Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this?
A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?
A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?
Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?
A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?
A technician installed a new fiber optic cable to connect two sites. Although there is a link light on the port at each site, the customer reports traffic is dropping intermittently. Which of the following should the technician do NEXT to troubleshoot the issue?
An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?
A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?
A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?
An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?
A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used?
Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?
A network technician is supporting a library system that w ants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?
A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?
Which of the following protocols is used by Active Directory for authentication?
A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?
A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.
Which of the following should the vendors recommend in response to the quote request?
The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?
A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?
Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?
A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?
Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Select TWO)
A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?
An administrator is redesigning a company's network and wants to reduce the amount of hardware needed Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration?
A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?
The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?
A network technician installed a new host on the network. The host is not connecting to the company’s cloud servers. The technician attemtps to ping a server using the AP address with no success. Checking the IP address using ipconfing displays:
Which of the following should the technician perform NEXT to determine where the issue is located?
An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?
A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?
Which of the following BEST describes the functionality of the root guard feature on a switch?
A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?
A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?
A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating?
A network technician Is segmenting network traffic Into various broadcast domains. Which of the following should the network technician utilize?
Which of the following technologies should be used in high-throughput networks to reduce network overhead?
A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?
Which of the following devices would allow a network administrator to block an application at Layer7 on the network?
A network technician needs to install network devices in a new building. The building will be a pan of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building?
hich of the following can be used to prevent devices from handing out IP addresses?
A technician who works for a cloud service provider is replacing a firewall and needs to ensure the downtime for clients does not exceed established threshold. Which of the following MOST likely contains this information?
A network administrator is investigating an issue with VoIP calls that are not establishing properly. After troubleshooting, the administrator is able to determine the SIP responses are not being received by the gateway.
Which of the following did the administrator use to determine this information?
A network technician is connecting medical monitoring devices on a personal area network for patients' phones. Which of the following technologies should be used?
A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?
The network team is searching for one device that can perform the routing tote for the LAN and offer a higher number of interfaces for future expansion. Which of the following devices should be used in this scenario?
An IT training company hosts an annual series of daily seminars Each day. a different group of 252 students participate, and all require use of the company's /24 guest wireless network Starling on Tuesday, and continuing through Friday, some students report they are unable to connect to the wireless network. Which of the following is the BEST solution for preventing this Issue from occurring again next year?
Which of the following is categorized by sending data to a host and reviewing which services respond?
A network administrator has been experiencing slow performance and file errors when attempting to utilize server utilities. The administrator needs to ensure the system tiles on the server have not been modified. Which of the following should be used to ensure the server files have not been compromised?
A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the technician configure?
In which of the following layers of the OSI model is checksum added to the end of an Ethernet frame?
A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?
Which of the following BEST explains why a firewall would be subject to international export controls?
An organization has migrated the internal network from a static IP addressing scheme to use DHCP. After fully deploying the DHCP solution, users within the web deployment team are unable to access the web server
that is hosted in the DMZ. After reviewing the logs, the network technician sees multiple deny entries from the internal network to the DMZ. Which of the following is the MOST likely cause?
A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented?
A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?
An ISP technician frequently needs to administer a router remotely in the event of a configuration error or WAN outage. Which of the following technologies would facilitate the required connectivity?
A network administrator installed a WAP to extend the network. However, the company wants to contain the signal so it does not extend beyond the company's parking structure. Which of the following solutions would work BEST?
A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor’s actions was logged. The administrator notes that the server receiving and storing
the events was not compromised by any attack and is properly communicating with all network devices.
Which of the following can the administrator employ to improve network access accountability?
A network engineer is reviewing a construction proposal for improving the roadways on a campus. The engineer needs to determine if any of the fiber infrastructure between the buildings will need to be relocated. Which of the following will the engineer MOST likely use to make the determination?
Which of the following utilizes IP spoofing and a third-party service protocol to flood a victim with more data than the attacker is capable of sending alone?
Which of the following DNS records would a technician need to update after migrating an organization's email server to a cloud-hosting provider?
Some similar devices are experiencing system crashes on the same day of every month. Which of the following is the MOST efficient approach to detect the probable cause of the recurring incidents?
A new network Technician is responsible for bringing a building onto the corporate network. The technician is not aware of the proper settings for the new switches. Which of the following should the technician reference to find these settings?
A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method c following should be configured to provide connectivity and minimal security to the new network? (Select TWO).
Users are reporting an internal server has potentially been compromised. When visiting the website https://internet.local , users observe a warning that says the site’s certificate is not trusted. Which of the following would allow the users’ browsers to trust the website with minimal impact to the users and without compromising security?
A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?
Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.
Range Given: 172.30.232.0/24
Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.
After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.
All drop downs must be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP)
HR network - /27 – This will provide for up to 30usable IP’s (32-2)
IT - /28 – This will provide for up to 14 usable IP’s (16-2)
Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP’s and can’t be used for hosts.
Marketing - /28
If we add up how many IP blocks are used that is 64+32+16+64+16=192.
A /24 contains 256 IP addresses, so 256-192=64.
So the last unused box should be a /26, which equates to 64 addresses
A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?
A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?
A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?
Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?
Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?
A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?
A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?
A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?
A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities. Which of the following would mitigate this issue?
A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?
A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?
A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?
Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity.
Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button.
All ports should be enabled.
An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Select TWO).
Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points?
Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use?
A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware?
A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with:
Ping request could not find host
Which of the following is the MOST likely misconfiguration?
A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?
Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?
A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?
A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.)
A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?
After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.
Verify the settings by using the command prompt, after making any system changes.
Next, restore connectivity by making the appropriate changes to the infrastructure.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
See explanation below.
On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128, then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.
Which of the following would block access to an untagged port when connected to a Layer 2 device?
While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?
Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?
Joe an ex-employee from accounting, changed the configurations on several network devices on his last day of work. Which of the following is the MOST likely reason a non-IT employee was able to gain access to network devices?
Which of the following DNS record types assists with the routing of email?
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?