Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

N10-009 Questions and Answers

Question # 6

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Full Access
Question # 7

Which of the following is the best example of a networking appliance that connects different network segments and directs allowed traffic between specific segments?

A.

Firewall

B.

IDS

C.

Unmanaged switch

D.

(Not provided)

Full Access
Question # 8

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Full Access
Question # 9

A network administrator is conducting an assessment and finds network devices that do not meet standards. Which of the following configurations is considered a set of rules that devices should adhere to?

A.

Production

B.

Backup

C.

Candidate

D.

Golden

Full Access
Question # 10

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Full Access
Question # 11

A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?

A.

Coaxial cable

B.

9.8ft (3m) cable

C.

Plenum cable

D.

STP cable

Full Access
Question # 12

Which of the following ports is used for secure email?

A.

25

B.

110

C.

143

D.

587

Full Access
Question # 13

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 14

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Full Access
Question # 15

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 16

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Full Access
Question # 17

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Full Access
Question # 18

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Full Access
Question # 19

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

A.

GRE

B.

IKE

C.

ESP

D.

AH

Full Access
Question # 20

Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased retransmissions for other non-video applications on the network. Which of the following symptoms describes the users' reported issues?

A.

Latency

B.

Packet loss

C.

Bottlenecking

D.

Jitter

Full Access
Question # 21

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Full Access
Question # 22

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Full Access
Question # 23

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Full Access
Question # 24

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Full Access
Question # 25

Which of the following types of network architecture typically uses leased lines to provide dedicated, private connections between multiple satellite offices and a head office?

A.

Mesh

B.

Point to point

C.

Hub and spoke

D.

Star

Full Access
Question # 26

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Full Access
Question # 27

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Full Access
Question # 28

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point

Full Access
Question # 29

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Full Access
Question # 30

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Full Access
Question # 31

Which of the following protocols is commonly associated with TCP port 443?

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Full Access
Question # 32

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization's website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Full Access
Question # 33

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Full Access
Question # 34

A company recently experienced outages of one of its critical, customer-facing applications. The root cause was an overutilized network router, but the Chief Technology Officer is concerned that the support staff was unaware of the issue until notified by customers. Which of the following is the best way to address this issue in the future?

A.

Packet capture

B.

SNMP

C.

Syslog collector

D.

SIEM

Full Access
Question # 35

A company implements a new network utilizing only IPv6 addressing and needs to connect to the internet. Which of the following must be enabled in order for the internal network to contact servers on the internet?

A.

MPLS

B.

NAT64

C.

GRE

D.

Static routing

Full Access
Question # 36

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Full Access
Question # 37

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Full Access
Question # 38

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Full Access
Question # 39

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Full Access
Question # 40

Three new employees report that they are unable to access company resources, but they can connect to each other’s devices. Which of the following would most likely need to be modified to resolve the issue?

A.

The routing table on the gateway

B.

The DNS configuration on the router

C.

The pool on the DHCP server

D.

The firewall on the workstation

Full Access
Question # 41

A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?

A.

One

B.

Two

C.

Three

D.

Four

Full Access
Question # 42

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Full Access
Question # 43

Which of the following most likely determines the size of a rack for installation? (Select two).

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Full Access
Question # 44

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Full Access
Question # 45

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Full Access
Question # 46

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

A.

RJ45

B.

ST

C.

LC

D.

MPO

Full Access
Question # 47

Which of the following protocols has a default administrative distance value of 90?

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 48

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Full Access
Question # 49

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 50

Which of the following network cables involves bouncing light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 51

Which of the following standards enables the use of an enterprise authentication for network access control?

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

Full Access
Question # 52

A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the most secure and compatible?

A.

WPA3

B.

WPA2

C.

WPA2/WPA3 mixed mode

D.

WPA/WPA2 mixed mode

Full Access
Question # 53

A network technician is adding a new switch to increase capacity on the network. The technician connects the two switches using a single cable. Several hosts are moved to the new switch, but none of the hosts can access the network or internet. Which of the following should the technician do to resolve the issue?

A.

Configure the connecting ports as trunk ports

B.

Install STP cables between the switches

C.

Increase the PoE budget for the switches

D.

Set up link aggregation on the uplink ports

Full Access
Question # 54

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Full Access
Question # 55

A network technician needs to resolve some issues with a customer's SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Cable Test Results:

Cable 1:

Cable 2:

Cable 3:

Cable 4:

Full Access
Question # 56

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 57

A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the distribution switch. Which of the following should the technician use?

A.

Link aggregation

B.

Subinterfaces

C.

Switch virtual interfaces

D.

Half-duplex connections

Full Access
Question # 58

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Full Access
Question # 59

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Full Access
Question # 60

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Full Access
Question # 61

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Full Access
Question # 62

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Full Access
Question # 63

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Full Access
Question # 64

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Full Access
Question # 65

Which of the following is the final step in the ticket management process?

A.

Escalating to senior management

B.

Performing functional and non-functional testing

C.

Documenting findings, outcomes, and lessons learned

D.

Establishing a detailed action plan

Full Access
Question # 66

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Full Access
Question # 67

Which of the following facilities is the best example of a warm site in the event of information system disruption?

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Full Access
Question # 68

A server administrator needs to add a record to the company's DNS server to verify ownership of a web domain. The administrator has the record's name and value. Which of the following record types should the administrator use to add the record to the DNS server?

A.

TXT

B.

A

C.

PTR

D.

CNAME

Full Access
Question # 69

A network administrator is responding to a request to configure a new IP phone. Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?

A.

Configure full duplex.

B.

Modify QoS.

C.

Enable 802.1Q tagging.

D.

Change the native VLAN.

Full Access
Question # 70

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Full Access
Question # 71

Which of the following is the best way to securely access a network appliance from an external location?

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Full Access
Question # 72

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Full Access
Question # 73

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Full Access
Question # 74

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

A.

The patch cord from the wall jack is faulty.

B.

The switchport bandwidth needs to be increased.

C.

Multicast is not configured correctly on the switch.

D.

The NIC is set to half duplex.

Full Access
Question # 75

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Full Access
Question # 76

A customer wants to separate the finance department from the marketing department. The network administrator suggests segmenting the existing Class C network into two sections and readdressing all devices appropriately. Which of the following subnet masks should the network administrator use?

A.

/24

B.

/25

C.

/26

D.

/27

Full Access
Question # 77

A data center administrator is evaluating the use of jumbo frames within a storage environment. Which of the following describes the best reason to use jumbo frames in the storage environment?

A.

To reduce device overhead

B.

To report on the current root switch in the STP

C.

To improve routing convergence

D.

To increase drive throughput

Full Access
Question # 78

Which of the following protocols is used to route traffic on the public internet?

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Full Access
Question # 79

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Full Access
Question # 80

A network engineer is troubleshooting connectivity for a newly installed server on an existing VLAN. The engineer reviews the following output:

C:\> ipconfig

IP Address: 192.168.100.225

Mask: 255.255.255.224

Gateway: 192.168.100.254

Router# show ip route

C 192.168.100.0/24 is directly connected, GigabitEthernet0/0

Which of the following describes the issue?

A.

The server has an incorrect subnet mask

B.

There is a duplicate IP address on the network

C.

The DHCP address pool is exhausted

D.

The router is missing a default route

Full Access
Question # 81

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Full Access
Question # 82

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Full Access
Question # 83

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Full Access
Question # 84

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Full Access
Question # 85

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Full Access
Question # 86

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Full Access
Question # 87

Which of the following does BGP use for loop avoidance?

A.

Autonomous system path

B.

Peer autonomous system

C.

Autonomous system length

D.

Public autonomous system

Full Access
Question # 88

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Full Access
Question # 89

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Full Access
Question # 90

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Full Access
Question # 91

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Full Access
Question # 92

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Full Access
Question # 93

Which of the following would be violated if an employee accidentally deleted a customer's data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Full Access
Question # 94

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

A.

724

B.

/26

C.

/28

D.

/30

Full Access
Question # 95

Which of the following objectives does an evil twin achieve?

A.

DNS poisoning

B.

Login credentials

C.

ARP spoofing

D.

Denial of service

Full Access
Question # 96

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Full Access
Question # 97

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Full Access
Question # 98

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Full Access
Question # 99

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Full Access
Question # 100

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Full Access
Question # 101

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Full Access
Question # 102

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Full Access
Question # 103

A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?

A.

APIPA

B.

Multicast

C.

Class C

D.

Experimental

Full Access
Question # 104

Which of the following impacts the availability of a web-based customer portal?

A.

MAC flooding

B.

ARP spoofing

C.

DoS

D.

Rogue devices

Full Access
Question # 105

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Full Access
Question # 106

Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue?

A.

Spanning Tree

B.

Enhanced Interior Gateway Routing Protocol (EIGRP)

C.

Cisco Discovery Protocol (CDP)

D.

Link Layer Discovery Protocol (LLDP)

E.

Border Gateway Protocol (BGP)

Full Access
Question # 107

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Full Access
Question # 108

Which of the following network ports is used when a client accesses an SFTP server?

A.

22

B.

80

C.

443

D.

3389

Full Access
Question # 109

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Full Access
Question # 110

Which of the following helps a network administrator understand security risk from external malicious actors and offers insights on which threats to mitigate?

A.

Compliance benchmarks

B.

CIA triad

C.

SAML

D.

Honeypot

Full Access
Question # 111

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Full Access
Question # 112

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Full Access
Question # 113

Which of the following allows a standard user to log in to multiple resources with one account?

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Full Access
Question # 114

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Full Access
Question # 115

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Full Access
Question # 116

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Full Access
Question # 117

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Full Access
Question # 118

Which of the following attacks would most likely cause duplicate IP addresses in a network?

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Full Access
Question # 119

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Full Access
Question # 120

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

Full Access
Question # 121

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Full Access
Question # 122

A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?

A.

Incorrect default gateway

B.

Faulty Ethernet cable

C.

Wrong duplex settings

D.

VLAN mismatch

Full Access
Question # 123

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Full Access
Question # 124

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Full Access
Question # 125

Which of the following network cables involves bounding light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 126

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Full Access
Question # 127

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Full Access
Question # 128

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Full Access
Question # 129

A network technician needs to connect a new user to the company’s Wi-Fi network called SSID: business. When attempting to connect, two networks are listed as possible choices: SSID: business and SSID: myaccess. Which of the following attacks is occurring?

A.

On-path

B.

Rogue AP

C.

Evil twin

D.

Tailgating

Full Access
Question # 130

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

A.

Cold

B.

Warm

C.

Active

D.

Hot

Full Access
Question # 131

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 132

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 133

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Full Access
Question # 134

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Full Access
Question # 135

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Full Access
Question # 136

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Full Access
Question # 137

A network administrator changed an external DNS to point customers to a new server. Which of the following tools should the administrator use to test the new server's configuration?

A.

ping

B.

tracert

C.

tcpdump

D.

nslookup

Full Access
Question # 138

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

Full Access
Question # 139

A firewall receives traffic on port 80 and forwards it to an internal server on port 88. Which of the following technologies is being leveraged?

A.

TLS

B.

FHRP

C.

SSL

D.

PAT

Full Access
Question # 140

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

A.

22

B.

80

C.

443

D.

587

Full Access
Question # 141

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Full Access
Question # 142

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Full Access
Question # 143

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Full Access
Question # 144

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Full Access
Question # 145

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Full Access
Question # 146

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Full Access
Question # 147

Which of the following could provide a lightweight and private connection to a remote box?

A.

Site-to-site VPN

B.

Telnet

C.

Console

D.

Secure Shell

Full Access
Question # 148

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 149

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Full Access
Question # 150

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Full Access
Question # 151

Which of the following connector types would most likely be used to connect to an external antenna?

A.

BNC

B.

ST

C.

LC

D.

MPO

Full Access