

Question 6

A network administrator is installing a campus network of two routers, 24 switches, 76 APs, and 492 VoIP phone sets. Which of the following additional devices should the administrator install to help manage this network?

Options:

A.

VoIP PBX

B.

Content filter

C.

RADIUS server

D.

Wireless controller

Question 7

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

Options:

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Question 8

A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would BEST resolve the issue?

Options:

A.

Verify the default passwords have been changed.

B.

Upgrade to the latest firmware

C.

Generate new SSH keys.

D.

Review and modify the firewall rules.

Question 9

A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?

Options:

A.

Logic bomb

B.

Social engineering

C.

Trojan horse

D.

Insider threat

Question 10

A company hires another firm to test the integrity of its information security controls. This is an example of

Options:

A.

role separation.

B.

device hardening

C.

risk assessment

D.

penetration testing.

Question 11

A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?

Options:

A.

Spectrum analyzer

B.

OTDR

C.

Packet sniffer

D.

Multimeter

Question 12

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

Options:

A.

Snapshots

B.

Incremental

C.

Replica

D.

Differential

Question 13

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the www.comptia.com website:

Question # 13

Which of the following is the reason the system cannot connect?

Options:

A.

The DNS server is under maintenance.

B.

A cable is not connected to the NIC.

C.

The domain complia.com is having network issues.

D.

The interface eth0 Is using an APIPA address.

Question 14

A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

Options:

A.

Transport

B.

Network

C.

Session

D.

Application

Question 15

A company has just installed a new cloud VoIP solution, however, users occasionally report poor call quality or dead air being present. Which of the following describes the NEXT troubleshooting step the technician should take?

Options:

A.

The technician should check the internal diagnostics on all the phones to look for a common thread.

B.

The technician should reset all the phones and deprovision information from the provider

C.

The technician should use a packet tracer to see if the traffic is getting out of the network

D.

The technician should run ping tests on the Internet line to monitor for packet loss and latency

Question 16

After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups?

Options:

A.

ipconfig /flushdns

B.

ipconfig /release

C.

ipconfig /renew

D.

ipconfig /all

Question 17

A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

Options:

A.

HTTP

B.

Telnet

C.

SSH

D.

TFTP

Question 18

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

Options:

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Question 19

Which of the following Is a network device that is responsible for separating collision domains?

Options:

A.

Switch

B.

Router

C.

Hub

D.

Modem

Question 20

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

Options:

A.

System life-cycle procedures

B.

Off-boarding procedures

C.

Safety procedures

D.

Appropriate use policy

Question 21

A network engineer is working on a network connectivity problem between a site in California and a site in New York The connection went down overnight and the engineer is unsure where the connection failed The technician is logged into the primary switch in the customer's network, which is also the company's connection to the WAN. Which of the following toots should the technician use to determine the last available network hop?

Options:

A.

netstat

B.

Nmap

C.

traceroute

D.

pathping

Question 22

Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?

Options:

A.

Transceiver mismatch

B.

Crosstalk

C.

Jitter

D.

Open/short on the cable

Question 23

A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?

Options:

A.

Evil twin

B.

ARP poisoning

C.

DHCP exhaustion

D.

Social engineering

Question 24

A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?

Options:

A.

Change management

B.

Network diagrams

C.

Inventory report

D.

Labeling report

Question 25

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

Options:

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Question 26

A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Question 27

A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat .Which of the following policies did the technician violate'?

Options:

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use

Question 28

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

Options:

A.

Partial mesh

B.

Ad hoc

C.

Ring

D.

Bus

Question 29

A network technician is troubleshooting a problem with a user’s client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue?

Options:

A.

Reconfigure the user’s VPN connection in the router to fix profile corruption.

B.

Inform the user that provisioning sometimes fails and the connection needs to be attempted again.

C.

Review the logs in the VPN client to check for any informational messages.

D.

Verify the system has the latest OS patches installed.

Question 30

A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?

Options:

A.

Exhausted DHCP scope

B.

Untrusted SSL certificates

C.

Duplicate MAC addresses

D.

Incorrect firewall settings

Question 31

A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?

Options:

A.

Change the default credentials.

B.

Verify the firmware file hash.

C.

Disable unused switch ports.

D.

Apply patches and updates.

Question 32

A network technician is reading a network diagram and looking for the edge router. Which of the following is MOST likely the symbol used for the router?

Options:

A.

A circle with four outward arrows

B.

A rectangle with two horizontal arrows

C.

A square with two circular arrows

D.

A triangle with three outward arrows

Question 33

A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems.

Which of the following standards BEST fits these requirements?

Options:

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

Question 34

A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owner’s limited Internet bandwidth?

Options:

A.

Disable the SSID broadcast.

B.

Implement WEP authentication.

C.

Change the WiFi password.

D.

Activate MAC address filtering.

Question 35

A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest?

Options:

A.

SMF

B.

Cat 3

C.

Cat 5

D.

Cat 6

E.

RG-6

Question 36

A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

Options:

A.

Allow RDP connections through the firewall.

B.

Install VNC clients on the sales representatives' machines.

C.

Create an SSL VPN for remote access to the network

D.

Place all servers in the publicly available DMZ

Question 37

Which of the following may state: "Employees may hot browse social media websites from company-owned computers?

Options:

A.

AUP

B.

BYOD

C.

NDA

D.

SLA

Question 38

Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?

Options:

A.

EIGRP

B.

BGP

C.

IPv6

D.

MPLS

Question 39

A user has received a new machine with The organization's standard baseline with no changes and the DHCP reservation is updated. The user now reports being unable to connect to the partner company's database. The network technician reviews the logs and sees this user was previously able to access the remote database without issue. Which of the following should the network technician check NEXT?

Options:

A.

Web proxy

B.

Host-based firewall

C.

B2B router ACL

D.

A and PTR records

Question 40

Which of the following allows for connectionless communications?

Options:

A.

TGP

B.

MAG

C.

UDP

D.

IF

Question 41

An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domains that exist?

Options:

A.

3

B.

12

C.

13

D.

14

E.

15

Question 42

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

Options:

A.

A VPN concentrator

B.

A load balancer

C.

A wireless controller

D.

A RADIUS server

Question 43

Which of the following represents where the ISP's WAN connection is handed off to the local network?

Options:

A.

Demilitarized zone

B.

intermediate distribution frame

C.

Extranet

D.

Demarcation point

Question 44

A wireless administrator needs to implement an authentication method that provides individualized, scalable security for the users of a WLAN where roaming is a regular event. PKI is not available. Which of the following BEST addresses the requirements of this topology?

Options:

A.

TLS

B.

MAC filtering

C.

TKIP-RC4

D.

EAP-FAST

Question 45

A technician is planning a network wiring installation and must ensure all cabling meets the installation requirements for air-handling spaces in the celling in case of a fire. Which of the following characteristics does

plenum cabling have to meet this requirement?

Options:

A.

Outer jacket made of PVC

B.

Outer jacket with metal shielding

C.

Low-smoke material jacket

D.

Fiber-optic glass core

Question 46

A network administrator is troubleshooting a connectivity issue to a remote switch. The administrator suspects the settings on the switch have been changed, causing the issue. Which of the following should the administrator reference to confirm the change?

Options:

A.

Configuration baseline

B.

Network SOP

C.

Rack diagrams

D.

Inventory management

Question 47

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

Options:

A.

VLAN mismatch

B.

Transceiver mismatch

C.

Latency

D.

DHCP exhaustion

Question 48

A small company decided to use a single virtual appliance to filter spam as well as a reverse proxy to filter traffic to its internal web server. Which of the following did the company MOST likely deploy?

Options:

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filler

Question 49

A network technician is investigating a device that has been reported as responding slowly. Which of the following should the technician check FIRST?

Options:

A.

Power status

B.

Traffic analysis

C.

Logical diagram

D.

Utilization

Question 50

A technician needs a way to allow clients to access a new application server on the network. Which of the following should the technician set up to achieve this objective? (Select TWO)

Options:

A.

DHCP MAC reservation

B.

DNS SRV record

C.

DNS reverse zone

D.

DHCP scope option

E.

DHCP IP reservation

F.

Cloud-hosted DNS

Question 51

Which of the following technologies requires a username and password to authenticate to a backbone network?

Options:

A.

PPPoE

B.

MPLS

C.

ATM

D.

SIP

Question 52

A network technician needs to install network devices in a new building. The building will be a pan of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building?

Options:

A.

Firewall

B.

Switch

C.

Modem

D.

IDS

Question 53

Which of the following accurately describes a warm site in datacenter disaster recovery?

Options:

A.

An online standby datacenter that is fully equipped without company data

B.

A backup datacenter location that is ready for equipment to be installed

C.

A backup datacenter location that is fully equipped bot not online

D.

An online, standby datacenter that is fully equipped with all company data

Question 54

The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy’s requirements?

Options:

A.

Recover all systems to a loss of 48 hours of data.

B.

Limit the network downtime to a maximum of 48 hours per year.

C.

Recover all systems within 48 hours.

D.

Require 48 hours of system backup maintenance.

Question 55

A network manager is drafting a document mat outlines what employees can and cannot do when using personal tablets that are connected to the network. Which of the following is the manager drafting?

Options:

A.

An AUP policy

B.

A BYOD policy

C.

A DLP policy

D.

An NDA policy

Question 56

A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction?

Options:

A.

Geofencing

B.

WPA2-PSK

C.

EAP-TLS

D.

VLAN tagging

Question 57

A switch needs to be configured to carry three VLANs across on a single port. Which of the following switching features should be used and which of the following terms is given to the VLANs?

Options:

A.

A trunk port and untagged VLANs

B.

A trunk port and tagged VLANs

C.

An access port and tagged VLANs

D.

A trunk port and access VLANs

Question 58

A network technician receives a call from Joe, a user about slow speeds when he copies large files from the file server Other users can copy the same files in a matter of seconds. Prior to experiencing the slow speeds, Joe moved the computer farther from the network jack and built his own Cat5 cable During troubleshooting the on-site network technician observes Joe is only getting a 10Mbps connection speed while everyone else who is connected to the switch is getting 1000Mbps. Which of the following should the network technician check NEXT? (Select TWO)

Options:

A.

Total length

B.

RJ45 terminations

C.

Desktop hardware

D.

Switch configuration

E.

Cable type

F.

Latency

Question 59

A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?

Options:

A.

The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS

B.

The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the

administrator.

C.

The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch

D.

The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to management.

Question 60

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

Options:

A.

10BASE-T

B.

100BASE-T

C.

1000BASE-LX

D.

1000BASE-SX

Question 61

A company moved to a new building that was designed with WiFi only. During the first month, users reported good WiFi coverage. However, after the first month, users began reporting slow speeds and constant disconnects. Upon investigation, an engineer determines the SNR is currently 10dB compared to a baseline SNR of 42dB. Which of the following MOST likely causing the WAFI issues?

Options:

A.

Latency

B.

Jitter

C.

Channel overlap

D.

Interference

Question 62

A document outlining the types of actions allowed on the corporate network would be BEST defined as an:

Options:

A.

AUP.

B.

NDA.

C.

MOU.

D.

MOA.

Question 63

Which of the following DNS record types assists with the routing of email?

Options:

A.

MX

B.

PTR

C.

SRV

D.

AAAA

Question 64

A systems administrator has received a new appliance to monitor the health and status of internal servers that are not located in the organization's DMZ, The monitored servers are secured and restricted for specific use cases. The systems administrator activates email alerts for when a status exceeds a certain threshold. However, during testing, emails are not reaching the recipients as expected. The systems administrator has confirmed the messages are queued in the appliance. Which of the following would be the MOST likely cause of the issue?

Options:

A.

A SNMP is not allowed on the network.

B.

SMTP is blocked outbound at the firewall.

C.

MX records are not configured properly.

D.

The mail daemon is not running on the appliance

Question 65

A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation:

* Researched and decided that 802.11ac would be the best technology

* Ensured the switch supports PoE+

* Purchased an AP for each floor and spare APs in case of failure

* Put each AP into non-overlapping channels

Which of the following is the MOST likely reason users are experiencing poor performance?

Options:

A.

802.11ac is not the proper wireless technology for a multistory building.

B.

A comprehensive site survey of each floor was not conducted.

C.

Users were not consulted to find out what type of wireless cards they had.

D.

APs in non-overlapping channels are not able to provide proper redundancy.

Question 66

A company's users have been reporting excessive latency when connecting to the Internet. The network administration team submitted a change request to upgrade all the obsolete network equipment from 100Mbps to 1Gbps and It was approved. Which of the following documentation types will be needed to measure the success or failure of the upgrade project?

Options:

A.

Network performance baseline

B.

Network configuration documents

C.

Equipment Implementation Instructions

D.

Inventory management documentation

Question 67

Some similar devices are experiencing system crashes on the same day of every month. Which of the following is the MOST efficient approach to detect the probable cause of the recurring incidents?

Options:

A.

Escalate the issue to the manufacturer of the devices.

B.

Assign multiple analysts to investigate and monitor the devices simultaneously on the incident day.

C.

Get information about the approved changes scoping the devices.

D.

Question the users about similar actions performed on the devices.

Question 68

A network administrator is attempting to limit the installation of malware on company workstations. The administrator wants to remove root access from the user accounts. Which of the following is this an example of?

Options:

A.

Changing default credentials

B.

Limiting spoofing

C.

Role separation

D.

Port security

Question 69

A network technician is installing a new SOHO wireless router for a client. After configuring and securing the wireless network, the technician begins hardening the wireless router. Which of the following should the network technician do FIRST?

Options:

A.

Enable content filtering.

B.

Back up the configurations of the device.

C.

Configure an ACL for managing the device.

D.

Filter MAC addresses.

Question 70

A systems administrator is running a VoIP network and is experiencing jitter and high latency. Which of the following would BEST help the administrator determine the cause of these issues?

Options:

A.

Enabling RADIUS on the network.

B.

Configuring SNMP traps on the network.

C.

Implementing LDAP on the network.

D.

Establishing NTP on the network.

Question 71

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Question 72

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

Options:

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Question 73

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

Options:

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Question 74

A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

Options:

A.

File hash

B.

Encryption

C.

FCS

D.

Compression

Question 75

A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:

Options:

A.

use a configuration management server

B.

configure a multilayer switch

C.

install a wireless controller

D.

use a proxy server

Question 76

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.)

Options:

A.

Label the switch with IP address and firmware version

B.

Draw the switchport diagram

C.

Create a change management document

D.

Draw the network rack logical diagram

E.

Confirm standard operating procedures documentation

F.

Create a performance baseline of the switch

Question 77

A network technician needs to upgrade a production Windows server to the latest service pack. In which of the following should the work plan and recovery procedure be documented?

Options:

A.

IDF/MDF

B.

Change management

C.

SOPs

D.

Inventory management

Question 78

A consulting company was hired to project and deploy a new datacenter in a different city. This new facility must have the same components installed as the current datacenter to be ready to take over all the network services as soon as the primary site becomes unavailable. Which of the following describes what will be deployed in the new location?

Options:

A.

Cold site

B.

Hot site

C.

Warm site

D.

Off-site backup

E.

Infrastructure as a service

Question 79

A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?

Options:

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Question 80

A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?

Options:

A.

Gateway: 10.10.10.1

Netmask: 255.255.255.192

B.

Gateway: 172.15.18.128

Netmask: 255.255.255.224

C.

Gateway: 192.168.1.97

Netmask: 255.255.255.224

D.

Gateway: 224.102.113.65

Netmask: 255.255.255.192

Question 81

Which of the following would block access to an untagged port when connected to a Layer 2 device?

Options:

A.

BPDU guard

B.

Spanning tree

C.

Flood guard

D.

Root guard

Question 82

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.

Range Given: 172.30.232.0/24

  • Sales 57 devices
  • HR 23 devices
  • IT 12 devices
  • Finance 32 devices
  • Marketing 9 devices

INSTRUCTIONS

Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.

All drop downs must be filled.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 82

Question # 82

Options:

Question 83

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

Options:

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Question 84

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

Options:

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Question 85

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

Options:

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Question 86

A new DSL circuit was installed to replace the cable service and is not functioning. A network administrator needs to create a cable to connect the circuit. Which of the following connector types should the network administrator use on the cable?

Options:

A.

RJ11

B.

RJ45

C.

DB-25

D.

BNC

Question 87

Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?

Options:

A.

Check the latency by running a continuous ping to the site.

B.

Perform the ipconfig/flushdns command on the affected users’ PCs.

C.

Run a speedtest from a user’s PC to a site on the Internet.

D.

Verify if there is MTU mismatch in the path to the site.

Question 88

Which of the following routing conventions is known as a link-state protocol?

Options:

A.

RIP

B.

BGP

C.

EIGRP

D.

OSPF

Question 89

A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

Options:

A.

Additional PIN

B.

Security questions

C.

RSA token

D.

Access control lists

Question 90

Which of the following statements about the OSI model is true?

Options:

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Question 91

A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented?

Options:

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Question 92

A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company’s firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?

Options:

A.

Bridge

B.

Router

C.

Multilayer switch

D.

Media converter

Question 93

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

Options:

A.

164.10.12.0/24

B.

164.10.12.64/29

C.

164.10.12.128/26

D.

164.10.12.191/28

Question 94

Which of the following is used to purposely attack a system to exploit vulnerabilities?

Options:

A.

Honeypot

B.

Vulnerability scan

C.

Device hardening

D.

Penetration testing

Question 95

A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection?

Options:

A.

An RG-59 cable with BNC connectors

B.

A multi-mode fiber cable

C.

A straight-through Cat5 UTP cable

D.

A cable with TIA/EIA 568a and 568b on each end

Question 96

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

Options:

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Question 97

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

Options:

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Question 98

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Question 99

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

Options:

A.

1

B.

2

C.

3

D.

4

E.

5

Question 100

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

Options:

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Question 101

A switch vendor recently released a patch to fix a critical vulnerability found in its switch OS. Which of the following should a network administrator do NEXT according to best practices?

Options:

A.

Test the patch in a test environment.

B.

Put the patch into production immediately.

C.

Put the patch into production with a rollback plan.

D.

Choose a single production switch and pilot the patch.

E.

Put the patch into production at the next maintenance window.

Question 102

A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?

Options:

A.

SSH

B.

VNC

C.

RDP

D.

HTTPS

Question 103

Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?

Options:

A.

Switching loop

B.

ARP cache poisoning

C.

Improperly tagged ports

D.

Wrong VLAN assignment

E.

Duplicate IP addresses

Page: 1 / 69
Total 688 questions