Network +: N10-006 Flashcards

1
Q

A technician has verified that a recent loss of network connectivity to multiple workstations is due
to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its
physical location within the wall?
A. Cable certifier
B. Multimeter
C. Cable tester
D. Toner probe

A

D. Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is used to authenticate remote workers who connect from offsite? (Select
TWO).
A. OSPF
B. VTP trunking
C. Virtual PBX
D. RADIUS
E. 802.1x
A

D. RADIUS

E. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following network infrastructure implementations would be used to support files being
transferred between Bluetooth-enabled smartphones?
A. PAN
B. LAN
C. WLAN
D. MAN

A

A. PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following would be used in an IP-based video conferencing deployment? (Select
TWO).
A. RS-232
B. 56k modem
C. Bluetooth
D. Codec
E. SIP
A

D. Codec

E. SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following helps prevent routing loops?
A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon
A

D. Split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem
A

C. Analog modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of data
transfers over iSCSI switches?
A. The administrator should configure the switch ports to auto-negotiate the proper Ethernet
settings.
B. The administrator should configure each vSAN participant to have its own VLAN.
C. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

A

D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A network topology that utilizes a central device with point-to-point connections to all other devices
is which of the following?
A. Star
B. Ring
C. Mesh
D. Bus
A

A. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is connecting a NAS device to an Ethernet network. Which of the following
technologies will be used to encapsulate the frames?
A. HTTPS
B. Fibre channel
C. iSCSI
D. MS-CHAP

A

C. iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting
caused by the disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub

A

A. Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at
one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP

A

D. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A training class is being held in an auditorium. Hard-wired connections are required for all laptops
that will be used. The network technician must add a switch to the room through which the laptops
will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?
A. DHCP
B. Split horizon
C. CIDR
D. TRUNK

A

D. TRUNK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at different
wavelengths?
A. DWDM
B. SONET
C. ADSL
D. LACP

A

A. DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following WAN technologies is associated with high latency?
A. T1
B. Satellite
C. Cable
D. OCx
A

B. Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following provides accounting, authorization, and authentication via a centralized
privileged database, as well as, challenge/response and password encryption?
A. Multifactor authentication
B. ISAKMP
C. TACACS+
D. Network access control

A

C. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is used to define how much bandwidth can be used by various protocols on
the network?
A. Traffic shaping
B. High availability
C. Load balancing
D. Fault tolerance
A

A. Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following network topologies has a central, single point of failure?
A. Ring
B. Star
C. Hybrid
D. Mesh
A

B. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A technician is helping a SOHO determine where to install the server. Which of the following
should be considered FIRST?
A. Compatibility requirements
B. Environment limitations
C. Cable length
D. Equipment limitations
A

B. Environment limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When convergence on a routed network occurs, which of the following is true?
A. All routers are using hop count as the metric
B. All routers have the same routing table
C. All routers learn the route to all connected networks
D. All routers use route summarization

A

C. All routers learn the route to all connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician has been given a list of requirements for a LAN in an older building using CAT6
cabling. Which of the following environmental conditions should be considered when deciding
whether or not to use plenum-rated cables?
A. Workstation models
B. Window placement
C. Floor composition
D. Ceiling airflow condition

A

D. Ceiling airflow condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A company has a new offering to provide access to their product from a central location rather
than clients internally hosting the product on the client network. The product contains sensitive
corporate information that should not be accessible from one client to another. This is an example
of which of the following?
A. Public SaaS
B. Private SaaS
C. Hybrid IaaS
D. Community IaaS

A

B. Private SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following refers to a network that spans several buildings that are within walking
distance of each other?
A. CAN
B. WAN
C. PAN
D. MAN
A

A. CAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9
connector. Which of the following protocols was MOST likely used on this cable?
A. RS-232
B. 802.3
C. ATM
D. Token ring

A

A. RS-232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following describes an IPv6 address of ::1?
A. Broadcast
B. Loopback
C. Classless
D. Multicast
A

B. Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
A. iSCSI SAN
B. FCoE SAN
C. NAS
D. USB flash drive

A

C. NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive
the same address. Which of the following should be configured?
A. Leases
B. Helper addresses
C. Scopes
D. Reservations

A

D. Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following network elements enables unified communication devices to connect to and
traverse traffic onto the PSTN?
A. Access switch
B. UC gateway
C. UC server
D. Edge router
A

B. UC gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A network technician receives the following alert from a network device:
“High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54”
Which of the following is being monitored to trigger the alarm?
A. Speed and duplex mismatch
B. Wireless channel utilization
C. Network device CPU
D. Network device memory
E. Interface link status

A

E. Interface link status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following
should the technician enable?
A. PoE
B. Port bonding
C. VLAN
D. Trunking
A

A. PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Which of the following protocols must be implemented in order for two switches to share VLAN
information?
A. VTP
B. MPLS
C. STP
D. PPTP
A

A. VTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP

A

C. SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A network technician is diligent about maintaining all system servers’ at the most current service
pack level available. After performing upgrades, users experience issues with server-based
applications. Which of the following should be used to prevent issues in the future?
A. Configure an automated patching server
B. Virtualize the servers and take daily snapshots
C. Configure a honeypot for application testing
D. Configure a test lab for updates

A

D. Configure a test lab for updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit
has caused the company’s encryption to become unsecure. Which of the following would be
required to resolve the exploit?
A. Utilize a FTP service
B. Install recommended updates
C. Send all log files through SMTP
D. Configure the firewall to block port 22

A

B. Install recommended updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain?
A. Vendor documentation
B. Recent backups
C. Physical IP address
D. Physical network diagram

A

B. Recent backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A network technician has been tasked with designing a WLAN for a small office. One of the
requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?
A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a

A

B. 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A company is experiencing accessibility issues reaching services on a cloud-based system. Which
of the following monitoring tools should be used to locate possible outages?
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer

A

A. Network analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to
perform an assessment on the existing wireless network. The technician has recommended an
802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?
A. MU-MIMO
B. LWAPP
C. PoE
D. MIMO

A

D. MIMO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

It has been determined by network operations that there is a severe bottleneck on the company’s
mesh topology network. The field technician has chosen to use log management and found that
one router is making routing decisions slower than others on the network. This is an example of
which of the following?
A. Network device power issues
B. Network device CPU issues
C. Storage area network issues
D. Delayed responses from RADIUS

A

B. Network device CPU issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab
equipment connected to her PC. The technician contacts the vendor and determines there is an
incompatibility with the latest IO drivers. Which of the following should the technician perform so
that Ann can get back to work as quickly as possible?
A. Reformat and install the compatible drivers.
B. Reset Ann’s equipment configuration from a backup.
C. Downgrade the PC to a working patch level.
D. Restore Ann’s PC to the last known good configuration.
E. Roll back the drivers to the previous version.

A

E. Roll back the drivers to the previous version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A system administrator has been tasked to ensure that the software team is not affecting the
production software when developing enhancements. The software that is being updated is on a
very short SDLC and enhancements must be developed rapidly. These enhancements must be
approved before being deployed. Which of the following will mitigate production outages before
the enhancements are deployed?
A. Implement an environment to test the enhancements.
B. Implement ACLs that only allow management access to the enhancements.
C. Deploy an IPS on the production network.
D. Move the software team’s workstations to the DMZ.

A

A. Implement an environment to test the enhancements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop
to the new user, the administrator documents the new location, the user of the device and when
the device was reassigned. Which of the following BEST describes these actions?
A. Network map
B. Asset management
C. Change management
D. Baselines

A

B. Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Company policies require that all network infrastructure devices send system level information to a
centralized server. Which of the following should be implemented to ensure the network
administrator can review device error information from one central location?
A. TACACS+ server
B. Single sign-on
C. SYSLOG server
D. Wi-Fi analyzer

A

C. SYSLOG server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A network technician has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be
configured on each network device to provide that information in a secure manner?
A. S/MIME
B. SYSLOG
C. PGP
D. SNMPv3

A

D. SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
A. The VoIP phone would request a new phone number from the unified communications server.
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing
calls.
D. The VoIP phone would request a different configuration from the unified communications
server.

A

B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A company is deploying a new wireless network and requires 800Mbps network throughput. Which
of the following is the MINIMUM configuration that would meet this need?
A. 802.11ac with 2 spatial streams and an 80MHz bandwidth
B. 802.11ac with 3 spatial streams and a 20MHz bandwidth
C. 802.11ac with 3 spatial streams and a 40MHz bandwidth
D. 802.11ac with 4 spatial streams and a 160MHz bandwidth

A

A. 802.11ac with 2 spatial streams and an 80MHz bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
A. Regression test
B. Speed test
C. Baseline
D. Statement of work

A

C. Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

When two or more links need to pass traffic as if they were one physical link, which of the following
would be used to satisfy the requirement?
A. Port mirroring
B. 802.1w
C. LACP
D. VTP

A

C. LACP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
A VLAN with a gateway offers no security without the addition of:
A. An ACL.
B. 802.1w.
C. A RADIUS server.
D. 802.1d.
A

A. An ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Network segmentation provides which of the following benefits?
A. Security through isolation
B. Link aggregation
C. Packet flooding through all ports
D. High availability through redundancy
A

A. Security through isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A network technician must create a wireless link between two buildings in an office park utilizing
the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal
weight as it will be mounted on the outside of the building. Which of the following antenna types is
BEST suited for this solution?
A. Yagi
B. Omni-directional
C. Parabolic
D. Patch

A

A. Yagi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The administrator’s network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which
of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
A. Set the loopback address
B. Change the IP address
C. Change the slash notation
D. Change duplex to full

A

D. Change duplex to full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
A. Ensure patches are deployed
B. Install an IDS on the network
C. Configure the firewall to block traffic on port 443
D. Implement a VPN for employees

A

A. Ensure patches are deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A system administrator wants to update a web-based application to the latest version. Which of
the following procedures should the system administrator perform FIRST?
A. Remove all user accounts on the server
B. Isolate the server logically on the network
C. Block all HTTP traffic to the server
D. Install the software in a test environment

A

D. Install the software in a test environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The administrator checks and confirms that the switch can be accessed using the
console, but currently only one student can log in at a time. Which of the following should be done
to correct this issue?
A. Increase installed memory and install a larger flash module.
B. Increase the number of VLANs configured on the switch.
C. Decrease the number of VLANs configured on the switch.
D. Increase the number of virtual terminals available.

A

D. Increase the number of virtual terminals available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A technician needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if
the threat is network based?
A. A cloud-based antivirus system with a heuristic and signature based engine
B. A network based firewall which blocks all inbound communication
C. A host-based firewall which allows all outbound communication
D. A HIDS to inspect both inbound and outbound network communication

A

C. A host-based firewall which allows all outbound communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
A. CCTVs
B. Proximity readers
C. Motion sensors
D. IP cameras
A

B. Proximity readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP

A

D. Rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A technician is setting up a computer lab. Computers on the same subnet need to communicate
with each other using peer to peer communication. Which of the following would the technician
MOST likely configure?
A. Hardware firewall
B. Proxy server
C. Software firewall
D. GRE tunneling

A

C. Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
Which of the following concepts are MOST important for a company's long term health in the event
of a disaster? (Select TWO).
A. Redundancy
B. Implementing acceptable use policy
C. Offsite backups
D. Uninterruptable power supplies
E. Vulnerability scanning
A

A. Redundancy

C. Offsite backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?
A. DWDM
B. MIMO
C. TEMPEST
D. DOCSIS

A

C. TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following types of network would be set up in an office so that customers could
access the Internet but not be given access to internal resources such as printers and servers?
A. Quarantine network
B. Core network
C. Guest network
D. Wireless network

A

C. Guest network

62
Q

A technician needs to limit the amount of broadcast traffic on a network and allow different
segments to communicate with each other. Which of the following options would satisfy these
requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.

A

B. Add a layer 3 switch and create a VLAN.

63
Q

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing

A

B. VLAN hopping

64
Q

A company has decided to update their usage policy to allow employees to surf the web
unrestricted from their work computers. Which of the following actions should the IT security team
implement to help protect the network from attack as a result of this new policy?
A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

A

A. Install host-based anti-malware software

65
Q

An organization notices a large amount of malware and virus incidents at one satellite office, but
hardly any at another. All users at both sites are running the same company image and receive
the same group policies. Which of the following has MOST likely been implemented at the site with
the fewest security issues?
A. Consent to monitoring
B. Business continuity measures
C. Vulnerability scanning
D. End-user awareness training

A

D. End-user awareness training

66
Q

A wireless network technician for a local retail store is installing encrypted access points within the
store for real-time inventory verification, as well as remote price checking capabilities, while
employees are away from the registers. The store is in a fully occupied strip mall that has multiple
neighbors allowing guest access to the wireless networks. There are a finite known number of
approved handheld devices needing to access the store’s wireless network. Which of the following
is the BEST security method to implement on the access points?
A. Port forwarding
B. MAC filtering
C. TLS/TTLS
D. IP ACL

A

B. MAC filtering

67
Q

Ann, a network technician, was asked to remove a virus. Issues were found several levels deep
within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics
actions should Ann perform?
A. Erase the files created by the virus
B. Stop and escalate to the proper authorities
C. Check the remaining directories for more .mp4 files
D. Copy the information to a network drive to preserve the evidence

A

B. Stop and escalate to the proper authorities

68
Q

Which of the following describes a smurf attack?
A. Attack on a target using spoofed ICMP packets to flood it
B. Intercepting traffic intended for a target and redirecting it to another
C. Spoofed VLAN tags used to bypass authentication
D. Forging tags to bypass QoS policies in order to steal bandwidth

A

A. Attack on a target using spoofed ICMP packets to flood it

69
Q
Which of the following technologies is designed to keep systems uptime running in the event of a
disaster?
A. High availability
B. Load balancing
C. Quality of service
D. Caching engines
A

A. High availability

70
Q

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without
any response from the server. Which of the following is the BEST explanation that describes this
scenario?
A. Compromised system
B. Smurf attack
C. SQL injection attack
D. Man-in-the-middle

A

A. Compromised system

71
Q

A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which
of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody

A

D. Chain of custody

72
Q

During a check of the security control measures of the company network assets, a network
administrator is explaining the difference between the security controls at the company. Which of
the following would be identified as physical security controls? (Select THREE).
A. RSA
B. Passwords
C. Man traps
D. Biometrics
E. Cipher locks
F. VLANs
G. 3DES

A

C. Man traps
D. Biometrics
E. Cipher locks

73
Q

A technician is installing a surveillance system for a home network. The technician is unsure which
ports need to be opened to allow remote access to the system. Which of the following should the
technician perform?
A. Disable the network based firewall
B. Implicit deny all traffic on network
C. Configure a VLAN on Layer 2 switch
D. Add the system to the DMZ

A

D. Add the system to the DMZ

74
Q

A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the
DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the
10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners
would meet the company’s objectives?
A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10

A

A. 11, 10, 12, 13

75
Q

A malicious user floods a switch with frames hoping to redirect traffic to the user’s server. Which of
the following attacks is the user MOST likely using?
A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack

A

B. ARP poisoning

76
Q
Which of the following is a security benefit gained from setting up a guest wireless network?
A. Optimized device bandwidth
B. Isolated corporate resources
C. Smaller ACL changes
D. Reduced password resets
A

B. Isolated corporate resources

77
Q

QUESTION NO: 77
A company has seen an increase in ransomware across the enterprise. Which of the following
should be implemented to reduce the occurrences?
A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering

A

C. Web content filtering

78
Q

Before logging into the company network, users are required to sign a document that is to be
stored in their personnel file. This standards and policies document is usually called which of the
following?
A. SOP
B. BEP
C. AUP
D. SLA

A

C. AUP

79
Q

A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a unique username and password for security.
Several vendors have discovered a virus in one of the security updates. The company tested all
files before uploading them but retested the file and found the virus. Which of the following could
the technician do for vendors to validate the proper security patch?
A. Use TFTP for tested and secure downloads
B. Require biometric authentication for patch updates
C. Provide an MD5 hash for each file
D. Implement a RADIUS authentication

A

C. Provide an MD5 hash for each file

80
Q

A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?
A. WPA2
B. IPv6
C. SNMPv3
D. RIPv2

A

C. SNMPv3

81
Q

A PC technician has installed a new network printer that was preconfigured with the correct static
IP address, subnet mask, and default gateway. The printer was installed with a new cable and
appears to have link activity, but the printer will not respond to any network communication
attempts. Which of the following is MOST likely the cause of the problem?
A. Damaged cable
B. Duplex mismatch
C. Incorrect VLAN assignment
D. Speed mismatch

A

C. Incorrect VLAN assignment

82
Q

A network technician has detected duplicate IP addresses on the network. After testing the
behavior of rogue DHCP servers, the technician believes that the issue is related to an
unauthorized home router. Which of the following should the technician do NEXT in the
troubleshooting methodology?
A. Document the findings and action taken.
B. Establish a plan to locate the rogue DHCP server.
C. Remove the rogue DHCP server from the network.
D. Identify the root cause of the problem.

A

B. Establish a plan to locate the rogue DHCP server.

83
Q

Two weeks after installation, a network technician is now unable to log onto any of the newly
installed company switches. The technician suspects that a malicious user may have changed the
switches’ settings before they were installed in secure areas. Which of the following is the MOST
likely way in which the malicious user gained access to the switches?
A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator’s password
D. Via SNMP using the default RO community

A

B. Via HTTP using the default username and password

84
Q

When a client calls and describes a problem with a computer not being able to reach the Internet,
in which of the following places of the OSI model would a technician begin troubleshooting?
A. Transport layer
B. Physical layer
C. Network layer
D. Session layer

A

B. Physical layer

85
Q

A network technician has been assigned to install an additional router on a wireless network. The
router has a different SSID and frequency. All users on the new access point and the main
network can ping each other and utilize the network printer, but all users on the new router cannot
get to the Internet. Which of the following is the MOST likely cause of this issue?
A. The gateway is misconfigured on the new router.
B. The subnet mask is incorrect on the new router.
C. The gateway is misconfigured on the edge router.
D. The SSID is incorrect on the new router.

A

A. The gateway is misconfigured on the new router.

86
Q

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small
service loop and suspects it might be the cause of the outage. Which of the following is MOST
likely the issue?
A. Maximum cable length exceeded
B. Dirty connectors
C. RF interference caused by impedance mismatch
D. Bend radius exceeded

A

D. Bend radius exceeded

87
Q

A technician is troubleshooting a wired device on the network. The technician notices that the link
light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device
connects successfully. Which of the following is causing this issue?
A. EMI
B. RFI
C. Cross-talk
D. Bad wiring

A

D. Bad wiring

88
Q

An organization requires a second technician to verify changes before applying them to network
devices. When checking the configuration of a network device, a technician determines that a
coworker has improperly configured the AS number on the device. This would result in which of
the following?
A. The OSPF not-so-stubby area is misconfigured
B. Reduced wireless network coverage
C. Spanning tree ports in flooding mode
D. BGP routing issues

A

D. BGP routing issues

89
Q

When configuring a new server, a technician requests that an MX record be created in DNS for the
new server, but the record was not entered properly. Which of the following was MOST likely
installed that required an MX record to function properly?
A. Load balancer
B. FTP server
C. Firewall DMZ
D. Mail server

A

D. Mail server

90
Q

A company has had several virus infections over the past few months. The infections were caused
by vulnerabilities in the application versions that are being used. Which of the following should an
administrator implement to prevent future outbreaks?
A. Host-based intrusion detection systems
B. Acceptable use policies
C. Incident response team
D. Patch management

A

D. Patch management

91
Q

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer.
Which of the following should be the FIRST question the helpdesk asks?
A. Does the printer have toner?
B. Are there any errors on the printer display?
C. Is the user able to access any network resources?
D. Is the printer powered up?

A

C. Is the user able to access any network resources?

92
Q

A network technician is using a network monitoring system and notices that every device on a
particular segment has lost connectivity. Which of the following should the network technician do
NEXT?
A. Establish a theory of probable cause.
B. Document actions and findings.
C. Determine next steps to solve the problem.
D. Determine if anything has changed.

A

D. Determine if anything has changed.

93
Q

A technician just completed a new external website and setup access rules in the firewall. After
some testing, only users outside the internal network can reach the site. The website responds to
a ping from the internal network and resolves the proper public address. Which of the following
could the technician do to fix this issue while causing internal users to route to the website using
an internal address?
A. Configure NAT on the firewall
B. Implement a split horizon DNS
C. Place the server in the DMZ
D. Adjust the proper internal ACL

A

B. Implement a split horizon DNS

94
Q

A network administrator recently installed a web proxy server at a customer’s site. The following
week, a system administrator replaced the DNS server overnight. The next day, customers began
having issues accessing public websites. Which of the following will resolve the issue?
A. Update the DNS server with the proxy server information.
B. Implement a split horizon DNS server.
C. Reboot the web proxy and then reboot the DNS server.
D. Put the proxy server on the other side of the demarc.

A

A. Update the DNS server with the proxy server information.

95
Q

While troubleshooting a connectivity issue, a network technician determines the IP address of a
number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which
of the following should the technician check to resolve the problem?
A. Default gateway address
B. Misconfigured DNS
C. DHCP server
D. NIC failure

A

C. DHCP server

96
Q

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central
area on the production floor. Since the relocation, the helpdesk has received complaints about
intermittent operation. During the troubleshooting process, the technician noticed that collisions
are only observed on the switch port during production. Given this information, which of the
following is the cause of the problem?
A. Distance limitation
B. Electromagnetic interference
C. Cross talk
D. Speed and duplex mismatch

A

B. Electromagnetic interference

97
Q

A technician has finished configuring AAA on a new network device. However, the technician is
unable to log into the device with LDAP credentials but is able to do so with a local user account.
Which of the following is the MOST likely reason for the problem?
A. Username is misspelled is the device configuration file
B. IDS is blocking RADIUS
C. Shared secret key is mismatched
D. Group policy has not propagated to the device

A

C. Shared secret key is mismatched

98
Q

A technician is tasked with connecting a router to a DWDM. The technician connects the router to
the multiplexer and confirms that there is a good signal level. However, the interface on the router
will not come up. Which of the following is the MOST likely cause?
A. The wrong wavelength was demuxed from the multiplexer.
B. The SFP in the multiplexer is malfunctioning.
C. There is a dirty connector on the fiber optic cable.
D. The fiber optic cable is bent in the management tray.

A

A. The wrong wavelength was demuxed from the multiplexer.

99
Q

A network technician is performing a tracert command to troubleshoot a website-related issue. The
following output is received for each hop in the tracert:
CompTIA N10-006 Exam
www.braindumps.com 37
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.
The technician would like to see the results of the tracert command. Which of the following will
allow the technician to perform tracert on external sites but not allow outsiders to discover
information from inside the network?
A. Enable split horizon to allow internal tracert commands to pass through the firewall
B. Enable IGMP messages out and block IGMP messages into the network
C. Configure the firewall to allow echo reply in and echo request out of the network
D. Install a backdoor to access the router to allow tracert messages to pass through

A

C. Configure the firewall to allow echo reply in and echo request out of the network

100
Q
Which of the following describes an area containing a rack that is used to connect customer
equipment to a service provider?
A. 110 block
B. MDF
C. DSU
D. CSU
A

B. MDF

101
Q
A network technician must utilize multimode fiber to uplink a new networking device. Which of the
following Ethernet standards could the technician utilize? (Select TWO).
A. 1000Base-LR
B. 1000Base-SR
C. 1000Base-T
D. 10GBase-LR
E. 10GBase-SR
F. 10GBase-T
A

B. 1000Base-SR

E. 10GBase-SR

102
Q

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two
separate computers are showing an error message on the screen and are unable to communicate
with other computers in the same lab. The network administrator looks at the following output:
SRC MAC SRC IP DST MAC DST IP
00:1D:1F:AB:10:7D 192.168.1.10:2000 15:BE:9F:AB:10:1D 192.168.1.14:1200
05:DD:1F:AB:10:27 192.168.1.10:1000 22:C7:2F:AB:10:A2 192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not
using any virtualization technology, at which of the following layers of the OSI model is the
problem occurring?
A. Network
B. Application
C. Data link
D. Transport

A

A. Network

103
Q

Which of the following requires the network administrator to schedule a maintenance window?
A. When a company-wide email notification must be sent.
B. A minor release upgrade of a production router.
C. When the network administrator’s laptop must be rebooted.
D. A major release upgrade of a core switch in a test lab.

A

B. A minor release upgrade of a production router.

104
Q

Which of the following is true about the main difference between a web session that uses port 80
and one that uses port 443?
A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use
transport-level encryption.
B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web
certificates.
C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse
web application proxies.
D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are
immune from man-in-the-middle attacks.

A

A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use
transport-level encryption.

105
Q

The management team wants to set up a wireless network in their office but all of their phones
operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at
a higher frequency than their phones. Which of following standards should be used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.1x

A

A. 802.11a

106
Q
Which of the following will negotiate standoff timers to allow multiple devices to communicate on
congested network segments?
A. CSMA/CD
B. OSPF
C. DOCSIS
D. BGP
A

A. CSMA/CD

107
Q

A service provider is unable to maintain connectivity to several remote sites at predetermined
speeds. The service provider could be in violation of the:
A. MLA.
B. SLA.
C. SOW.
D. MOU.

A

B. SLA.

108
Q

A network administrator has created a virtual machine in the cloud. The technician would like to
connect to the server remotely using RDP. Which of the following default ports needs to be
opened?
A. 445
B. 3389
C. 5004
D. 5060

A

B. 3389

109
Q
Which of the following is an example of an IPv4 address?
A. 192:168:1:55
B. 192.168.1.254
C. 00:AB:FA:B1:07:34
D. ::1
A

B. 192.168.1.254

110
Q
Which of the following does a network technician need to implement if a change is unsuccessful
within the approved maintenance window?
A. Configuration procedures
B. Stakeholder notification
C. Impact analysis
D. Rollback procedure
A

D. Rollback procedure

111
Q

Which of the following is the main difference between TCP and UDP?
A. TCP data flows in two directions, while UDP data flows from server to client.
B. The TCP header implements flags, while the UDP header does not.
C. The TCP header implements checksum, while the UDP header does not.
D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.

A

B. The TCP header implements flags, while the UDP header does not.

112
Q
Which of the following PDUs is used by a connectionless protocol?
A. Frames
B. Segments
C. Streams
D. Datagram
A

D. Datagram

113
Q
When troubleshooting a network problem, browsing through the log of a switch, it is discovered
that multiple frames contain errors. In which of the following layers does the problem reside?
(Select TWO).
A. Layer 2
B. Layer 3
C. Layer 5
D. Transport layer
E. Data link
F. Physical layer
A

A. Layer 2

E. Data link

114
Q

A network technician is attempting to locate a switch connected to the fourth floor west side of the
building. Which of the following will allow quick identification of the switch, when looking at a
logical diagram?
A. Building layout
B. Patch panel labeling
C. Packet sniffing
D. Naming conventions

A

D. Naming conventions

115
Q

In an engineering office, all plotters are configured via static IP. Which of the following best
practices will alleviate many issues if equipment moves are required? (Select TWO).
A. Rack monitoring
B. Device placement
C. Wall plate labeling
D. Room numbering
E. Patch panel labeling

A

C. Wall plate labeling

E. Patch panel labeling

116
Q
Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
A. Firewall
B. Router
C. 802.11 AP
D. Switch
A

C. 802.11 AP

117
Q

A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at
11 Mbps with full signal strength. Which of the following standards is implemented on the network?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g

A

C. 802.11b

118
Q

A network technician is attempting to connect a new host to existing manufacturing equipment on
an Ethernet network. The technician is having issues trying to establish communication between
the old equipment and the new host. The technician checks the cabling for breaks and finds that
the CAT3 cable in use is in perfect condition. Which of the following should the technician check to
ensure the new host will connect?
A. Confirm the new host is using 10GBaseSR due to the manufacturing environment
B. Confirm the new host is compatible with 10BaseT Ethernet
C. Confirm the existing 10Base2 equipment is using the proper frame type
D. Confirm that CSMA/CD is disabled on the Ethernet network

A

B. Confirm the new host is compatible with 10BaseT Ethernet

119
Q

A customer has engaged a company to improve the availability of all of the customer’s services
and applications, enabling the customer to minimize downtime to a few hours per quarter. Which
of the following will document the scope of the activities the company will provide to the customer,
including the intended outcomes?
A. MLA
B. MOU
C. SOW
D. SLA

A

C. SOW

120
Q

A network technician has just installed a TFTP server on the administrative segment of the
network to store router and switch configurations. After a transfer attempt to the server is made,
the process errors out. Which of the following is a cause of the error?
A. Only FTP can be used to copy configurations from switches
B. Anonymous users were not used to log into the TFTP server
C. An incorrect password was used and the account is now locked
D. Port 69 is blocked on a router between the network segments

A

D. Port 69 is blocked on a router between the network segments

121
Q

An organization is moving to a new datacenter. During the move, several technicians raise
concerns about a system that could potentially remove oxygen from the server room and result in
suffocation. Which of the following systems are they MOST likely discussing?
A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups

A

A. Fire suppression

122
Q

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local
loopback address. Which of the following is a valid IPv4 loopback address?
A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1

A

B. 127.0.0.1

123
Q
A host has been assigned the address 169.254.0.1. This is an example of which of the following
address types?
A. APIPA
B. MAC
C. Static
D. Public
A

A. APIPA

124
Q
An F-connector is used on which of the following types of cabling?
A. CAT3
B. Single mode fiber
C. CAT5
D. RG6
A

D. RG6

125
Q

After repairing a computer infected with malware, a technician determines that the web browser
fails to go to the proper address for some sites. Which of the following should be checked?
A. Server host file
B. Subnet mask
C. Local hosts file
D. Duplex settings

A

C. Local hosts file

126
Q

A company wants to make sure that users are required to authenticate prior to being allowed on
the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos

A

A. 802.1x

127
Q
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on
connected routers. In order to conserve address space, which of the following subnet masks
should Joe use for this subnet?
A. /24
B. /32
C. /28
D. /29
E. /30
A

E. /30

128
Q

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following
options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment
using dynamic IP addresses, to be able to access the Internet and internal company servers?
(Select THREE).
A. Default gateway
B. Subnet mask
C. Reservations
D. TFTP server
E. Lease expiration time of 1 day
F. DNS servers
G. Bootp

A

A. Default gateway
B. Subnet mask
F. DNS servers

129
Q
An administrator only has telnet access to a remote workstation. Which of the following utilities will
identify if the workstation uses DHCP?
A. tracert
B. ping
C. dig
D. ipconfig
E. netstat
A

D. ipconfig

130
Q
Which of the following protocols uses label-switching routers and label-edge routers to forward
traffic?
A. BGP
B. OSPF
C. IS-IS
D. MPLS
A

D. MPLS

131
Q

A network technician has received a help desk ticket indicating that after the new wireless access
point was installed, all of the media department’s devices are experiencing sporadic wireless
connectivity. All other departments are connecting just fine and the settings on the new access
point were copied from the baseline. Which of the following is a reason why the media department
is not connecting?
A. Wrong SSID
B. Rogue access point
C. Placement
D. Channel mismatch

A

C. Placement

132
Q

A user connects to a wireless network at the office and is able to access unfamiliar SMB shares
and printers. Which of the following has happened to the user?
A. The user is connected using the wrong channel.
B. The user is connected to the wrong SSID.
C. The user is experiencing an EMI issue.
D. The user is connected to the wrong RADIUS server.

A

B. The user is connected to the wrong SSID.

133
Q
Which of the following network devices use ACLs to prevent unauthorized access into company
systems?
A. IDS
B. Firewall
C. Content filter
D. Load balancer
A

B. Firewall

134
Q

Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the
wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet
the device indicates a strong signal. Which of the following is the MOST likely cause of the issue?
A. Signal-to-noise ratio
B. AP configuration
C. Incorrect SSID
D. Bounce

A

D. Bounce

135
Q

A network engineer is troubleshooting an issue with a computer that is unable to connect to the
Internet. The network engineer analyzes the following output from a command line utility:
Network DestinationNetmask Gateway Interface
192.168.1.0 255.255.255.0 192.168.1.254 eth0
192.168.1.10255.255.255.255 192.168.1.10 eth0
127.0.0.1255.0.0.0 On-Link lo
127.0.0.0255.0.0.0 On-Link lo
255.255.255.255255.255.255.255 102.168.1.10 eth0
Which of the following is the reason for the computer issue, given the above output?
A. Wrong default gateway netmask
B. Incorrect default gateway address
C. Default gateway on the wrong interface
D. Missing default gateway

A

D. Missing default gateway

136
Q

A network engineer is dispatched to an employee office to troubleshoot an issue with the
employee’s laptop. The employee is unable to connect to local and remote resources. The
network engineer flips the laptop’s wireless switch on to resolve the issue. At which of the
following layers of the OSI model was the issue resolved?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 7

A

A. Layer 1

137
Q

A network technician has received comments from several users that cannot reach a particular
website. Which of the following commands would provide the BEST information about the path
taken across the network to this website?
A. ping
B. netstat
C. telnet
D. tracert

A

D. tracert

138
Q

A network technician has detected a personal computer that has been physically connected to the
corporate network. Which of the following commands would the network technician use to locate
this unauthorized computer and determine the interface it is connected to?
A. nbtstat –a
B. show mac address-table
C. show interface status
D. show ip access-list
E. nslookup hostname

A

B. show mac address-table

139
Q

A network technician is troubleshooting a problem at a remote site. It has been determined that
the connection from router A to router B is down. The technician at the remote site re-terminates
the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action?
A. The normal amount of errors and the connection problem has been resolved.
B. The interface status will indicate that the port is administratively down.
C. The traffic will flow, but with excessive errors.
D. The interface status will show line protocol down.

A

D. The interface status will show line protocol down.

140
Q

After connecting a workstation directly to a small business firewall, a network administrator is
trying to manage it via HTTPS without losing its stored configuration. The only two pieces of
information that the network administrator knows about the firewall are the management interface
MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator’s password. Which of the
following will allow the administrator to log onto the firewall via HTTPS if the management’s IP
address is unknown and the administrator’s workstation IP address is 192.168.0.10/23?
A. Use the reset button on the back of the firewall to restore it to its factory default, and then log
onto
B. Run the following command on the administrator’s workstation: arp –s 192.168.1.200
01:4a:d1:fa:b1:0e
C. Use an SNMP tool to query the firewall properties and determine the correct management IP
address
D. Use a crossover cable to connect to the console port and reconfigure the firewall management
IP to 192.168.0.1

A

B. Run the following command on the administrator’s workstation: arp –s 192.168.1.200
01:4a:d1:fa:b1:0e

141
Q
Which of the following connection types is used to terminate DS3 connections in a
telecommunications facility?
A. 66 block
B. BNC
C. F-connector
D. RJ-11
A

B. BNC

142
Q

A desktop computer is connected to the network and receives an APIPA address but is unable to
reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the
Internet. Which of the following is MOST likely the source of the problem?
A. 802.1q is not configured on the switch port
B. APIPA has been misconfigured on the VLAN
C. Bad SFP in the PC’s 10/100 NIC
D. OS updates have not been installed

A

A. 802.1q is not configured on the switch port

143
Q

A technician is setting up a new network and wants to create redundant paths through the
network. Which of the following should be implemented to prevent performance degradation?
A. Port mirroring
B. Spanning tree
C. ARP inspection
D. VLAN

A

B. Spanning tree

144
Q

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has
been experiencing when uploading work to the internal FTP server. Which of the following default
port numbers should the technician set the analyzer to highlight when creating a report? (Select
TWO).
A. 20
B. 21
C. 22
D. 23
E. 67
F. 68
G. 69

A

A. 20

B. 21

145
Q

A network engineer needs to set up a topology that will not fail if there is an outage on a single
piece of the topology. However, the computers need to wait to talk on the network to avoid
congestions. Which of the following topologies would the engineer implement?
A. Star
B. Bus
C. Ring
D. Mesh

A

C. Ring

146
Q

A technician needs to secure web traffic for a new e-commerce website. Which of the following will
secure traffic between a web browser and a website?
A. SSL
B. DNSSEC
C. WPA2
D. MTU

A

A. SSL

147
Q

A network technician is assisting the company with developing a new business continuity plan.
Which of the following would be an appropriate suggestion to add to the plan?
A. Build redundant links between core devices
B. Physically secure all network equipment
C. Maintain up-to-date configuration backups
D. Perform reoccurring vulnerability scans

A

A. Build redundant links between core devices

148
Q

A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet
connection. As a result, they have been given a new IP range. The ISP has assigned the company
10.10.150.16 /28. The company gateway router has the following interface configuration facing the
ISP:
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps
Duplex: Auto
State: No Shutdown
None of the workstations at the company are able to access the Internet. Which of the following
are the reasons? (Select TWO).
A. There is a duplex mismatch between the router and ISP.
B. The router interface is turned off.
C. The interface is set to the incorrect speed.
D. The router is configured with the incorrect subnet mask.
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.

A

E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.

149
Q

The ability to make access decisions based on an examination of Windows registry settings,
antivirus software, and AD membership status is an example of which of the following NAC
features?
A. Quarantine network
B. Persistent agents
C. Posture assessment
D. Non-persistent agents

A

C. Posture assessment

150
Q
A technician is troubleshooting a client's connection to a wireless network. The client is asked to
run a "getinfo" command to list information about the existing condition.
myClient$ wificard --getinfo
agrCtlRSSI: -72
agrExtRSSI: 0
state: running
op mode: station
lastTxRate: 178
MaxRate: 300
802.11 auth: open
link auth: wpa2-psk
BSSID: 0F:33:AE:F1:02:0A
SSID: CafeWireless
Channel: 149,1
Given this output, which of the following has the technician learned about the wireless network?
(Select TWO).
A. The WAP is using RC4 encryption
B. The WAP is using 802.11a
C. The WAP is using AES encryption
D. The WAP is using the 2.4GHz channel
E. The WAP is using the 5GHz channel
F. The WAP is using 802.11g
A

C. The WAP is using AES encryption

E. The WAP is using the 5GHz channel

151
Q
A technician has prolonged contact with a thermal compound. Which of the following resources
should be consulted?
A. HCL
B. MSDS
C. SLA
D. HVAC
A

B. MSDS