Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

N10-007 Questions and Answers

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 Questions and Answers

Question # 6

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Full Access
Question # 7

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.)

A.

Label the switch with IP address and firmware version

B.

Draw the switchport diagram

C.

Create a change management document

D.

Draw the network rack logical diagram

E.

Confirm standard operating procedures documentation

F.

Create a performance baseline of the switch

Full Access
Question # 8

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)

A.

Change the default credentials.

B.

Disable unnecessary services.

C.

Secure the physical access.

D.

Generate new encryption keys.

E.

Enable HTTPS access.

F.

Turn on WPS.

Full Access
Question # 9

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Full Access
Question # 10

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Full Access
Question # 11

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Full Access
Question # 12

Which of the following statements about the OSI model is true?

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Full Access
Question # 13

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

A.

Brute force

B.

VLAN hopping

C.

Evil twin

D.

DNS poisoning

Full Access
Question # 14

Which of the following OSI layers contains the LLC function?

A.

Network

B.

Data link

C.

Session

D.

Transport

Full Access
Question # 15

Which of the following manages the delegation of physical equipment to the virtual components?

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Full Access
Question # 16

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Full Access
Question # 17

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

A.

10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.

B.

127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

C.

172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.

D.

192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

Full Access
Question # 18

A technician must install and configure a network device in a building with 20 classrooms. Each room must be on a separate subnet and should not be able to see traffic from other subnets. Which of the following is the MOST cost-effective solution?

A.

A switch with VLANs created for each segment

B.

A router with interfaces connected to a switch in each room

C.

A VoIP endpoint connected to a hub for each network

D.

A firewall with DHCP pools for each subnet

Full Access
Question # 19

A user wants to secure a network closet and be able to tell if anyone makes changes in the closet. Which of the following would be the BEST detective physical security devices in this situation? (Choose two.)

A.

Anti-tampering

B.

Badges

C.

Door locks

D.

Key fob

E.

Motion detection

F.

Video surveillance

Full Access
Question # 20

A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

A.

Public cloud

B.

SaaS

C.

PaaS

D.

Hybrid cloud

Full Access
Question # 21

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Full Access
Question # 22

Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?

A.

Check the latency by running a continuous ping to the site.

B.

Perform the ipconfig/flushdns command on the affected users’ PCs.

C.

Run a speedtest from a user’s PC to a site on the Internet.

D.

Verify if there is MTU mismatch in the path to the site.

Full Access
Question # 23

A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

A.

Router

B.

Layer 3 switch

C.

Proxy server

D.

Firewall

E.

Intrusion detection system

Full Access
Question # 24

Which of the following should a network administrator deploy to control all preventive security measures?

A.

UTM

B.

Firewall

C.

IDS

D.

Proxy

Full Access
Question # 25

A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?

A.

No QoS configured on the network

B.

Signal-to-noise ratio

C.

Interference from the microwave in the breakroom

D.

Rogue AP installed in the office

Full Access
Question # 26

A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented?

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Full Access
Question # 27

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Full Access
Question # 28

Which of the following routing conventions is known as a link-state protocol?

A.

RIP

B.

BGP

C.

EIGRP

D.

OSPF

Full Access
Question # 29

A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?

A.

Ping

B.

Log review

C.

Vulnerability scans

D.

Alerts

Full Access
Question # 30

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?

A.

Deploy two APs to the gymnasium with the maximum power level transmitting to cover the adjacent offices.

B.

Deploy a single AP to each adjacent office set to transmit at maximum power.

C.

Use a high-gain antenna on the AP in the gymnasium and install an AP in every other adjacent office.

D.

Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

Full Access
Question # 31

Which of the following protocols operates at Layer 4 of the OSI model?

A.

TCP

B.

ARP

C.

IMAP

D.

POP3

Full Access
Question # 32

A company needs to implement a fault-tolerant server configuration after the failure of its database server. The company decides to implement load-balancing redundant servers. Which of the following should be used for file storage for the servers?

A.

IDE

B.

Cloud storage

C.

SAN

D.

iSCSI

Full Access
Question # 33

A technician is installing a cable modem In a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

A.

Coaxial

B.

Single-mode fiber

C.

Cat 6e

D.

Multimode fiber

Full Access
Question # 34

A document outlining the types of actions allowed on the corporate network would be BEST defined as an:

A.

AUP.

B.

NDA.

C.

MOU.

D.

MOA.

Full Access
Question # 35

A network technician needs to manage a sensor at an unmanned location without incurring the cost of a dedicated Internet connection. Which of the following will the technician MOST likely implement?

A.

A dial-up modem

B.

An SSH server

C.

Asite-to-site VPN

D.

An RDP jump box

Full Access
Question # 36

Which of the following accurately describes a warm site in datacenter disaster recovery?

A.

An online standby datacenter that is fully equipped without company data

B.

A backup datacenter location that is ready for equipment to be installed

C.

A backup datacenter location that is fully equipped bot not online

D.

An online, standby datacenter that is fully equipped with all company data

Full Access
Question # 37

To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

A.

WPA2-Personal

B.

WPA2-Enterprise

C.

WPA

D.

WEP

Full Access
Question # 38

Which of the following would MOST likely provide continuous power during a short brownout?

A.

Uninterruptible power supply

B.

Hot site

C.

Cold site

D.

Generator

E.

Redundant power supplies

Full Access
Question # 39

A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away In the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

A.

Add more access points to the mesh network.

B.

Increase Transmit power levels on the access points

C.

Physically connect more access points.

D.

Change the antenna type on the WAPs.

Full Access
Question # 40

A network administrator has discovered a low-end managed switch connoted to the company LAN. While reading about the device's specifications on the manufacturer's website, the administrator discovers the switch does not support a command line interface for administration. Which of the following remote access methods should the administrator use to log in the switch?

A.

install a VNC plugin on the web Browser

B.

Connect to the HTTPS management interface

C.

Replace the managed switch with an unmanaged switch.

D.

Establish an SSH session.

Full Access
Question # 41

A network administrator is configuring a server to be placed on the network. The end users will be accessing an application via a web browser that requires them to log into the application. Which of the following protocols would allow a secure connection?

A.

SCP

B.

SSH

C.

HTTPS

D.

SFTP

Full Access
Question # 42

A company is redesigning its office to remove the divider walls between desks and create an open collaboration area. All network cables are run through the divider walls, and a new wireless network will be installed. Which of the following sets of documents will need to be revised based on the new configuration?

A.

Standard operating procedures and rack diagrams.

B.

Inventory management forms and MDF inventory forms

C.

Work instructions and performance baselines

D.

Physical network layout and port locations

Full Access
Question # 43

A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?

A.

CRC errors

B.

Giants

C.

Runts

D.

Flooding

Full Access
Question # 44

A VoIP device is not getting power at a new user's desk. The technician tests the components with a PoE injector at the switch and resolves the issue. Which of the following is the MOST likely cause of the issue?

A.

vlan mismatch

B.

Bad switchpod

C.

TXJRX reverse

D.

Latency

E.

Damaged cable

Full Access
Question # 45

A systems administrator is running a VoIP network and is experiencing jitter and high latency. Which of the following would BEST help the administrator determine the cause of these issues?

A.

Enabling RADIUS on the network.

B.

Configuring SNMP traps on the network.

C.

Implementing LDAP on the network.

D.

Establishing NTP on the network.

Full Access
Question # 46

A company’s risk management team wants to ensure the network infrastructure is protected against known vulnerabilities. Which of the following hardening techniques should be scheduled and performed at regular intervals to support this goal?

A.

Patching and updates

B.

Generating new keys

C.

Disabling physical ports

D.

Checking firmware hash

Full Access
Question # 47

A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP’s network and the start of the customer’s network?

A.

Router

B.

Hub

C.

Modern

D.

Switch

Full Access
Question # 48

A network analyzer captures traffic from a host that is sending 802.1q traffic to a Layer 3 switch Which of the following attacks is occurring?

A.

MTM

B.

VLAN hopping

C.

ARP poisoning

D.

Spoofing

Full Access
Question # 49

A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor’s actions was logged. The administrator notes that the server receiving and storing

the events was not compromised by any attack and is properly communicating with all network devices.

Which of the following can the administrator employ to improve network access accountability?

A.

Activate the audit logs on the network server and resources.

B.

Configure SNMP on the network server.

C.

Deploy a central SIEM server into the network.

D.

Collect traffic statistics from the servers using NetFlow data.

Full Access
Question # 50

A technician is setting up a surveillance system at a small office. The customer would like to have the network controlled by the office's firewall/router device. The office has a coaxial ISP connection with an ISP provided cable modem. Which of the following should the technician configure on the cable modem to meet the customer requirements?

A Route with NAT

B. PPP

C. PPPoE

D. Bridge mode

Full Access
Question # 51

A network technician is asked to design and properly size an IPv4 network. Management wants to use a class B private network address, and each subnet should be able to contain exactly 30 hosts.

Which of the following combinations of network addresses and subnet masks would BEST meet these requirements?

A.

10.200.1.0 / 255.255.255.192

B.

172.18.30.96 / 255.255.255.224

C.

180.20.12.64 / 255.255.255.224

D.

192.168.200.224 / 255.255.255.0

E.

192.168.200.224 / 255.255.255.224

Full Access
Question # 52

A new printer was assigned a static IP address within the DHCP scope of a QA subnet. There are 243 workstations on the LAN five servers, and four existing printers on the network. The network administrator configured the network with the following parameters:

192.168.51 -192 168.5 5 static IPs assigned to servers

192.168.5.6 -192 168.5 250 DHCP scope for workstations

192.168.5.251 -192.168.5 254 static IPs assigned to printers

Which of the following should the network administrator perform to minimize the disruption to the users and keep the LAN secure while setting up the new printer?

A.

Increase the DHCP scope by one address

B.

Create an IP reservation for the printer

C.

Assign a public IP address to the printer.

D.

Reconfigure the subnet mask for the LAN

Full Access
Question # 53

A customer has asked a technician to upgrade the wireless router to the fastest speed possible. The technician performs a site survey and notices several older devices will not be able to connect to router that operates In the 5GHz range. Which of the following options should the technician suggest to the customer?

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11n

Full Access
Question # 54

Which of the following components should be used to provide interconnectivity between virtual machines in distinct broadcast domains inside the hypervisor's environment?

A.

Virtual router

B.

Virtual switch

C.

Virtual NIC

D.

Virtual SAN

Full Access
Question # 55

Which of the following allows for secure access to a directory for authentication services?

A.

SIP

B.

LDAPS

C.

SFTP

D.

SMB

E.

SNMP

Full Access
Question # 56

Which of the following are reasons for enabling jumbo frames? (Select TWO)

A.

To increase payload size

B.

To increase bandwidth

C.

To provide additional SANs storage capacity

D.

To implement larger SQL queries

E.

To reduce CPU overhead

Full Access
Question # 57

Which of the following relies on metrics such as total number of connections or CPU'RAM usage to help maintain performance and availability?

A.

Round robin

B.

Distributed file system

C.

NIC teaming

D.

Load balancing

Full Access
Question # 58

A network technician needs to replace a failed hard drive on a server at the company's large, remote datacenter Which of the following types of documentation should be reviewed to locate this server easily?

A.

Logical diagrams

B.

Rack diagrams

C.

Change management

D.

Standard operating procedures

Full Access
Question # 59

A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?

A.

IDF

B.

WAN

C.

LAN

D.

DMZ

Full Access
Question # 60

Which of the following DNS records would a network technician create to connect to a server by its hostname?

A.

PTR

B.

TxT

C.

A

D.

SPF

Full Access
Question # 61

A consultant is designing a new network for a company that will be hosting its own email and web servers. The company wants to ensure there are separate devices to protect the internal network from the DMZ and the DMZ from the Internet. Which of the following would provide this protection?

A.

The installation of a firewall with multiple interfaces for the Internet to the DMZ and the LAN

B.

The in-line installation of two firewalls to divide the Internet to the DMZ and the DMZ to the LAN

C.

The installation of two switches to divide the Internet from the LAN and the LAN to the DMZ

D.

The installation of a switch from the Internet to the DMZ and a firewall between the DMZ and the LAN

Full Access
Question # 62

A company has decided to move its datacenter to an laaS provider. The company stakeholders are concerned about their ISP being a single point of failure. Which of the following will the network administrator MOST likely recommend to mitigate this nsk?

A.

Adopt a multicloud strategy to ensure access in case of an outage.

B.

Contract a secondary ISP to provide another connection.

C.

Lease additional office space for use in the event of a disaster.

D.

Get an additional Internet connection from the current ISP

Full Access
Question # 63

A network engineer is adding a second router to the company's topology to connect a new wing of the building. The second router will be in the same server room as the first router and does not support auto-MDX. Which of the following describes how the routers should be connected to each other?

A.

Connect the second router to the first router with a crossover cable.

B.

Use a straight-through cable to connect the two routers together.

C.

Connect the two routers with vendor-specific console cables.

D.

Connect the AUX ports directly between the two routers.

Full Access
Question # 64

Management asks a network technician to install a new connection between two main locations. Management requests that the connection be the fastest possible for data replication. Which of the following would be the MOST appropriate type?

A.

PRI

B.

ADSL

C.

T3/E3

D.

ISDN

Full Access
Question # 65

A network administrator is installing the company first external-facing web server and examining where to place it on the network. In which of the following zones should the server be configured?

A.

DMZ

B.

WAN

C.

LAN

D.

VPN

E.

VLAN

Full Access
Question # 66

A company moved to a new building that was designed with WiFi only. During the first month, users reported good WiFi coverage. However, after the first month, users began reporting slow speeds and constant disconnects. Upon investigation, an engineer determines the SNR is currently 10dB compared to a baseline SNR of 42dB. Which of the following MOST likely causing the WAFI issues?

A.

Latency

B.

Jitter

C.

Channel overlap

D.

Interference

Full Access
Question # 67

A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?

A.

Two days

B.

Three days

C.

Six days

D.

Seven days

Full Access
Question # 68

A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?

A.

ipconfig

B.

nslookup

C.

arp

D.

dig

Full Access
Question # 69

A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

A.

VLAN routing

B.

Server-based firewall configuration issue

C.

Patch cable type

D.

DHCP scope availability

Full Access
Question # 70

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

A.

Partial mesh

B.

Ad hoc

C.

Ring

D.

Bus

Full Access
Question # 71

To increase speed and availability, a high-traffic web application was split into three servers recently and moved behind a load balancer. Which of the following should be configured on the load balancer to allow for a single destination?

A.

SIP

B.

PAT

C.

NAT

D.

VIP

Full Access
Question # 72

A network technician has provisioned a new Linux instance in public cloud provider’s IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server’s public IP address securely to start a console session. Which of the following remote access methods should the technician use?

A.

SSH

B.

Telnet

C.

VNC

D.

RDP

Full Access
Question # 73

Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

A.

Disable unused ports.

B.

Reset the two-factor token.

C.

Disable virtual ports.

D.

Upgrade the firmware.

Full Access
Question # 74

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Full Access
Question # 75

A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?

A.

Logic bomb

B.

Social engineering

C.

Trojan horse

D.

Insider threat

Full Access
Question # 76

A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?

A.

Layer 1 - Physical

B.

Layer 3 - Network

C.

Layer 4 - Transport

D.

Layer 7 - Application

Full Access
Question # 77

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

A.

22

B.

69

C.

80

D.

389

E.

443

Full Access
Question # 78

A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?

A.

Changed the default credentials on the network switches

B.

Installed a Layer 7 firewall

C.

Implemented port security

D.

Disabled unnecessary services on the network switches

Full Access
Question # 79

A technician has replaced a customer’s desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?

A.

ACL

B.

NAC

C.

Traffic shaping

D.

SDN

E.

NTP

Full Access
Question # 80

A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?

A.

Attenuation

B.

Incorrect pin-out

C.

Damaged cable

D.

Switch configuration

Full Access
Question # 81

Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?

A.

Inventory management

B.

Wiring and port location

C.

Configuration baseline

D.

Standard operating procedure

Full Access
Question # 82

A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?

A.

InfiniBand

B.

iSCSI

C.

Fibre Channel

D.

CIFS

Full Access
Question # 83

Which of the following protocols is used to transport outgoing mail across networks?

A.

POP

B.

SMTP

C.

IMAP

D.

LDAP

Full Access
Question # 84

A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?

A.

Use port mirroring

B.

Install an inline tap

C.

Periodically view the server logs

D.

Configure port aggregation

Full Access
Question # 85

When deploying UTP cables In a networking environment, which of the following are acceptable standards? (Select TWO).

A.

10Base2

B.

10Base5

C.

10GBaseT

D.

1000BaseLX

E.

1000BaseSX

F.

1000BaseT

Full Access
Question # 86

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods would meet this requirement?

A.

PEAP

B.

WP2-PSK

C.

Captive portal

D.

EAP-TLS

Full Access
Question # 87

A technician is troubleshooting a server In the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

A.

nslookup

B.

iptables

C.

pathping

D.

netstat

Full Access
Question # 88

Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?

A.

Reviewing application logs

B.

Reviewing a baseline report

C.

Reviewing a vulnerability scan

D.

Reviewing SLA requirements

Full Access
Question # 89

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Full Access
Question # 90

A network technician is reading a network diagram and looking for the edge router. Which of the following is MOST likely the symbol used for the router?

A.

A circle with four outward arrows

B.

A rectangle with two horizontal arrows

C.

A square with two circular arrows

D.

A triangle with three outward arrows

Full Access
Question # 91

Which of the following is used to define the duration during which a client can use an IP address?

A.

MAC reservation

B.

IP helper

C.

Pool

D.

Lease time

Full Access
Question # 92

A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware?

A.

RDP

B.

SSH

C.

TFTP

D.

Telnet

Full Access
Question # 93

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

A.

Snapshots

B.

Incremental

C.

Replica

D.

Differential

Full Access
Question # 94

A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?

A.

Protocol analyzer

B.

Tone generator

C.

Spectrum analyzer

D.

Multimeter

Full Access
Question # 95

A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

A.

3

B.

4

C.

5

D.

6

E.

7

Full Access
Question # 96

A network administrator installed a multilayer switch In a shared closet. The network team will manage the switch remotely via SSH. Which of the following should the network administrator do to harden the switch in this scenario? (Select TWO).

A.

Disable TACACS+.

B.

Disable HTTP management.

C.

Configure the loopback.

D.

Enable LACP.

E.

Configure IPv6.

F.

Enable port security.

Full Access
Question # 97

A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician's machine. Which of the following should the technician use to help diagnose the problem?

A.

Packet sniffer

B.

netstat

C.

nslookup

D.

Spectrum analyzer

Full Access
Question # 98

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

A.

System life-cycle procedures

B.

Off-boarding procedures

C.

Safety procedures

D.

Appropriate use policy

Full Access
Question # 99

A company has just installed a new cloud VoIP solution, however, users occasionally report poor call quality or dead air being present. Which of the following describes the NEXT troubleshooting step the technician should take?

A.

The technician should check the internal diagnostics on all the phones to look for a common thread.

B.

The technician should reset all the phones and deprovision information from the provider

C.

The technician should use a packet tracer to see if the traffic is getting out of the network

D.

The technician should run ping tests on the Internet line to monitor for packet loss and latency

Full Access
Question # 100

A network engineer is working on a network connectivity problem between a site in California and a site in New York The connection went down overnight and the engineer is unsure where the connection failed The technician is logged into the primary switch in the customer's network, which is also the company's connection to the WAN. Which of the following toots should the technician use to determine the last available network hop?

A.

netstat

B.

Nmap

C.

traceroute

D.

pathping

Full Access
Question # 101

A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?

A.

Modify the speed and duplex

B.

Plug in to another port

C.

Replace the NIC

D.

Change the switch

Full Access
Question # 102

A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat .Which of the following policies did the technician violate'?

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use

Full Access
Question # 103

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Full Access