Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

N10-007 Questions and Answers

Question # 6

Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this?

A.

The customer's laptop does not support auto-MDIX.

B.

Joe's laptop does not support auto-MDIX.

C.

Straight-through patch cables are prone to crosstalk.

D.

The customer's laptop NIC does not support full duplex.

Full Access
Question # 7

A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

A.

Diagram symbols

B.

Rack diagram

C.

Logical diagram

D.

Port locations

Full Access
Question # 8

A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?

A.

Ping

B.

Log review

C.

Vulnerability scans

D.

Alerts

Full Access
Question # 9

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Full Access
Question # 10

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Full Access
Question # 11

A technician installed a new fiber optic cable to connect two sites. Although there is a link light on the port at each site, the customer reports traffic is dropping intermittently. Which of the following should the technician do NEXT to troubleshoot the issue?

A.

Check the interfaces for CRC errors.

B.

Check for a VLAN mismatch.

C.

Check for a TX/RX reverse on the connector.

D.

Check that the pinout is correct.

Full Access
Question # 12

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Full Access
Question # 13

A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?

A.

Client-to-site VPN

B.

DMVPN

C.

Site-to-site VPN

D.

MPLS VPN

Full Access
Question # 14

A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?

A.

Gateway: 10.10.10.1

Netmask: 255.255.255.192

B.

Gateway: 172.15.18.128

Netmask: 255.255.255.224

C.

Gateway: 192.168.1.97

Netmask: 255.255.255.224

D.

Gateway: 224.102.113.65

Netmask: 255.255.255.192

Full Access
Question # 15

An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?

A.

Cross-site scripting

B.

Session hijacking

C.

Man in the middle

D.

DNS poisoning

Full Access
Question # 16

A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used?

A.

Site-to-site connection

B.

SSL VPN

C.

GRE tunnel

D.

VNC

Full Access
Question # 17

Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?

A.

Spanning port

B.

Port forwarding

C.

Port mirroring

D.

Port tagging

Full Access
Question # 18

A network technician is supporting a library system that w ants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?

A.

IR

B.

Bluetooth

C.

PAN

D.

RFID

Full Access
Question # 19

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Full Access
Question # 20

Which of the following protocols is used by Active Directory for authentication?

A.

SSH

B.

SFTP

C.

LDAP

D.

TLS

Full Access
Question # 21

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

A.

Partial mesh

B.

Ad hoc

C.

Ring

D.

Bus

Full Access
Question # 22

A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.

Which of the following should the vendors recommend in response to the quote request?

A.

The use of lightweight APs with a load balancer

B.

The use of autonomous APs with a wireless controller

C.

The use of autonomous APs with a load balancer

D.

The use of lightweight APs with a wireless controller

Full Access
Question # 23

The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?

A.

nmap

B.

arp

C.

tcpdump

D.

dig

Full Access
Question # 24

A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?

A.

ipconfig

B.

nslookup

C.

arp

D.

dig

Full Access
Question # 25

Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?

A.

Transceiver mismatch

B.

Crosstalk

C.

Jitter

D.

Open/short on the cable

Full Access
Question # 26

A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

A.

VLAN routing

B.

Server-based firewall configuration issue

C.

Patch cable type

D.

DHCP scope availability

Full Access
Question # 27

Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Select TWO)

A.

21

B.

22

C.

23

D.

25

E.

123

F.

443

Full Access
Question # 28

A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?

A.

Change the default credentials.

B.

Verify the firmware file hash.

C.

Disable unused switchports.

D.

Apply patches and updates.

Full Access
Question # 29

An administrator is redesigning a company's network and wants to reduce the amount of hardware needed Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration?

A.

Bridge

B.

Multilayer switch

C.

Switch

D.

Next-generation firewall

Full Access
Question # 30

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Full Access
Question # 31

The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?

A.

802.1X

B.

802.1q

C.

802.3at

D.

802.3af

Full Access
Question # 32

A network technician installed a new host on the network. The host is not connecting to the company’s cloud servers. The technician attemtps to ping a server using the AP address with no success. Checking the IP address using ipconfing displays:

Which of the following should the technician perform NEXT to determine where the issue is located?

A.

Modify the default gateway address and ping the server to test connectivity.

B.

Change the DNS servers to be on the same subnet as the host.

C.

Modify the router’s ACL to allow port 80 to exit the network.

D.

Perform a tracert command to locate where the packet is dropped.

Full Access
Question # 33

An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?

A.

Ensure the host-based firewall allows TCP port 3389.

B.

Log in to the border firewall and ensure TCP port 3389 Is allowed.

C.

Check the iptables configuration for TCP port 3389.

D.

Use netstat to determine If there Is a connection to TCP port 3389.

Full Access
Question # 34

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Full Access
Question # 35

Which of the following BEST describes the functionality of the root guard feature on a switch?

A.

BPDUs entering the root bridge are Ignored.

B.

The STP root bridge cannot be changed.

C.

Broadcast storms entering from a root port are blocked.

D.

Loop protection Is enabled on the root port of a switch.

Full Access
Question # 36

A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?

A.

MT-RJ

B.

BNC

C.

GBIC

D.

F-type

Full Access
Question # 37

A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?

A.

Loopback adapter

B.

Tone generator

C.

Multimeter

D.

Punchdown tool

Full Access
Question # 38

A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating?

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Full Access
Question # 39

A network technician Is segmenting network traffic Into various broadcast domains. Which of the following should the network technician utilize?

A.

VLAN

B.

STP

C.

ACL

D.

BPDU

Full Access
Question # 40

Which of the following technologies should be used in high-throughput networks to reduce network overhead?

A.

iscsi

B.

QoStags

C.

Port aggregation

D.

Jumbo frames

Full Access
Question # 41

A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?

A.

tracert

B.

netstat

C.

arp

D.

dig

Full Access
Question # 42

Which of the following devices would allow a network administrator to block an application at Layer7 on the network?

A.

Firewall

B.

NGFW

C.

Router

D.

Spam filter

Full Access
Question # 43

A network technician needs to install network devices in a new building. The building will be a pan of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building?

A.

Firewall

B.

Switch

C.

Modem

D.

IDS

Full Access
Question # 44

hich of the following can be used to prevent devices from handing out IP addresses?

A.

DHCP snooping

B.

Dynamic ARP inspection

C.

MAC filtering

D.

BPDU guard

Full Access
Question # 45

A technician who works for a cloud service provider is replacing a firewall and needs to ensure the downtime for clients does not exceed established threshold. Which of the following MOST likely contains this information?

A.

Standard operating procedures

B.

Performance baseline assessment

C.

Service-level agreement

D.

Network configuration diagram

Full Access
Question # 46

A network administrator is investigating an issue with VoIP calls that are not establishing properly. After troubleshooting, the administrator is able to determine the SIP responses are not being received by the gateway.

Which of the following did the administrator use to determine this information?

A.

netstat

B.

A spectrum analyzer

C.

tracert

D.

A packet analyzer

Full Access
Question # 47

A network technician is connecting medical monitoring devices on a personal area network for patients' phones. Which of the following technologies should be used?

A.

Bluetooth

B.

ROD

C.

NFC

D.

IR

Full Access
Question # 48

A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?

A.

Network configuration

B.

Change management documentation

C.

Work instructions

D.

Performance baseline

Full Access
Question # 49

The network team is searching for one device that can perform the routing tote for the LAN and offer a higher number of interfaces for future expansion. Which of the following devices should be used in this scenario?

A.

Multilayer switch

B.

VPN concentrator

C.

UTM appliance

D.

NGFW/layer 7 firewall

Full Access
Question # 50

An IT training company hosts an annual series of daily seminars Each day. a different group of 252 students participate, and all require use of the company's /24 guest wireless network Starling on Tuesday, and continuing through Friday, some students report they are unable to connect to the wireless network. Which of the following is the BEST solution for preventing this Issue from occurring again next year?

A.

Reduce DHCP lease time from eight days to eight hours.

B.

Increase the upper limit of the DHCP scope from 254 to 506

C.

Create IP address reservations for Monday's students in the DHCP scope.

D.

Add DHCP scope option 156 for the TFTP server.

Full Access
Question # 51

Which of the following is categorized by sending data to a host and reviewing which services respond?

A.

A vulnerability scan

B.

A packet analysis

C.

A port scan

D.

A log review

Full Access
Question # 52

A network administrator has been experiencing slow performance and file errors when attempting to utilize server utilities. The administrator needs to ensure the system tiles on the server have not been modified. Which of the following should be used to ensure the server files have not been compromised?

A.

Performance baseline

B.

File hash

C.

Iptables

D.

tepdump

Full Access
Question # 53

A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the technician configure?

A.

ac

B.

b

C.

g

D.

n

Full Access
Question # 54

In which of the following layers of the OSI model is checksum added to the end of an Ethernet frame?

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Full Access
Question # 55

A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?

A.

SNMP

B.

Log review

C.

Vulnerability scanning

D.

SIEM

Full Access
Question # 56

Which of the following BEST explains why a firewall would be subject to international export controls?

A.

Protected industry

B.

IP version incompatibility

C.

Differing power standards

D.

Encryption technology

Full Access
Question # 57

An organization has migrated the internal network from a static IP addressing scheme to use DHCP. After fully deploying the DHCP solution, users within the web deployment team are unable to access the web server

that is hosted in the DMZ. After reviewing the logs, the network technician sees multiple deny entries from the internal network to the DMZ. Which of the following is the MOST likely cause?

A.

The DNS entries are incorrect for the web development team.

B.

The server IP addresses in the DMZ have changed after migrating to DHCP.

C.

The OSPF configuration was not updated to route the new dynamic address spaces.

D.

The ACL does not accurately reflect current addresses for the web development team.

Full Access
Question # 58

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Full Access
Question # 59

A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented?

A.

BGP

B.

EIGRP

C.

OSPF

D.

RIPv2

Full Access
Question # 60

A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?

A.

Punchdown tool

B.

Crimper

C.

OTDR

D.

Loopback adapter

Full Access
Question # 61

An ISP technician frequently needs to administer a router remotely in the event of a configuration error or WAN outage. Which of the following technologies would facilitate the required connectivity?

A.

Remote access VPN

B.

Remote file access

C.

Out-of-band

D.

Secure Shell

Full Access
Question # 62

A network administrator installed a WAP to extend the network. However, the company wants to contain the signal so it does not extend beyond the company's parking structure. Which of the following solutions would work BEST?

A.

Create MAC filtering.

B.

Change the channel.

C.

Change the encryption.

D.

Install a directional antenna.

Full Access
Question # 63

A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor’s actions was logged. The administrator notes that the server receiving and storing

the events was not compromised by any attack and is properly communicating with all network devices.

Which of the following can the administrator employ to improve network access accountability?

A.

Activate the audit logs on the network server and resources.

B.

Configure SNMP on the network server.

C.

Deploy a central SIEM server into the network.

D.

Collect traffic statistics from the servers using NetFlow data.

Full Access
Question # 64

A network engineer is reviewing a construction proposal for improving the roadways on a campus. The engineer needs to determine if any of the fiber infrastructure between the buildings will need to be relocated. Which of the following will the engineer MOST likely use to make the determination?

A.

Logical network topology

B.

Network rack diagrams

C.

A physical network diagram

D.

An MDF diagram

Full Access
Question # 65

Which of the following utilizes IP spoofing and a third-party service protocol to flood a victim with more data than the attacker is capable of sending alone?

A.

Brute forcing

B.

ARP flooding

C.

DNS poisoning

D.

Amplified DoS

Full Access
Question # 66

Which of the following DNS records would a technician need to update after migrating an organization's email server to a cloud-hosting provider?

A.

TXT

B.

CNAME

C.

AAAA

D.

Mx

Full Access
Question # 67

Some similar devices are experiencing system crashes on the same day of every month. Which of the following is the MOST efficient approach to detect the probable cause of the recurring incidents?

A.

Escalate the issue to the manufacturer of the devices.

B.

Assign multiple analysts to investigate and monitor the devices simultaneously on the incident day.

C.

Get information about the approved changes scoping the devices.

D.

Question the users about similar actions performed on the devices.

Full Access
Question # 68

A new network Technician is responsible for bringing a building onto the corporate network. The technician is not aware of the proper settings for the new switches. Which of the following should the technician reference to find these settings?

A.

iDF/MDF documentation

B.

Change management plan

C.

Configuration baseline

D.

Standard operating procedures

Full Access
Question # 69

A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method c following should be configured to provide connectivity and minimal security to the new network? (Select TWO).

A.

Pre-shared key

B.

Open authentication

C.

PEAP

D.

MAC filtering

E.

EAP-FAST

F.

EAP-TLS

Full Access
Question # 70

Users are reporting an internal server has potentially been compromised. When visiting the website https://internet.local , users observe a warning that says the site’s certificate is not trusted. Which of the following would allow the users’ browsers to trust the website with minimal impact to the users and without compromising security?

A.

Switch the web server to use HTTP on port 8080.

B.

Email instructions for user to installed the certificate and ignore the warning.

C.

Copy the web server’s certificate to the local trusted certificate store for each user.

D.

Reissue the certificate from a trusted certificate authority.

Full Access
Question # 71

A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

A.

Public cloud

B.

SaaS

C.

PaaS

D.

Hybrid cloud

Full Access
Question # 72

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.

Range Given: 172.30.232.0/24

  • Sales 57 devices
  • HR 23 devices
  • IT 12 devices
  • Finance 32 devices
  • Marketing 9 devices

INSTRUCTIONS

Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.

All drop downs must be filled.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 73

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Full Access
Question # 74

A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?

A.

Bridge

B.

WAP

C.

Hub

D.

Switch

Full Access
Question # 75

A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?

A.

IDS

B.

IPS

C.

Layer 7 firewall

D.

RADIUS server

Full Access
Question # 76

Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?

A.

Firewall

B.

Proxy server

C.

IDS

D.

Load balancer

Full Access
Question # 77

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Full Access
Question # 78

A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

A.

Non-disclosure policy

B.

Data loss prevention policy

C.

Acceptable use policy

D.

Incident response policy

Full Access
Question # 79

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Full Access
Question # 80

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Full Access
Question # 81

A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities. Which of the following would mitigate this issue?

A.

Create a VLAN for all unused switchports

B.

Implement a DM2 for all external services

C.

Implement root guard on all switches

D.

Create a honeypot to attract attackers

Full Access
Question # 82

A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?

A.

Gather information.

B.

Determine the symptoms.

C.

Establish a plan of action.

D.

Document the findings

Full Access
Question # 83

A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?

A.

Use port mirroring

B.

Install an inline tap

C.

Periodically view the server logs

D.

Configure port aggregation

Full Access
Question # 84

A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?

A.

Modify the speed and duplex

B.

Plug in to another port

C.

Replace the NIC

D.

Change the switch

Full Access
Question # 85

Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity.

Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button.

Full Access
Question # 86

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Select TWO).

A.

DNS poisoning

B.

ARP poisoning

C.

Man-in-the-middle

D.

Ransomware

E.

Evil twin

F.

Reflective

Full Access
Question # 87

Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points?

A.

Wireless access point

B.

Router

C.

Media converter

D.

Firewall

Full Access
Question # 88

Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use?

A.

Telnet

B.

LDAP

C.

TFTP

D.

Samba

Full Access
Question # 89

A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware?

A.

RDP

B.

SSH

C.

TFTP

D.

Telnet

Full Access
Question # 90

A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with:

Ping request could not find host

Which of the following is the MOST likely misconfiguration?

A.

Incorrect netmask

B.

DNS

C.

DHCP

D.

SSL certificate

Full Access
Question # 91

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Full Access
Question # 92

Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?

A.

Wireless controller

B.

Wireless range extender

C.

Wireless load balancer

D.

Wireless analyzer

Full Access
Question # 93

A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?

A.

SSH

B.

VNC

C.

RDP

D.

HTTPS

Full Access
Question # 94

A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.)

A.

Site-to-site VPN

B.

Client-to-site VPN

C.

RDP

D.

SSH

E.

SFTP

F.

Captive portal

Full Access
Question # 95

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Full Access
Question # 96

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 97

Which of the following would block access to an untagged port when connected to a Layer 2 device?

A.

BPDU guard

B.

Spanning tree

C.

Flood guard

D.

Root guard

Full Access
Question # 98

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

A.

Avoiding common passwords

B.

File hashing

C.

Disabling unused IP ports

D.

Using secure protocols

Full Access
Question # 99

Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

A.

Disable unused ports.

B.

Reset the two-factor token.

C.

Disable virtual ports.

D.

Upgrade the firmware.

Full Access
Question # 100

Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?

A.

EIGRP

B.

BGP

C.

IPv6

D.

MPLS

Full Access
Question # 101

Joe an ex-employee from accounting, changed the configurations on several network devices on his last day of work. Which of the following is the MOST likely reason a non-IT employee was able to gain access to network devices?

A.

Left virtual ports open

B.

Allowed unsecure protocols

C.

Left default passwords

D.

Allowed unnecessary services

Full Access
Question # 102

Which of the following DNS record types assists with the routing of email?

A.

MX

B.

PTR

C.

SRV

D.

AAAA

Full Access
Question # 103

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

A.

VLAN mismatch

B.

Transceiver mismatch

C.

Latency

D.

DHCP exhaustion

Full Access