Uploaded by Luke Parks

Sample Questions

advertisement
1. A systems administrator needs to improve WiFi performance in a densely populated office tower and
use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following
should the systems administrator select to meet this requirement?
802.11ax
2. What is the BEST to use to detect a MAC spoofing attack?
Reverse Address Resolution Protocol
3. A technician receives feedback that some users are experiencing high amounts of jitter while using
the wireless network. While troubleshooting the network, the technician uses the ping command with
the IP address of the default gateway and verifies large variations in latency. The technician thinks the
issue may be interference from other networks and non-802.11 devices. Which of the following tools
should the technician use to troubleshoot the issue?
Spectrum analyzer
4. Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the
users disconnect and reconnect, utilizing the web authentication process each time. The network
administrator can see the devices connected to the APs at all times. Which of the following will MOST
likely determine the cause of the issue? Verify the session time-out config on the captive portal settings
5. A network administrator walks into a datacenter and notices an unknown person is following closely.
The administrator stops and directs the person to the security desk. Which of the following attacks did
the network administrator prevent?
Tailgating
6. A network is experiencing a number of CRC errors during normal network communication. At which of
the following layers of the OSI model will the administrator MOST likely start to troubleshoot? Layer 2
7. A client recently added 100 users who are using VMs. All users have since reported slow or
unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable
packet delay. Which of the following metrics will MOST accurately show the underlying performance
issues?
A. CPU usage
B. Memory
8. Client devices cannot enter a network, and the network administrator determines the DHCP scope is
exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the
administrator perform to resolve the issue?
D. Reduce the lease time
9. An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on
a network segment. Which of the following switch features will MOST likely be used to assist with this
task?
B. Neighbor Discovery Protocol
10. Which of the following DNS records works as an alias to another record?
B. CNAME
11. A company built a new building at its headquarters location. The new building is connected to the
company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the
company's intranet site via their web browser, but they are able to access internet sites. Which of the
following describes how the network administrator can resolve this issue?
A. Correct the DNS server entries in the DHCP scope
12. A technician is installing a new fiber connection to a network device in a datacenter. The connection
from the device to the switch also traverses a patch panel connection. The chain of connections is in the
following order:
✑ Device
connect fiber cable
✑ LC/LC patch cable
✑ Patch panel
✑ Patch panel
✑ LC/LC patch cable
✑Cross✑ Switch
The connection is not working. The technician has changed both patch cables with known working patch
cables. The device had been tested and was working properly before being installed. Which of the
following is the MOST likely cause of the issue?
A. TX/RX is reversed
13. A tech is searching for a device that is connected to the network & has the device's physical address.
Which of the following should the tech review on the switch to locate the device's port?MAC table
14. Which of the following provides redundancy on a file server to ensure the server is still connected to
a LAN even in the event of a port failure on a switch?
A. NIC teaming
15. An IT org needs to optimize speeds for global content distro and wants to reduce latency in highdensity user locations. What’s the tech’s BEST meets the org's req’s?Content delivery network
16. A user reports being unable to access network resources after making some changes in the office.
Which of the following should a network technician do FIRST?
D. Ask what changes were
made
17. A new cabling certification is being requested every time a network technician rebuilds one end of a
Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which
of the following would address this issue by allowing the use of the original cable?
MDIX
18. A company hired a technician to find all the devices connected within a network. Which of the
following software tools would BEST assist the technician in completing this task?
IP scanner
19. A technician is installing a high-density wireless network and wants to use an available frequency
that supports the maximum number of channels to reduce interference. Which of the following
standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
B. 5GHz
20. A tech is configuring a network switch to be used in a publicly accessible location. Which of the
following should the tech configure on the switch to prevent unintended connections?Port security
21. Which of the following is used to track and document various types of known vulnerabilities?
A. CVE
22. The network admin is informed that a user's email password is frequently hacked by brute-force
programs. Which of the following policies should the network administrator implements to BEST
mitigate this issue? Two-factor authentication Complex passwords
23. A network engineer performs the following tasks to increase server bandwidth:
✑ Connects two network cables from the server to a switch stack
✑ Configure LACP on the switchports ✑ Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
NIC teaming
24. A network tech is manually configuring the network settings for a new device and is told the network
block is 192.168.0.0/20. Which of the following subnets should the technician use? 255.255.240.0
25. Which of the following is the LARGEST MTU for a standard Ethernet frame? 1500
26. Given the following information:
Which of the following command-line tools would generate this output?
A. netstat
27. According to troubleshooting methodology, which of the following should the technician do NEXT
after determining the most likely probable cause of an issue?Test the theory to determine the cause
28. Which of the following BEST describes a network appliance that warns of unapproved devices that
are accessing the network?
IDS
29. A tech is installing a cable modem in a SOHO. Which of the following cable types will the tech MOST
likely use to connect a modem to the ISP?
Coaxial
30. A company has decided to update their usage policy to allow employees to surf the web unrestricted
from their work computers. Which of the following actions should the IT team implement to help
protect the network from attack as a result of this new policy? Install host-based anti-malware software
31. An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector.
Which of the following protocols was MOST likely used on this cable? RS-232
32. A network tech has created a network consisting of an external internet connection, a DMZ, an
internal private network, & admin network. All routers/switches should be configured to accept SSH
connections from which of the network segments? admin private network allowing only admin access
33. During a check of the security control measures of the company network assets, a network
administrator is explaining the difference between the security controls at the company. Which of the
following would be identified as physical security controls?Man traps Biometrics
Cipher locks
34. A customer is attempting to download a file from a remote FTP server, but receives an error that a
connection cannot be opened. Which of the following should be one FIRST to resolve the problem?
Ensure that port 20 is open
35. While monitoring the network, a tech notices that the network traffic to one of the servers is
extremely high. Which of the following should the tech use to verify if this is a concern?Network
baseline
36. Which of the following integrity security mechanisms ensures that a sent message has been received
intact, by the intended receiver?
IPSEC
37. A device operating at Layer 3 of the OSI model uses which of the following protocols to determine
the path to a different network?
RIP
38. A tech needs to install a server to authenticate users before they have access to corporate network
resources when working from home. Which of the following servers should the tech implement? RAS
39. A client is concerned about a hacker compromising a network in order to gain access to confidential
research data. Which could be implemented to redirect any attackers on the network? Honeypot
40. A tech just completed a new external website & setup rules in the firewall. After some testing, only
users outside the internal network can reach the site. The website responds to a ping from the internal
network & resolves the proper public address. What could the tech do to fix this issue while causing
internal users to route to the website using an internal address?Implement a split horizon DNS
41. Users are reporting extreme slowness across the network every Friday. Which of the following
should the network technician review first to narrow down the root cause of the problem?
Utilization
42. A company has contracted outside vendor to perform a service that will provide hardware, software,
& procedures in case of a catastrophic failure of the primary datacenter. The CIO is concerned because
this contract does not include a long-term strategy for extended outages. Which of the following should
the CIO complete?
Business continuity plan
43. The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain? Recent backups
44. A network technician is troubleshooting a problem at a remote site. It has been determined that the
connection from router A to router B is down. The technician at the remote site re-terminates the CAT5
cable that connects the two routers as a straight through cable. The cable is then tested and is plugged
into the correct interface. Which of the following would be the result of this action?
D. The interface status will show line protocol down.
45. Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The admin checks and confirms that the switch can be accessed using the console, but
currently only one student can log in at a time. Which of the following should be done to correct this
issue?
Increase the number of virtual terminals available.
46. Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
C. 802.11 AP
47. A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the
192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select TWO)
B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
48. A tech is troubleshooting a point-to-point fiber-optic connection. The tech is at a remote site and has
no connectivity to the main site. The tech confirms the switch and the send-and-receive light levels are
within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the
technician use to reveal the location of the fault?
OTDR
49. Which of the following ports is used to provide secure sessions over the web by default?22
50. A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel.
The technician has cabled this port to be used with which of the following?
POTS
51. A tech is connecting a NAS device to an Ethernet network. Which of the following tech’s will be used
to encapsulate the frames?
iSCSI
52. Peter is setting up a DHCP server on a LAN segment. Which of the following options should he
configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to
be able to access the Internet and company servers? Default gateway Subnet mask DNS servers
53. Which of the following PDUs is used by a connectionless protocol?
D. Datagram
54. A contractor is setting up and configuring conference rooms for a convention. He sets up each room
in the center to allow wired Internet access going to individual tables. The contractor measured the
distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e spec’s. Which of
the following actions should the contractor take to ensure the cable runs meet spec’s and the network
functions properly? Place a switch at the hotel’s patch panel for connecting each room’s cables
55. A tech installs a new piece of hardware and now needs to add the device to the network
management tool database. However, when adding the device to the tool using SNMP credentials, the
tool cannot successfully interpret the results. Which of the following would need to be added to the
network management tool to allow it to interpret the new device and control it using SNMP? C. MIB
56. A client reports that half of the office is unable to access a shared resource. Which of the following
should be used to troubleshoot the issue?
Network diagrams
57. A network tech is troubleshooting a connection error, when pinging the default gateway no reply is
received. The default gateway is found to be functioning properly but cannot connect to any
workstations. At which layers could the problem exist? Data link
Physical
58. A network engineer is dispatched to an office to troubleshoot an issue with the employee’s laptop.
The employee is unable to connect to local and remote resources. The network engineer flips the
laptop’s wireless switch on to resolve the issue. At which layer was the issue resolved? Layer 1
59. Which of the following protocols is used to encapsulate other network layer protocols such as
multicast and IPX over WAN connections?
GRE
60. A network tech has heard from several users that cannot reach a particular website. What cmnd
would provide the BEST info about the path taken across the network to this website? tracert
61. A user is unable to connect to a server in another building. A technician is troubleshooting the issue
and determines the following:
1) Client PC 1 has an IP address if 192.168.10.25/25
2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A
3)Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25
4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the
following is the MOST likely cause?
Link from router A to server A is down
62. A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target
device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which
of the following would allow SSH to function properly?
B. Generate new keys
63. A network technician was tasked to install a network printer and share it to a group of five human
resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP
address automatically. Which of the following is the cause of the problem?
D. DHCP scope
64. Which of the following devices should a network admin configure on the outermost part of the
network?
D. Firewall
65. A company has seen an increase in ransomware across the enterprise. Which of the following should
be implemented to reduce the occurrences?
C. Web content filtering
66. Jane, has just installed a fiber switch in a datacenter. To run the fiber cabling, Jane plans the cable
route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As
Jane configures the switch, she notices several messages in the logging buffer stating the receive signal
of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging
buffer?
A. Bend radius exceeded
67. A technician add memory to a router, but that memory is never recognized by the router. The router
is then powered down, and the technician relocates all of the memory to different modules. On startup,
the router does not boot and displays memory errors. Which of the following is MOST likely the cause?
B. Driver update
68. When a client calls and describes a problem with a computer not being able to reach the Internet, in
which of the following places of the OSI model would a technician begin troubleshooting?
Physical
69. A company is selecting a fire suppression system for their new datacenter and wants to minimize the
IT recoveryin the event of a fire. What is the best choice for the fire suppression system? Clean Gas
70. A network technician has configured a point-to-point interface on a router, however, once the fiber
optic cables have been run, the interface will not come up. The technician has cleaned the fiber
connectors and used an optical power meter to confirm that light is passing in both directions without
excessive loss. Which of the following is the MOST likely cause?
B. Wavelength mismatch
71. After connecting a workstation directly to a small business firewall, a network admin is trying to
manage it via HTTPS without losing its stored configuration. The only two pieces of info that the network
admin knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e,
and the admin’s password. Which of the following will allow the admin to log onto the firewall via HTTPS
if the management’s IP address is unknown and the admin’s workstation IP address is 192.168.0.10/23?
B. Run the following command on the administrator’s workstation: arp –s 192.168.1.200
01:4a:d1:fa:b1:0e
72. A network tech must create a wireless link between two bldgs in an office park utilizing the 802.11ac
standard. The antenna chosen must have a small physical footprint and min wt as it will be mounted on
the outside of the building. Which of the following antenna types is BEST suited for this solution?
Patch
73. Jane was asked to remove a virus. Issues were found several levels deep within the directory
structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files
and believes it contains illegal material. Which of the following forensics actions should Jane perform?
Stop and escalate to the proper authorities
74. When configuring a new server, a tech requests that an MX record be created in DNS for the new
server, but the record was not entered properly. Which of the following was MOST likely installed that
required an MX record to function properly?
D. Mail server
75. A tech has finished configuring AAA on a new network device. However, the tech is unable to log
into the device with LDAP credentials but is able to do so with a local user account. Which of the
following is the MOST likely reason for the problem?
Shared secret key is mismatched
76. A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11
Mbps with full signal strength. Which standard is implemented on the network? 802.11b
77. A tech is attempting to resolve an issue with users on the network not being able to access websites.
Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the
following will resolve the issue? Enable port 53 on the firewall
78. Which port should be allowed to provide access to certain VoIP applications?
D. 5060
79. A company is deploying a new wireless network and requires 800Mbps network throughput. Which
of the following is the MINIMUM configuration that would meet this need?
802.11ac with 2 spatial streams and an 80MHz bandwidth
80. A company recently upgraded all of its printers to networked multifunction devices. Users can print
to the new devices, but they would also like the ability to scan and fax files from their computers. Which
of the following should the tech update to allow this functionality?
Printer firmware
81. An admin has a server with a single NIC. The server needs to deploy two virtual machines. Each VM
needs two NIC’s, one that connects to the network, and a second that is a server to server heartbeat
connection between the two virtual machines. what should the admin do to meet these reqs?The admin
should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs
should be set to addresses in an unused range
82. A network topology in which all nodes have point to point connections to all other nodes is known as
which of the following?
Mesh
83. A company has added several new employees, which has caused the network traffic to increase by
200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The
admin suspects that the network may have been compromised. Which of the following should the
network administrator have done previously to min the possibility of a network breach?
Provide end user awareness and training for employees
84. A network admin has a monitoring system in place that is currently polling hundreds of network
devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which
of the following tasks should the admin perform to resolve the CPU issue while maintaining full
monitoring capabilities? Remove SNMP polling & configure SNMP traps on each network device
85. A network engineer wants to segment the network into multiple broadcast domains. Which of the
following devices would allow for communication between the segments?Layer 3 switch
86. Channel bonding will improve which of the following wireless characteristics? D. Connection speed
87. A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is
connected, but the T1 is down. To verify the configuration of the router, which of the following tools
should the technician use?
A. Loopback adapter
88. The management team wants to set up a wireless network in their office but all of their phones
operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a
higher frequency than their phones. Which of following standards should be used?
A. 802.11a
89. A company installs a new mail server. Which of the following DNS records need to be configured to
allow the organization to receive email?
B. MX
90. A tech has prolonged contact with thermal compound. What resource should be consulted? MSDS
91. Which of the following policies would Peter have to agree to when he brings in his personal tablet to
connect to the company’s guest wireless Internet?
C. BYOD
92. Which of the following 802.11g antennas broadcast an RF signal in a specific direction with narrow
path?
Unidirectional
93. A facility would like to verify each individual’s identity prior to allowing access to the datacenter. the
facility would like to ensure that users do not tailgate behind other users. What would BEST meet these
goals? Implement a biometric reader at the datacenter entrance & require passage through a mantrap
94. A malicious student is blocking mobile devices from connecting to the internet when other students
are in the classroom. Which of the following is the malicious student implementing?
C. Jamming
95. Jane is troubleshooting an issue with a DNS server. She notices that the security logs have filled up
and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which
of the following solutions would BEST resolve this problem?Install an event management tool
96. A single mode fiber is no longer providing network connectivity to a remote site. Which of the
following would be used to identify the location of the break? OTDR
97. A company utilizes a patching server to regularly update their PC’s. After the latest round of patching
all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now
require a tech to fix the issue locally at each PC. What should be done to prevent this issue in the future?
Throttle the connection speed of the patching server to match older PCs
98. A tech needs to limit the amount of broadcast traffic on a network and allow different segments to
communicate with each other. Which of the following options would satisfy these requirements?
Add a layer 3 switch and create a VLAN.
99. A tech discovers that multiple switches require a major update. Which of the following policies
should be followed?
Change management policy
100. Two weeks after installation, a network tech is now unable to log onto any of the newly installed
company switches. The tech suspects that a malicious user may have changed the switches’ settings
before they were installed in secure areas. Which of the following is the MOST likely way in which the
malicious user gained access to the switches?Via HTTP using the default user and password
01. A customer cannot access a company’s secure website. The company’s network security is reviewing
the firewall for the server and finds the following output: Which of the following changes should be
made to allow all customers to access the company’s secure website?Allow 10.5.0.10 443 any any
102. A network admin notices that the border router is having high network capacity loads during nonworking hours which is causing web outages. Which of the following is the cause? Distributed DoS
103. When two or more links need to pass traffic as if they were one physical link, which of the following
would be used to satisfy the requirement?LACP
104. A network engineer is designing a new network for a remote site. The remote site consists of ten
desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop
computers at the remote site will be used by managers who should be on a separate network from the
other eight computers. Which of the following represents the BEST config for the remote site?
A. One router connected to one 24-port switch configured with three VLANS: one for the manager’s
computers and printer, one for the other computers and printer, and one for the VoIP phones
105. A company is experiencing very slow network speeds of 54Mbps. A tech has been hired to perform
an assessment on the existing wireless network. The tech has recommended an 802.11n network
infrastructure. Which of the following allows 802.11n to reach higher speeds?
D. MIMO
106. A tech is setting up a direct connection between two older PCs so they can communicate but not be
on the corporate network. The tech does not have access to a spare switch but does have spare Cat 6
cables, RJ-45 plugs, and a crimping tool. What should the technician do to make a crossover cable before
crimping the new plug?
Reverse the wires leading to pins 2 and 4
107. A contractor was hired to troubleshoot congestion issues on the network. After a few of the
switches have been reconfigured/upgraded, congestion worsens and collisions increase. What is the
BEST action to alleviate the situation? Downgrade firmware and restore backup configuration
108. A network topology that utilizes a central device with point-to-point connections to all other
devices is which of the following?
Star
109. Which of the following physical security controls prevents an attacker from gaining access to a
network closet?
Proximity readers
110. The ability to make access decisions based on an examination of Windows registry settings,
antivirus software, and AD membership status is an example of which of the following NAC features?
C. Posture assessment
111. QoS operates at which of the following OSI model layers?Layer 2
Layer 3
112. An admin wants to update a web-based application to the latest version. Which of the following
procedures should the admin perform FIRST? Install the software in a test environment
113. A service provider is unable to maintain connectivity to several remote sites at predetermined
speeds. The service provider could be in violation of the:
B. SLA.
114. A network tech is diagnosing a time-out issue generated from an end user’s web browser. The web
browser issues standard HTTP get and post commands to interact with the website. Given this
information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline.
Which of the following tools would allow the technician to view the handshake?
Packet analyzer
115. A tech wants to update the organization’s disaster recovery plans. Which of the following will allow
network devices to be replaced quickly in the event of a device failure?
Archives/backups
116. A tech is troubleshooting a PC that is having connectivity issues. The tech notices that the STP
cables pairs are not completely twisted near the connector. What is the issue? Cross-talk
117. There is a network looping problem after installing some switches. The switch vendor suggested
the use of 802.1d. Which of the following is the MOST probable reason the vendor made this
suggestion?
A. It is a rapid version of spanning tree that uses BPDU to detect problems
118. Which of the following would be the BEST addition to a business continuity plan that would protect
business from a catastrophic event such as a fire, tornado, or earthquake?
Hot sites or cold sites
119. A network engineer is troubleshooting an issue with a computer that is unable to connect to the
Internet. The network engineer analyzes the following output from a command line utility:
Network DestinationNetmaskGatewayInterface 192.168.1.0 255.255.255.0192.168.1.254eth0
192.168.1.10255.255.255.255192.168.1.10eth0
127.0.0.1255.0.0.0On-Linlo
127.0.0.0255.0.0.0On-Linklo
255.255.255.255
255.255.255.255102.168.1.10eth0
Which of the following is the reason for the c no omputer issue?
gateway
Missing default
120. Users have reported poor network performance. A technician suspects a user may have maliciously
flooded the network with ping request. Which of the following should the technician implement to
avoid potential occurrences from happening in the future?
Block all ICMP request
121. Which of the following network infrastructure implementations would be used to support files
being transferred between Bluetooth-enabled smartphones?
PAN
122. The HR department has been moved to an area which is more than 60 meters away from the
nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be provided, which of the
following media will need to utilized?
CAT6e
123. A tech has verified that a loss of network connectivity to multiple PCs is due to a bad CAT5 cable in
the server room. What tool can be used to locate its physical location within the wall? Toner probe
124. The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP.
Tthe organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. the ISP
reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being
agreed to in the SLA? Throttling
125. A network admin is setting up a web-based application that needs to be continually accessible to
the end users. Which of the following concepts would BEST ensure this req?High availability
126. A technician needs to secure web traffic for a new e-commerce website. Which of the following will
secure traffic between a web browser and a website? SSL
127. The admin modifies a rule on the firewall, and now all the FTP users cannot access the server any
longer. The mgr calls the admin and asks what caused the extreme downtime for the server. In regards
to the manager’s inquiry, which of the following did the admin forget to do FIRST? Submit a change
request
128. A network tech has been tasked with designing a WLAN for a small office. One of the reqs of this
design is that it is capable of supporting HD video streaming to multiple devices. Which of the following
would be the appropriate wireless technology for this design?
B. 802.11ac
129. A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1
technologies?
A. Time division multiplexing
130. A network admin is using a packet analyzer to determine an issue on the local LAN. Two separate
computers are showing an error message on the screen and are unable to communicate with other
computers in the same lab. The network admin looks at the following output:
00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
which of the following layers of the OSI model is the problem occurring?
Network
131. A technician wants to implement a network for testing remote devices before allowing them to
connect to the corporate network. Which of the following could the technician implement?
Quarantine
132. A network technician is replacing security devices that protect the DMZ for a client. The client has
an application that allows external users to access the application remotely. After replacing the devices,
the external users are unable to connect remotely to the application. Which of the following is MOST
likely misconfigured?
Firewall
133. A network tech is creating a new subnet for 488 host machines. The tech is told to use a class B
address scheme when making the subnet and is told to leave as much room as possible for additional
subnets of the same size. Which of the following subnets would fulfill these reqs? 172.18.0.0/23
134. Peter is setting up three more switches in the test lab and is configuring the switches. He is
verifying the connectivity but when he pings one of the switches he receives “Destination Unreachable”.
Which of the following issues could this be?Misconfigured Split Horizon
135. A network admin recently installed a web proxy server at a customer’s site. The following week, a
system admin replaced the DNS server overnight. The next day, customers began having issues
accessing public websites. Which will resolve the issue? Update the DNS server with the proxy server
info
136. A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one
site goes down?
BGP
137. After a server outage, a technician discovers that a physically damaged fiber cable appears to be
the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting
the cable at the server end, the technician discovers light can be seen through one of the two fiber
strands. Which of the following should the technician do FIRST to reconnect the server to the network?
A. Reverse the fiber strands of the cable and reconnect them to the server
138. A company is installing several APs for a new wireless system that requires users to authenticate to
the domain. The network technician would like to authenticate to a central point. Which of the following
would work BEST to achieve these results?
A RADIUS server and an access point
139. A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which
of the following technologies would be able to detect and block this traffic?
Stateful packet
inspection
140. A network admin wants to deploy a wireless network in a location that has too much RF
interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless
transmissions?
802.11a
B. 802.11ac
141. A technician is trying to determine the IP address of a customer’s router. The customer has an IP
address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
192.168.1.1
142. As part of a transition from a static to a dynamic routing protocol on an organization’s internal
network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the
following should the network administrator use?
OSPF
IS-IS
143. An administrator needs to set up a space in the office where co-workers can relax. The
administrator sets up several TV’s with interconnected gaming systems in the office. Which of the
following did the administrator set up?
CAN
144. A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet
connection. As a result, they have been given a new IP range. The ISP has assigned the company
10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps Duplex: Auto
State: No Shutdown
None of the workstations at the company are able to access the
Internet. Which of the following are the reasons? (Select TWO).
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.
145. In the past, a company has experienced several network breaches as a result of end-user actions.
To help mitigate future breaches, which of the following documents should the security team ensure are
up-to-date and enforced for all employees?
Memorandum of understanding
AUP
146. Which of the following connection types is used to terminate DS3 connections in a telecomms
facility?
BNC
147. Which of the following is considered a classless routing protocol?
IS-IS
148. A network tech needs to protect IP based servers in the network DMZ from being discovered by an
intruder utilizing a ping sweep. Which of the following should the technician do to protect the network
from ping sweeps?
Block ICMP at the firewall
149. A network admin wants to ensure sensitive data is not exfiltrated from the system electronically.
Which of the following should be implemented?
DLP
150. Which of the following is a UC application?
Softphone
151. Which of the following allows a telecom company to test circuits to customers remotely?Smart Jack
152. A network administrator is noticing slow responds times from the server to hosts on the network.
After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness
due to congestion at the server NIC. Which of the following should the network administrator do to
correct the issue?
C. Add additional network cards to the server
153. A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the
circuit showed no errors from the provider end to the customer’s demarcation point, a network
administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the
following should the network administrator do to rule out any problems at Layer 1? (Choose two.)
A. Use a loopback at the demark and router, and check for a link light
B. Use an OTDR to validate the cable integrity
154. A network admin is tasked with building a wireless network in a new adjacent building. Wireless
clients should not have visibility to one another but should have visibility to the wired users. Users must
seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the
following is the BEST way to configure the new wireless network in the new building?
A. Use the same SSIDs on different channels and AP isolation
155. An office user cannot access local network drives but has full access to the Internet. A technician
troubleshoots the issue and observes the following output of the ipconfig command:
Which of the following would allow the network drives to be accessed?Disable the WLAN adapter
156. OFDM, QAM and QPSK are all examples of which of the following wireless
technologies?Modulation
157. Which of the following requires the network admin to schedule a maintenance window?
B. A minor release upgrade of a production router.
158. A network tech is using telnet to connect to a router on a network that has been compromised. A
new user and password has been added to the router with full rights. The tech is concerned that the
regularly used admin account has been compromised. After changing the password on all networking
devices, which of the following should the tech perform to prevent the password for the admin account
from being sniffed on the network?only allow administrators to access routers using port 22
159. A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and
printers. Which of the following has happened to the user?
The user is connected to the wrong SSID.
160. After a company rolls out updates, Jane is no longer able to use equipment connected to her PC.
The tech contacts the vendor and determines there is an incompatibility with the latest IO drivers.
Which of the following should the tech perform so that Jane can get back to work as quickly as possible?
Roll back the drivers to the previous version
161. Which of the following wireless connection types utilize MIMO on non-overlapping channels?
B. 802.11ac
E. 802.11n
162. Which of the following MUST be implemented to share metrics between routing protocols within
the same router?
Routing table
163. A NAC service has discovered a virus on a client laptop. In which of the following locations would
the NAC service place the laptop?
On the quarantine network
164. A technician is dispatched to investigate sporadic network outages. After looking at the event logs
of the network equipment, the technician finds that all of the equipment is restarting at the same time
every day. Which of the following can the technician deploy to correct this issue?
UPS
165. A network tech needs to connect two switches. The tech needs a link between them which is
capable of handling 10gb. What media would be optimal for this app? Fiber Optic cable
166. Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the
following is the cause of this issue?
RADIUS
167. A host has been assigned the address 169.254.0.1. This is an example of which of the following
address types?
APIPA
168. Which applies to data as it travels from Layer 1 to 7 of the OSI model?
De-encapsulation
169. An organization is moving to a new datacenter. During the move, several technicians raise concerns
about a system that could potentially remove oxygen from the server room and result in suffocation.
Which of the following systems are they MOST likely discussing?
Fire suppression
170. When troubleshooting a network problem, browsing through the log of a switch, it is discovered
that multiple frames contain errors. In which of the following layers does the problem reside? (Select
TWO).
A. Layer 2
E. Data link
171. What should be used to ensure a specific device always receives the same IP address?Reservation
172. Which of the following refers to a network that spans several buildings that are within walking
distance of each other? CAN
173. A technician is troubleshooting a wired device on the network. The technician notices that the link
light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device
connects successfully. Which of the following is causing this issue?
D. Bad wiring
174. A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
Baseline
175. While implementing wireless access points into the network, one building is having connectivity
issues due to light fixtures being replaced in the ceiling, while all other buildings’ connectivity is
performing as expected. Which of the following should be exchanged on the access points installed in
the building with connectivity issues?
Antenna
176. A network technician is attempting to connect a new host to existing manufacturing equipment on
an Ethernet network. The technician is having issues trying to establish communication between the old
equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable
in use is in perfect condition. Which of the following should the technician check to ensure the new host
will connect?
Confirm the new host is compatible with 10BaseT Ethernet
177. A tech has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In
order to conserve address space, which of the following subnet masks should be used for this subnet?
/30
178. Which of the following describes an IPv6 address of ::1?
B. Loopback
179. Which of the following is a security benefit gained from setting up a guest wireless network?
B. Isolated corporate resources
180. An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop
to the new user, the administrator documents the new location, the user of the device and when the
device was reassigned. Which of the following BEST describes these actions?
Asset management
181. A technician is configuring a managed switch and needs to enable 802.3af. Which of the following
should the technician enable?
A. PoE
182. Which of the following is used to classify network data for the purpose of providing QoS?
DSCP
183. The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which of
the following is a management control that should be implemented to ensure employees are using
encryption to transmit sensitive information?
Policies
184. An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST
likely mitigation for this reported item?
Ensure patches are deployed
185. Which of the following should current network performance be compared against to determine
network anomalies?
Baseline
186. An organization is in a civil court action and needs to ensure email messages are retained. What
describes the requirement to archive & retain email traffic & other correspondence?
Legal hold
187. A network technician must allow use of HTTP from the internet to an internal resource running
HTTP. This is an example of which of the following?
Port Forwarding
188. A network technician has just configured NAC for connections using Cat 6 cables. However, none of
the Windows clients can connect to the network. Which of the following components should the
technician check on the Windows PCs?Start the Wired AutoConfig service in the Services console
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
189. The backups server connects to a NAS device using block-level storage over Ethernet. The
performance is very slow, however, and the network technician suspects the performance issues are
network related. Which of the following should the technician do to improve performance?
C. Enable jumbo frames on the NAS and server
190. Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized
CIDR notation?
10.8.0.0/16
191. A network engineer needs to set up a topology that will not fail if there is an outage on a single
piece of the topology. However, the computers need to wait to talk on the network to avoid
congestions. Which of the following topologies would the engineer implement?
Ring
192. An engineer is reviewing the implementation requirements for an upcoming project. The basic
requirements identified by the customer include the following:
– WLAN architecture supporting speeds in excess of 150 Mbps – Clientless remote network access
– Port-based network access control. Which of the following solution sets properly addresses all
of the identified requirements?
802.11n, SSL-VPN, 802.1x
193. Users are reporting their network is slow. The tech discovers pings to external host have excessive
response times. However, internal pings to printers and other PCs have good response times. Which
steps should the tech take NEXT? Determine if any network equipment was replaced recently
194. Which of the following will negotiate standoff timers to allow multiple devices to communicate on
congested network segments?
A. CSMA/CD
195. A network tech observes multiple attempts to scan network hosts/devices. All the attempts
originate from a host on the network. Which of the following threats is involved?
Compromised
system
196. A company wants to make sure that users are required to authenticate prior to being allowed on
the network. Which of the following is the BEST way to accomplish this?
A. 802.1x
197. A system administrator has been tasked to ensure that the software team is not affecting the
production software when developing enhancements. The software that is being updated is on a very
short SDLC and enhancements must be developed rapidly. These enhancements must be approved
before being deployed. Which of the following will mitigate production outages before the
enhancements are deployed? Implement an environment to test the enhancements.
198. After repairing a computer infected with malware, a tech determines that the web browser fails to
go to the proper address for some sites. Which of the following should be checked?Local hosts file
199. A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has
been experiencing when uploading work to the internal FTP server. Which of the following default port
numbers should the technician set the analyzer to highlight when creating a report? 20 21
200. A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the
following steps of incident handling has been incorrectly performed? Chain of custody
201. A building is equipped with light sensors that turn off the fluorescent lights when natural light is
above a certain brightness. Users report experiencing connection issues only during certain hours. The
west side of the building experiences connectivity issues in the morning hours and the east side near the
end of the day. At night the connectivity issues affect the entire building. Which of the following could
be the cause of the connectivity issues? Network wiring is run perpendicular to electrical conduit
202. Which of the following is the number of broadcast domain that are created when using an
unmanaged 12-port switch?
1
203. A network technician is diligent about maintaining all system servers’ at the most current service
pack level available. After performing upgrades, users experience issues with server-based applications.
Which of the following should be used to prevent issues in the future? Configure a test lab for
updates
206. A network tech is using a network monitoring system and notices that every device on a particular
segment has lost connectivity. Which of the following should the network tech do NEXT?
Determine if anything has changed.
204. A desktop computer is connected to the network and receives an APIPA address but is unable to
reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet.
Which of the following is MOST likely the source of the problem?802.1q is not configured on
205. Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
206. A technician is configuring a computer lab at a school. The computers need to be able to
communicate with each other, but students using the computers should not be able to access the
internet. Which of the following rules on the firewall should the technician configure for the lab
computers?
C. Block all WAN to LAN traffic
207. Which of the following cloud infrastructure designs includes on premise servers utilizing a
centralized syslog server that is hosted at a third party organization for review?
A. Hybrid
208. The network admin is configuring a switch port for a file server with a dual NIC. The file server
needs to be configured for redundancy and both ports on the NIC need to be combined for max
throughput. Which of the following features on the switch should the network admin use?
LACP
209. A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has
caused the company’s encryption to become unsecure. Which of the following would be required to
resolve the exploit?
B. Install recommended updates
210. Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as
which of the following?
Bluejacking
211. A technician who is working with a junior member of the team is called away for another issue. The
junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will
MOST likely be an issue with the new cable?
Connector mismatch
212. A network tech has just installed a TFTP server on the admin segment of the network to store
router and switch configs. After a transfer attempt to the server is made, the process errors out. Which
of the following is a cause of the error? Port 69 is blocked on a router between the network segments
213. A network technician is performing a tracert command to troubleshoot a website-related issue. The
following output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.
The technician would like to see the results of the tracert command. Which of the following will allow
the technician to perform tracert on external sites but not allow outsiders to discover information from
inside the network? Configure the firewall to allow echo reply in and echo request out of the network
214. The process of attempting to exploit a weakness in a network after being given permission by the
company is known as:
penetration testing
215. What can be issued from the cmnd line to find the layer 3 hops to a remote destination?traceroute
216. A network tech is considering opening ports on the firewall for an upcoming VoIP PBX
implementation. Which of the following protocols is the tech MOST likely to consider?SIP/323/RTP
217. Which of the following would be the MOST efficient subnet mask for a point-to-point link? /31
218. A company has a network with three switches with eight ports. The switch is connected to a router
that has a hub with four PCs plugged into one of its interfaces. How many broadcast domains are
present in this company’s network
2
219. An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?
VLAN hopping
220. A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to
devices on the network. Which of the following should the technician check FIRST?
WAP placement
221. A tech is tasked with connecting a router to a DWDM. The tech connects the router to the
multiplexer and confirms that there is a good signal level. The interface on the router will not come up.
Which of the following is the cause? The wrong wavelength was demuxed from the multiplexer.
222. A tech needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if the
threat is network based?A host-based firewall which allows all outbound communication
223. An office network consists of one two-port router connected to a 12-port switch. A four-port hub is
also connected to the switch. On this particular network, which of the following is the number of
collision domain that exist?
D. 14
224. A technician is setting up a new network and wants to create redundant paths through the
network. Which of the following should be implemented to prevent performance degradation?
Spanning tree
225. While troubleshooting a network outage, a tech finds a 100-meter fiber cable with a small service
loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
Bend radius exceeded
226. A network tech has detected duplicate IP addresses on the network. After testing the behavior of
rogue DHCP servers, the tech believes that the issue is related to an unauthorized home router. Which
of the following should the tech do NEXT in the t’shooting methodology?Establish a plan to locate the
rogue DHCP server.
227. A tech is setting up a computer lab. Computers on the same subnet need to communicate with
each other using P2P communication. Which would the tech MOST likely configure?
Software
firewall
228. While troubleshooting, a tech notices that some clients using FTP still work and that pings to the
local router and servers are working. The tech tries to ping all known nodes on the network and they
reply positively, except for one. The tech notices that ping works only when the host name is used but
not when FQDN is used. Which server is MOST likely down?
DNS server
229. The admin’s network has OSPF for the internal routing protocol. One port going out to the Internet
is congested. The data is going out to the Internet, but queues up before sending. Which of the following
would resolve this issue?
Fast Ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors
983881
packets output, 768588 bytes 0 output errors, 0 collisions, 0 resets
Change duplex to full
230. In a service provider network, a company has an existing IP address scheme. Company A’s network
currently uses the following scheme: Company B uses the following scheme: Subnet 1: 192.168.1.50/28
The network admin cannot force the customer to update its IP scheme. Considering this, which of the
following is the BEST way for the company to connect these networks?
NAT
231. A network tech is troubleshooting an end-user connectivity problem. The network tech goes to the
appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the
following should the network technician use to help identify the cable?
Tone generator
232. Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any
response from the server. Which of the following is the BEST explanation that describes this scenario?
Compromised system
233. Which of the following describes an area containing a rack that is used to connect customer
equipment to a ISP?
MDF
234. Which of the following protocols must be implemented in order for 2 switches to share VLAN
information? VTP
235. A technician is troubleshooting a client’s connection to a wireless network. The client is asked to
run a “getinfo” command to list information about the existing condition.
myClient$ wificard –getinfo agrCtlRSSI:-72 agrExtRSSI:0 state:running
op mode: station lastTxRate:178 MaxRate:300
802.11 auth:open link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless Channel:149,1
Given this output, which of the following has the technician learned about the wireless network? (Select
C. The WAP is using AES encryption
The WAP is using the 5GHz channel
236. A T1 line has lost connectivity to the ISP. The ISP has instructed the tech to place a loopback on a
device connecting the T1 line to their office. On which of the following devices will the tech implement
the loopback?
Channel service unit
237. A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear user,
please click the following link to get your free smart phone
http://www.freesmartphone.it:8080/survey.php
Which of of the following should the administrator do to prevent all employees from accessing the link
in the above email, while still allowing Internet access to the freesmartphone.it domain?
Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
238. A network tech has been assigned to install an additional router on a wireless network. The router
has a different SSID and frequency. All users on the new access point and the main network can ping
each other and utilize the network printer, but all users on the new router cannot get to the Internet.
What is the MOST likely cause of this issue? gateway is misconfigured on the new router.
239. A network technician must utilize multimode fiber to uplink a new networking device. Which of the
following Ethernet standards could the technician utilize? 1000Base-SR
10GBase-SR
240. A tech needs to troubleshoot a recently installed NIC. He decides to ping the local loopback. Which
of the following is a valid IPv4 loopback address?
127.0.0.1
241. A training class is being held in an auditorium. Hard-wired connections are required for all laptops
that will be used. The network tech must add a switch to the room through which the laptops will
connect for full network access. Which of the following must the tech configure on a switch port, for
both switches, in order to create this setup?
TRUNK
242. Which of the following is a system of notation that uses base 16 rather than base 10?
243.area where access is controlled by retina scan is protected by what security measure
type?Biometric
Hex
244. A network tech is assisting the team with some traffic captures. The team wants to capture all
traffic on a single subnet between the router and the core switch. To do so, the team must ensure there
is only a single collision and broadcast domain between the router and the switch from which they will
collect traffic. What should the tech install to BEST meet the goal? Hub
245. When enabling jumbo frames on a network device, what parameter is being adjusted?MTU
246. A network tech has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be
configured on each network device to provide that information in a secure manner?
SNMPv3
247. A company finds that many desktops are being reported as missing or lost. Which of the following
would BEST assist in recovering these devices?
Computer locks
248. It has been determined by network operations that there is a severe bottleneck on the company’s
mesh topology network. The field technician has chosen to use log management and found that one
router is making routing decisions slower than others on the network. This is an example of which of the
following?
Network device CPU issues
249. An admin only has telnet access to a remote workstation. Which of the following utilities will
identify if the workstation uses DHCP?
ipconfig
250. A company has had several virus infections over the past few months. The infections were caused
by vulnerabilities in the application versions that are being used. Which of the following should an
admin implement to prevent future outbreaks? Patch management
251. Which of the protocols uses label-switching routers and label-edge routers to forward traffic?
MPLS
252. A tech needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted? TEMPEST
253. Network segmentation provides which of the following benefits?
Security through isolation
254. Which of the following communication technologies is used by video conferencing systems to sync
video streams, reduce bandwidth, sent by a central location to subscribed devices?
Multicast
255. An administrator's network has OSPF for the internal routing protocol and has two interfaces that
continue to flap. The administrator reviews the following output:
Fast ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Full duplex, 100Mb/s, 100Base Tx/Fx Received 1052993 broadcasts
1258 input errors
983881 packet output, 768588 bytes 1747 output errors, 0 collisions, 423 resets
Which of the following problems would cause the interface flap?
Duplex
mismatch
256. A network tech needs to separate a web server listening on port 80 from the internal LAN and
secure the server from the public Internet. The web server should be accessible to the public Internet
over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall
using the following IP addressing scheme on each interface:
Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over
port 80 designated to the web server
257. A network admin configures an email server to use secure protocols. When the upgrade is
completed, which of the following ports on the firewall should be configured to allow for connectivity?
TCP 587
TCP 993
TCP 995
258. Which of the following BEST describes the process of documenting everyone who has physical
access or possession of evidenceChain of custody
259. A network tech configures a firewall’s ACL to allow outgoing traffic for several popular services such
as email and web browsing. users are still unable to retrieve their emails. Which of the following would
BEST resolve this issue?Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
260. While troubleshooting a connectivity issue, a network tech determines the IP address of a number
of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the
following should the tech check to resolve the problem? DHCP server
261. After a recent breach, the security technician decides the company needs to analyze and aggregate
its security logs. Which of the following systems should be used?
C. SIEM
262. A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A tech notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ.
Reordering the ACL in which of the following manners would meet the company’s objectives?
11, 10, 12, 13
Allow 200, Deny, Allow 10, Deny
263. A network tech needs to monitor the network to find a user that is browsing inappropriate sites.
Which of the following would the tech use to view the site and find the user browsing it?packet sniffer
264. A client is receiving certificate errors in other languages when trying to access the company’s main
intranet site. Which of the following is MOST likely the cause?
Man-in-the-middle
265. A customer has engaged a company to improve the availability of all of the customer’s services and
applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the
following will document the scope of the activities the company will provide to the customer, including
the intended outcomes?
SOW
266. A tech installs a new WAP and users in the area begin to report poor performance. The technician
uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond.
Which tool should be used to discover the cause?
Spectrum Analyzer tool
267. A network tech needs to set up 2 public facing servers & wants to ensure that if they are
compromised the intruder can’t access the intranet. What security tech’s should be used?
Place them in the demilitarized zone
268. Which of the following WAN technologies is associated with high latency?
Satellite
269. A user calls the help desk and states that he was working on a spreadsheet and was unable to print
it. However, his colleagues are able to print their documents to the same shared printer. Which should
be the FIRST question asked? Is the user able to access any network resources?
270. A network admin is following best practices to implement firewalls, patch management and policies
on the network. Which of the following should be performed to verify the security controls in place?
Penetration testing
271. A company is having a new T1 line installed. Which of the following will the connection MOST likely
terminate to?
MDF
272. A typical cell tower will have microwave and cellular antennas. Which of the following network
topologies do these represent? C. Point-to-point
D. Mesh
273. Which of the following types of network would be set up in an office so that customers could
access the Internet but not be given access to internal resources such as printers & servers?
Guest
network
274. Which of the following is a document that is used in cyber forensics that lists everywhere evidence
has been?
C. Chain of custody
275. A company has just implemented VoIP. Prior to the implementation, all of the switches were
upgraded to layer 3 capable in order to more adequately route packages. This is an example of which of
the following network segmentation techniques?
D. Performance optimization
276. Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
C. Analog modem
277. Which of the following default ports is associated with protocols that are connectionless?
2427
278. A technician configures a firewall in the following manner in order to allow HTTP traffic.
Source IPZone: Any Untrust
Dest IPZone: Any DMZ
Port: 80
Action: Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic
from traversing the firewall?
D. Application aware firewall
279. A client reports that half of the marketing department is unable to access network resources. The
technician determines that the switch has failed and needs to replace it. Which of the following would
be the MOST helpful in regaining connectivity?
C. Configuration backup
280. Which of the following is a connectionless protocol?ICMP UDP
281. A PC tech has installed a new network printer that was preconfigured with the correct static IP
address, subnet mask, and default gateway. The printer was installed with a new cable and appears to
have link activity, but the printer will not respond to any network communication attempts. Which of
the following is MOST likely the cause of the problem? Incorrect VLAN assignment
282. A wireless network tech for a local retail store is installing encrypted access points within the store
for real-time inventory verification, as well as remote price checking capabilities, while employees are
away from the registers. The store is in a strip mall that has neighbors allowing guest access to the
wireless. Which of the following is the BEST security method to implement on the APs?MAC filtering
283. A tech is installing a surveillance system for a home network. The tech is unsure which ports need
to be opened to allow remote access to the system. Which of the following should the tech perform?
Add the system to the DMZ
284. Upon arrival at work, an admin is informed that network users cannot access the file server. The
admin logs onto the server and sees the updates were automatically installed and the network
connection shows limited and no availability. Which of the following needs to be rolled back?
server’s NIC drivers
285. Before logging into the company network, users are required to sign a document that is to be
stored in their personnel file. This standards and policies document is usually called which of the
following? AUP
286. A network admin noticed that when one computer goes down, all the other computers in the office
will not work. Which of the following topologies is in use? Bus
287. Jane is preparing to configure a company’s network. She has installed a firewall to allow for an
internal DMZ and external network. No hosts on the internal network should be directly accessible by IP
address from the internet, but they should be able to communicate with remote networks after
receiving a proper IP address. What addressing scheme will work in this situation?
Private
288. A network engineer is designing a new IDF in an old building. The engineer determines the
equipment will fit in a two-post rack, and there is power available for this equipment. Which of the
following would be the FIRST issue to remediate?
A. Air flow and cooling
289. Which of the following broadband WAN technologies would MOST likely be used to connect several
remote branches that have no fiber or satellite connections?
B. POTS
290. An additional network segment is urgently needed for QA testing on the external network. A
software release could be impacted id this change is not immediate. The request come directly from
management, and there is no time to go through the emergency change control process. Given this
scenario, which of the following is the BEST course of action for the network administrator to take?
D. Make the change, noting the requester, and document all network changes
291. The CIO of an org is concerned that the current locally-hosted, software threat solution is not. The
CIO points to examples of 0-day threats that have recently taken a day or more to receive patches.
Which of the following solutions would have the BEST chance of meeting these goals? Stateful firewall
292. A network tech receives a spool of Cat 6a cable and is asked to build several cables for a new set of
Ethernet runs between devices. What tools are needed? Wire stripper Crimper RJ-45 connectors
293. A network admin has created a virtual machine in the cloud. The tech would like to connect to the
server remotely using RDP. Which of the following default ports needs to be opened? 3389
294. The CIO has noticed the corporate wireless signal is available in the parking lot. Management
requests that the wireless be changed so it is no longer accessible in public areas, without affecting the
availability inside the building. Which of the following should be changed on the network?Power levels
295. A network tech has detected a personal computer that has been physically connected to the
corporate network. Which of the following commands would the network technician use to locate this
unauthorized computer and determine the interface it is connected to?
show mac address-table
296. A network tech discovers an issue with spanning tree on the core switch. What troubleshooting
steps should the network tech perform NEXT to resolve the issue?Establish a theory of probable cause
297. A network tech wants to remotely and securely access the desktop of a Linux workstation. The
desktop is running remote control software without encryption. Which of the following should the
technician use to secure the connection?
SSH in tunnel mode
298. A tech has determined the most likely cause of an issue and implement a solution. Which of the
following is the NEXT step that should be taken?
Verify system functionality
299. A company is implementing enhanced user authentication for system admin accessing the
company’s confidential servers. Which of the following would be the BEST example of two-factor
authentication?
Password and key fob
300. A network tech notices the site-to-site VPN and Internet connection have not come back up at a
branch office after a recent power outage. Which of the following is an out-of-band method the tech
would utilize to check the office’s router status?
Use a modem to console into the router
301. A technician is concerned about security and is asked to set up a network management protocol.
Which of the following is the best option?
B. SNMPv3
302. A network technician is tasked with designing a firewall to improve security for an existing FTP
server that is on the company network and is accessible from the internet. The security concern is that
the FTP server is compromised it may be used as a platform to attack other company servers. Which of
the following is the BEST way to mitigate this risk?
Move the server to the DMZ of the firewall
303. A company that was previously running on a wired network is performing office-wide upgrades. A
department with older desktop PC’s that do not have wireless capabilities must be migrated to the new
network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are
available, which of the following network devices should a network technician use to connect all the
devices to the wireless network?
D. Wireless router
304. Which of the following helps prevent routing loops?
D. Split horizon
305. The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused
by the disruption of service?
A. Layer 3 switch
306. An F-connector is used on which of the following types of cabling?
D. RG6
307. A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?
C. SNMPv3
308. A network administrator would like to collect information from several networking devices using
SNMP. Which of the following SNMP options should a network administrator use to ensure the data
transferred is confidential?
A. authpriv
309. The security manager reports that individual systems involved in policy or security violations or
incidents cannot be located quickly. The security manager notices the hostnames all appear to be
randomly generated characters. Which of the following would BEST assist the security manager
identifying systems involved in security incidents?
B. Implement a standardized UNC
310. A network administrator receives a call asking for assistance with connecting to the network. The
user asks for the IP address, subnet class, and VLAN required to access the network. This describes
which of the following attacks?
A. Social engineering
311. A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a username and password for security. Several vendors
have discovered a virus in one of the security updates. The company tested all files before uploading
them but retested the file and found the virus. Which of the following could the tech do for vendors to
validate the proper security patch?
Provide an MD5 hash for each file
312. Which of the following types of equipment should be used for telecommunications equipment and
have an open design?
A. 2/4 post racks
313. Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at diff
wavelengths?DWDM
314. A network tech has just received an email regarding a security issue detected on the company’s
standard web browser. Which of the following will MOST likely fix the issue?
Vulnerability patch
315. An attack where the potential intruder tricks a user into providing sensitive information is known as
which of the following?
A. Social engineering
316. Client PCs are unable to receive addressing information from a newly configured interface on a
router. Which of the following should be added to allow the clients to connect?
B. IP helper
317. A network technician receives a call from a use who is experiencing network connectivity issues.
The network technician questions the user and learns the user brought in a personal wired router to use
multiple computers and connect to the network. Which of the following has the user MOST likely
introduced to the network?
A. Rogue DHCP server
318. Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet
Registry (RIR) are known as which of the following?
B. Autonomous system number
319. Company policies require that all network infrastructure devices send system level information to a
centralized server. Which of the following should be implemented to ensure the network administrator
can review device error information from one central location?
C. SYSLOG server
320. A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering.
However, the network administrator still wants to be able to control some parts of the cloud service’s
networking components. Which of the following should be leveraged to complete this task? PaaS
321. A disgruntled employee executes a MitM attack on the company network. Layer 2 traffic destined
for the gateway is redirected to the employee’s computer. This type of attack is an ARP cache poisoning
322. A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of
auto-sensing ports, which of the following cables should be used?
D. Crossover
323. Which of the following is an example of an IPv4 address?
B. 192.168.1.254
324. There has been an increased amount of successful social engineering attacks at a corporate office.
Which of the following will reduce this attack in the near future?
C. User awareness training
325. A network engineer is conducting an assessment for a customer that wants to implement an
802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is
important to reference which of the following?
B. Site survey
326. Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO)
D. Spanning tree
E. 802.1d
327. A network tech is asked to redesign an network before new monitoring software is added to each
host on the network. The new software will broadcast stats from each host to a monitoring host for
each of the five depts in the company. The added network traffic must be addressed. Which of the
following solutions should the tech design into the new network?Place each department in a separate
VLAN
328. A network technician receives the following alert from a network device: “High utilizations
threshold exceeded on gi1/0/24 : current value 9413587.54” Which of the following is being monitored
to trigger the alarm?
E. Interface link status
329. A company plan established to resume normal system operations following a disruption in business
would be described as which of the following?
D. Business continuity
330. Which of the following network topologies has a central, single point of failure?
B. Star
331. A network technician has been asked to make the connections necessary to add video transported
via fiber optics to the LAN within a building. Which of the following is the MOST common connector that
will be used on the switch to connect the media converter?
D. ST
332. A company owns 4 kiosks that are in close proximity within a shopping center. The owner is
concerned about someone accessing the internet via the kiosk’s wireless. Which of the following should
be implemented to provide wireless access to the employees working at kiosk?
MAC filtering
333. After the A record of a public website was updates, some visitors were unable to access the
website. Which of the following should be adjusted to address the issue?
A. TTL
334. A network technician needs to correlate security events to analyze a suspected intrusion. Which of
the following should the technician use?
D. SIEM
335. A network engineer configured new firewalls with the correct configuration to be deployed to each
remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which
of the following should the network engineer perform NEXT to ensure all the firewalls are hardened
successfully?
C. Update the firewalls with current firmware and software
336. A network technician has multimode fiber optic cable available in an existing IDF. Which of the
following Ethernet standards should the technician use to connect the network switch to the existing
fiber?
A. 10GBaseT
337. An attacker is attempting to find the password to a network by inputting common words and
phrases in plaintext to the password prompt. Which of the following attack types BEST describes this
action?
D. Dictionary attack
338. A network technician is observing the behavior of an unmanaged switch when a new device is
added to the network and transmits data. Which of the following BEST describes how the switch
processes this information? The data is flooded out of every port but only in the VLAN where it’s
located
339. Which would MOST likely be used to review previous upgrades to a system?
management
change
340. A corporation has a critical system that would cause unrecoverable damage to the brand if it was
taken offline. Which disaster recovery solutions should the corp implement?
Hot site
341. An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices
on both ends of the connection are configured for half duplex. Which of the following is the most likely
cause of this issue?
C. The cable length is excessive
342. A network technician is investigating an issue with a desktop that is not connecting to the network.
The desktop was connecting successfully the previous day, and no changes were made to the
environment. The technician locates the switchport where the device is connected and observes the LED
status light on the switchport is not lit even though the desktop is turned on Other devices that arc
plugged into the switch are connecting to the network successfully Which of the following is MOST likely
the cause of the desktop not connecting?
C. Port security
343. A network device is configured to send critical events to a syslog server; however, the following
alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity
5LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why
the events are not being received? A. network device isn’t configured to log that level to syslog server
344. A lab environment hosts Internet-facing web servers and other experimental machines, which
technicians use for various tasks A technician installs software on one of the web servers to allow
communication to the company's file server, but it is unable to connect to it Other machines in the
building are able to retrieve files from the file server. Which of the following is the MOST likely reason
the web server cannot retrieve the files, and what should be done to resolve the problem?
B. The lab environment is located in the DM2, and traffic to the LAN zone is denied by default
345. A company wants to implement a large number of WAPs throughout its building and allow users to
be able to move around the building without dropping their connections Which of the following pieces
of equipment would be able to handle this requirement?
A. A VPN concentrator
356. Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
B. A duplication of a hosted virtual server to another physical server for redundancy
347. A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise
building. Several APs are mounted in this office. The users report that the network connections
frequently disconnect and reconnect throughout the day. Whichof the following is the MOST likely
cause of this issue?
B. EIRP needs to be boosted
348. There are two managed legacy switches running that cannot be replaced or upgraded. These
switches do not support cryptographic functions, but they are password protected. Which of the
following should a network administrator configure to BEST prevent unauthorized access?
A. Enable a management access list
349. A small business uses a single SOHO router to provide Internet/WiFi to its employees At the start of
a new week, employees come in and find their usual WiFi network is no longer available, and there is a
new wireless network to which they can’t connect. Given that information, which of the following
should have been done to avoid this situation' The device firmware should have been kept current.
350. A tech is troubleshooting a workstation's connectivity and wants to confirm which switchport
corresponds to the wall jack the PC is using Which of the following concepts would BEST help the tech?
Consistent labeling
351. A network administrator is installing a wireless network at a client’s office. Which of the following
IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?
A. CDMA
352. A technician is installing multiple UPS units in a major retail store. The technician is required to
keep track of all changes to new and old equipment. Which of the following will allow the technician to
record these changes?
A. Asset tags
353. Within the realm of network security, Zero Trust: block malicious software that is too new to be
found in virus definitions
354. Which of the following connector types would have the MOST flexibility?
A. SFP
355. A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which
of the following concepts is this technique MOST closely associated?
D. Honeypot
356. A technician wants to install a WAP in the center of a room that provides service in a radius
surrounding a radio. Which of the following antenna types should the AP utilize?
A. Omni
357. What is used to prioritize usage /application & /user on the network? Bandwidth management
358. Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest
network are able to access all network resources without any performance issues. The following table
summarizes the findings after a site survey of the area in question: Which of the following should a
wireless technician do NEXT to troubleshoot this issue? A. Reconfigure the channels to reduce overlap
359. A tech is deploying a low-density wireless network and is contending with multiple types of building
materials. Which of the following w’less frequencies would allow for the LEAST signal attenuation? 5GHz
360. A website administrator is concerned the company’s static website could be defaced by hacktivists
or used as a pivot point to attack internal systems. Which of the following should a network security
administrator recommend to assist with detecting these activities?
C. Use SSL encryption.
361. A network engineer is investigating reports of poor network performance. Upon reviewing a device
configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the
following would be the MOST likely result of this finding?
A. Increased CRC errors
362. Which of the following service models would MOST likely be used to replace on-premises servers
with a cloud solution?
B. IaaS
363. A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout
a three-story office building. All the APs will broadcast the same SSID for client access. Which of the
following BEST describes this deployment?
A. Extended service set
364. A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a
strong signal when walking 20ft in the opposite direction The technician has reviewed the configuration
and confirmed the channel type is correct There is no jitter or latency on the connection Which of the
following would be the MOST likely cause of the issue?
A. Antenna type
365. A network admin has been directed to present the network alerts from the past week to the
company's executive staff. Which of the following is collection and presentation of this data?
A report from the SIEM tool
366. Access to a datacenter should be individually recorded by a card reader even when multiple
employees enter the facility at the same time. Which of the following allows the enforcement of this
policy?
Access control vestibules
367. A network admin is downloading a large patch that will be uploaded to several enterprise switches
simultaneously during the day's upgrade cycle. Which of the following should the admin do to help
ensure the upgrade process will be less likely to cause problems with the switches?
C. Download each switch's current configuration before the upgrade
368. A fiber link connecting two campus networks is broken. Which of the following tools should an
engineer use to detect the exact break point of the fiber link?
A. OTDR
369. A network administrator is designing a new datacenter in a different region that will need to
communicate to the old datacenter with a secure connection. Which of the following access methods
would provide the BEST security for this new datacenter?
D. Site-to-site VPN
370. A network administrator is implementing OSPF on all of a company’s network devices. Which of the
following will MOST likely replace all the company’s hubs?
A. A Layer 3 switch
371. Which of the following can be used to centrally manage credentials for various types of
administrative privileges on configured network devices?
B. TACACS+
372. A network technician is investigating an IP phone that does not register in the VoIP system
Although it received an IP address, it did not receive the necessary DHCP options The information that is
needed for the registration is distributes by the OHCP scope All other IP phones are working properly.
Which of the following does the technician need to verify?
A. VLAN mismatch
373. A network technician is installing an analog desk phone for a new receptionist After running a new
phone line, the technician now needs to cnmp on a new connector. Which of the following connectors
would MOST likely be used in this case?
A. DB9
374. A workstation is configured with the following network details: Software on the workstation needs
to send a query to the local subnet broadcast address. To which of the following addresses should the
software be configured to send the query?
E. 10.1.2.31
375. A network engineer is designing a new secure wireless network. The engineer has been given the
following requirements: * 1 Must not use plaintext passwords * 2 Must be certificate based * 3. Must be
vendor neutral Which of the following methods should the engineer select?
C. EAP-TLS
376. Which of the following security devices would be used to provide mechanical access control to the
MDF/IDF?
B. A key fob
377. During the security audit of a financial firm the (CEO) questions why there are 3 employees who
perform very distinct functions on the server. There is an administrator for creating users another for
assigning the users lo groups & a third who is the only administrator to perform file rights assignment
Which of the following mitigation techniques is being applied'
Role separation
378. Which of the following policies is MOST commonly used for guest captive portals?
379. Which of the following devices would be used to manage a corporate WLAN?
controller
A. AUP
wireless
380. A network tech needs to ensure outside users are unable to telnet into any of the servers at the
datacenter. Which of the following ports should be blocked when checking firewall configuration? 23
382. A network technician is installing new software on a Windows-based server in a different location.
Which of the following would be BEST for the technician to use to perform this task?
RDP
383. A customer wants to segregate the traffic between guests on a hypervisor. Which of the following
does a technician need to configure to meet the requirement?
A. Virtual switches
384. A firewall admin is implementing a rule that directs HTTP traffic to an internal server listening on a
non-standard socket Which of the following types of rules is the admin implementing? D. SNAT
385. A technician is deploying a new switch model and would like to add it to the existing network
monitoring software. The technician wants to know what metrics can be gathered from a given switch.
Which of the following should the technician utilize for the switch?
A. MIB
386. An ITdirector is setting up new disaster and HA policies for a company. Limited downtime is critical
to operations. To meet corporate reqs, the director set up two different datacenters across the country
that will stay current on data & applications.In the event of an outage, the company can immediately
switch from one center to another. Which of the following does this BEST describe?
hot site
387. An IDS was installed behind the edge firewall after a network was breached. The network was then
breached again even though the IDS logged the attack. Which of the following should be used in place of
these devices to prevent future attacks?
C. A UTM appliance
388. The following configuration is applied to a DHCP server connected to a VPNconcentrator:
IP Address: 10.0.0.1
Subnet Mask: 255.255.255.0
Gateway: 10.0.0.254
There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and
252 of these representatives are able to connect to the VPN without any Issues. The remaining sales
representatives cannot connect tothe VPN over the course of the day. Which of the following can be
done to resolve the issue without utilizing additional resources?
A. Decrease the lease duration
389. Which of the following systems would MOST likely be found in a screened subnet?
B. FTP
390. An ARP request is broadcasted & sends the following request. ''Who is 192.168.1.200? Tell
192.168.1.55'' At which of the following layers of the OSI model does this request operate?
Data link
391. A city has hired a new employee who needs to be able to work when traveling at home and at the
municipal sourcing of a neighboring city that shares services. The employee is issued a laptop, and a
technician needs to train the employee on the appropriate solutions for secure access to the network
from all the possible locations On which of the following solutions would the technician MOST likely
train the employee?
Site-to-site VPNs between the two city locations and client-to-site software on
the employee's laptop tor all other remote access
391. Which of the following DNS records works as an alias to another record?
B. CNAME
392. A network admin is setting up several loT devices on a new VLAN and wants to accomplish the
following * 1. Reduce manual configuration on each system * 2. Assign a specific IP address to each
system * 3. Allow devices to move to different switchports on the same VLAN Which of the following
should the network admin do to accomplish these reqs? Implement private VLANs for each device
393. A network technician is reviewing an upcoming project's requirements to implement laaS. Which of
the following should the technician consider?
D. Server hardware requirements
394. Which of the following is a system that is installed directly on a server's hardware and abstracts the
hardware from any guest machines?
A. Storage array
395. A network engineer is investigating reports of poor network performance. Upon reviewing a report,
the engineer finds that jitter at the office is greater than 10ms on the only WANconnection available.
Which of the following would be MOST affected by this statistic?
A. A VoIP call with a customer
396. A network administrator wants to improve the security of the management console on the
company's switches and ensure configuration changes made can be correlated to the administrator who
conformed them Which of the following should the network administrator implement?
C. TACACS+
397. A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but
gets the following response: U.U.U.U. Which of the following needs to be configured for these networks
to reach each other?
B. Default gateway
398. The management team needs to ensure unnecessary modifications to the corporate network are
not permitted and version control is maintained. Which of the following documents would BEST support
this? a change management policy
399. A tech is troubleshooting a network switch that seems to stop responding to requests
intermittently whenever the logging level is set for debugging. Which of the following metrics should the
technician check to begin troubleshooting the issue?
CPU utilization
400. Which of the following provides redundancy on a file server to ensure the server is still connected
to a LAN even in the event of a port failure on a switch?
NIC teaming
401. The network admin is informed that a user’s email password is frequently hacked by brute-force
programs. Which of the following policies should the admin implements to BEST mitigate this issue? 2factor authentication
Complex passwords
402. Which of the following ports is commonly used by VoIP phones?
D. 5060
403. At which of the following OSI model layers would a technician find an IP header? Layer 3
404. An engineer is configuring redundant network links between switches. Which of thefollowing
should the engineer enable to prevent network stability issues?
STP
405. A tech is connecting multiple switches to create a large network for a new office. The switches are
unmanaged Layer 2 switches with multi connections between each pair. The network is experiencing an
extreme amt of latency. Which of the following is MOST likely occurring?
broadcast storm
406. A tech is writing documentation regarding a company’s server farm. The tech needs to confirm the
server name for all Linux servers. Which of the following commands should the tech run?
nslookup
407. Which of the following routing protocols is used to exchange route information between public
autonomous systems?
B. BGP
408. Which of the following types of devices can provide content filtering and threat protection, and
manage multiple IPSec site-to-site connections?
Next-generation firewall
409. An org wants to implement a method of centrally managing logins to services. Which of the
following protocols should the org use to allow for authentication, authorization and auditing? MS-CHAP
410. A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and
dropped conversations The manufacturer says the system will work if ping times are less than 50ms. The
company has recorded the following ping times:
Attenuation
411. An IT organization needs to optimize speeds for global content distribution and wants to reduce
latency in high-density user locations. Which of the following technologies BEST meets the
organization’s requirements?
Content delivery network
412. A store owner would like to have secure wireless access available for both business equipment and
patron use. Which of the following features should be configured to allow different wireless access
through the same equipment?
D. SSID
413. A network tech was troubleshooting an issue for a user who was being directed to cloned websites
that were stealing creds. The URLs were correct for the sites but an incorrect IP address was revealed
when the tech used ping on the user's PC After checking the is setting, the tech found the DNS server
address was incorrect Which of the following describes the issue?
Exhausted IP scope
414. An org with one core and five distribution switches is transitioning from a star to a full-mesh
topology Which of the following is the number of addtl network connections needed? 5
415. A network admin discovers that users in an adjacent building are connecting to the company’s
guest wireless network to download inappropriate material. Which of the following can the
administrator do to MOST easily mitigate this issue?
Reduce the wireless power levels
416. Which of the following protocol types describes secure communication on port 443?
TCP
417. A network technician is reviewing the interface counters on a router interface. The technician is
attempting to confirm a cable issue. Given the following information: Which of the following metrics
confirms there is a cabling issue?
C. CRCs
418. Which of the following TCP ports is used by the Windows OS for file sharing?
445
419. Which of the following factors should be considered when evaluating a firewall to protect a
center’s east-west traffic?
Replication traffic between an on-premises server and a remote
backup facility
420. A technician needs to configure a Linux computer for network monitoring. The technician has the
following information: Linux computer details: Switch mirror port details: After connecting the Linux
computer to the mirror port on the switch, which of the following commands should the technician run
on the Linux computer?
A. ifconfig ecth0 promisc
421. A branch of a company recently switched to a new ISP. The network engineer was given a new IP
range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following
configurations on the interface that peers to the ISP: The network engineer observes that all users have
lost Internet connectivity. What describes the issue?
The incorrect subnet mask was configured
422. A technician is troubleshooting a previously encountered issue. Which of the following should the
technician reference to find what solution was implemented to resolve the issue? SOPs
423. A network field tech is installing & configuring a wireless network. The technician performs a site
survey. Which of the following docs would MOST likely be created as a result? Heat map
424. A network administrator needs to query the NSs for a remote application. Which of the following
commands would BEST help the administrator accomplish this task?
A. dig
425. A technician is assisting a user who cannot connect to a network resource. The tech first checks for
a link light. According to t’shooting methodology, this is an ex of: questioning the obvious.
426. A systems admin is running a VoIP network & is experiencing jitter and high latency. Which of the
following would help the admin determine cause of these issues? Configuring SNMP traps on network
427. After a firewall replacement, some alarms and metrics related to network availability stopped
updating on a monitoring system relying on SNMP. Which of the following should the network admin do
FIRST?
A. Modify device's MIB on monitoring system.
428. Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs
to access network shares at the other site. Which of the following will BEST provide this functionality?
Site-to-site VPN
429. OSI model layer where convos between apps are established/coordinated/terminated? Session
430. Which of the following is required when connecting an endpoint device with an RJ45 port to a
network device with an ST port?
A. a media converter
431. The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of
the following procedures would meet the policy's reqs?
Recover all systems within 48 hours
432. A network administrator wants to analyze attacks directed toward the company's network. Which
of the following must the network administrator implement to assist in this goal? honeypot
433. Which of the following cable types would be used to provide high-speed network? Fiber
434. A (CIO) wants to improve the availability of a company's SQL database Which of the following
technologies should be utilized to achieve maximum availability? NIC teaming
435. A technician is implementing a new wireless network to serve guests at a local office. The network
needs to provide Internet access but disallow associated stations from communicating with each other.
Which of the following would BEST accomplish this requirement?
Wireless client isolation
436. Which of the following VPN configs should be used to separate Internet and corp traffic?Splittunnel
437. A network admin is required to ensure that auditors have read-only access to the system logs,
while systems administrators have read and write access to the system logs, and operators have no
access to the system logs. The network admin has configured security groups for each of these
functional categories. Which of the following security capabilities will allow the network administrator
to maintain these permissions with the LEAST administrative effort? Role-base access
438. A local firm has hired a consulting company to clean up its IT infrastructure. The consulting
company notices remote printing is accomplished by port forwarding via publicly accessible IPs through
the firm's firewall Which of the following would be the MOST appro way to enable secure remote
printing?
SSH
439. A user recently made changes to a PC that caused it to be unable to access websites by both FQDN
and IP Local resources, such as the file server remain accessible. Which of the following settings did the
user MOST likely misconfigure?
default gateway
440. A business is using the local cable co to provide Internet access. Which of the following types of
cabling will the cable co MOST likely use from the demarcation point back to the central office? RG-6
441. A network admin is talking to vendors about acquiring tech to support a new project for a large
company. Which of the following docs will need to be signed before info is shared?
SLA
442. A tech is connecting DSL for a new customer. After installing and connecting the on-premises
equipment, the technician verifies DSL synchronization. When connecting to a workstation, however,
the link LEDs on the workstation and modem do not light up. Which of the following should the
technician perform during troubleshooting?
Replace the cable connecting the modem & the
workstation
443. Which of the following is an advanced distance vector routing protocol that automates routing
tables and also uses some features of link-state routing protocols?
EIGRP
444. A tech removes an old PC from the network and replaces it with a new PC that is unable to connect
to the LAN. Which of the following is MOST likely the cause of the issue? Port security
445. An ISP is providing Internet to a retail store and has terminated its point of connection using a
standard Cat 6 pin-out Which of me following terminations should the technician use when running a
cable from the ISP's port to the front desk?
B. TIA-56S-B
446. During the troubleshooting of an E1 line, the P2P link on the core router was accidentally
unplugged and left unconnected for several hrs. However, the management team was not notified.
Which of the following could have been configured to allow early detection and possible resolution of
the issue? Traps
447. A network tech is hired to review all the devices within a network and make recommendations to
improve network efficiency. Which of the following should the technician do FIRST before reviewing and
making any recommendations?
Capture network baseline
448. Which of the following types of connections would need to be set up to provide access from the
internal network to an external network so multiple satellite offices can communicate securely using
various ports and protocols?
Site-to-site VPN
468. A network tech recently installed 35 add’l PCs. After installation, some users are unable to access
resources. Many of the original PCs that are experiencing the network access issue were offline when
the new PCs were turned on. Which of the following is the cause of this issue? Insufficient DHCP scope
449. A new office space is being designed. The network switches are up. but no services are running yet
A network engineer plugs in a laptop configured as a DHCP client to a switch Which ol the following IP
addresses should be assigned to the laptop?
B. 169.254.1.128
450. A tech is installing the Wi-Fi infrastructure for legacy industrial machinery at a warehouse. The
equipment only supports 802.11a and 802.11b standards. Speed of transmission is the top business
requirement. Which of the following is the correct maximum speed for this scenario?
54 Mbps
451. A medical building offers WiFi in the waiting room. Which of the following security features would
be the BEST solution to provide connections & keep the data protected? Isolating the guest network
452. A company is deploying a SAN at HQ and a branch 1, 000ml away that w« access small amounts of
data. Which of the types of connections would be MOST cost effective to implement? ISCSI
453. Which of the following is a valid and cost-effective solution to connect a fiber cable into a network
switch without available SFP ports?
A. Use a media converter & a UTP cable
454. A network technician needs to install security updates on several switches on company's network.
The management team wants this completed as quickly and efficiently as possible. Which of the
following should the technician do to perform the updates?
B. Configure TFTP server
455. A network tech is troubleshooting a new erver connectivity issue. The network tech discovers the
following on the support ticket
The server's IP address can be pinged from the client PCs,
• Access to the web resource works correctly when on the server's console.
• No clients can access the servers data via URL.
• The server does not have a firewall configured
• All services on the server are operating normally Which of the following actions will resolve the issue?
Configure A records for the web server
456. An admin would like to allow Windows clients from outside office to access PCs without using 3rdparty software. What access methods would meet this req?Remote desktop gateway
457. A tech is assisting a user who cannot connect to a website. The tech attempts to ping the default
gateway and DNS server of the PC. According to troubleshooting methodology, this is an example of:
bottom-up approach
458. Which of the following needs to be tested to achieve a Cat 6a certification for a company's data
cawing?
D. F-type connector
459. Users in a branch can access an ln-house server, but II is taking too long to fetch records. The
analyst does not know whether the Issue is being caused by network latency. Which of the following will
the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
SNMP
460. A network technician receives a support ticket about an employee who has misplaced a companyowned cell phone that contains private company information. Which of the following actions should the
network technician take to prevent data loss? D. Execute remote wipe
461. A Wi-Fi network was originally configured to be able to handle interference from a microwave
oven. The microwave oven was recently removed from the office. Now the network administrator wants
to optimize the system to maximize the range of the signal. The main sources of signal degradation are
the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the
following actions should the administrator take?
Change frequency
462. An admin needs to connect two laptops directly to each other using 802.11ac but does not have an
AP available. Which of the following describes this config?
Independent basic service set
463. A company wants to add a local redundant data center to its network in case of failure at its
primary location. Which of the following would give the LEAST redundancy for the company's network?
Cold site
464. A tech is troubleshooting a client's report about poor wireless performance. Using a client monitor,
the tech notes the following info: Which of the following is MOST likely the cause of the issue?
Channel overlap
465. After HVAC failures caused network outages, the support team decides to monitor the temps of all
the devices. The network administrator cannot find a command that will display this information. Which
of the following will retrieve the necessary information?
SNMP OID values
466. Which of following allows for devices within a network to share highly reliable time source? A. NTP
467. A company wants to invest in new hardware for the core network infrastructure. The management
team requires that the infrastructure be capable of being repaired in less than 60 min if any major part
fails. Which of the following metrics is MOST likely associated with this req?
MTTR
468. Which of the following options represents the participating computers in a network?
A. Nodes
469. Users are reporting intermittent Wi-Fi connectivity in specific parts of a bldg. Which of the
following should the network admin check FIRST when troubleshooting this issue? Site survey & AP
placement
470. An admin is attempting to add a new system to monitoring but is unsuccessful. The admin notices
the system is similar to another one on the network; however, the new one has an updated OS version.
Which of the following should the admin consider updating? Management information bases
471. A company is reviewing ways to cut the overall cost of Its IT budget. A network tech suggests
removing various computer programs from the IT budget and only providing these programs on an asneeded basis. Which of the following models would meet this requirement?
SaaS
472. A network tech receives a report from the server team that a server's network connection is not
working correctly. The tech checks the switchport connected to the server and reviews the following
data; Which of the following should the network tech perform to correct the issue?Replace the Cat5
patch cable with a Cat6 cable
473. A user in a branch office reports that access to all files has been lost after receiving a new PC. All
other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is
able to ping the workstation from the branch router, but the machine cannot ping the router. Which of
the following is MOST likely the cause of the incident?
A. Incorrect subnet mask
474. An IT tech successfully connects to the corporate wireless network at a hank. While performing
some tests, the tech observes that the physical address of the DHCp server has changed even though
the network connection has not been lost. What would BEST explain this change?
Rogue server
475. Which of the following is a req when certifying a network cabling as Cat 7?
Ensure the termination standard is TIA-EIA-568-A
476. Due to space constraints in an IDF, a network administrator can only a do a single switch to
accommodate three data networks. The admin needs a configuration that will allow each device to
access its expected network without additional connections. The configuration must also allow each
device to access the rest of the network. Which of the following should the administrator do to meet
these requirements? Untag the three VLANs across the uplink, Untag an individual VLAN per device port
477. ARP spoofing would normally be a part of:
A. an on-path attack
478. Which of the following protocols is widely used in large-scale enterprise networks to support
complex networks with multiple routers and balance traffic load on multiple links?
A. OSPF
479. A network admin needs to run a single command-line tool capable of displaying routing table and
multicast memberships. Which of the following would BEST help the admin achieve the reqs? ARP
480. Which of the following architectures is used for FTP?
A. Client-server
481. A user reports that a new VoIP phone works properly but the computer that is connected to the
phone cannot access any network resources. Which of the following MOST Likely needs to be configured
correctly to provide network connectivity to the computer?
D. VLAN tags
482. A network tech is troubleshooting an area where the wireless connection to devices is poor. The
technician theorizes that the signal-to-noise ratio in the area is causing the issue. Which of the following
should the tech do NEXT?
D. Remove electronics that are causing interference
483. Which of the following describes traffic going in & out of data center from internet? B. North-south
484. A network technician is planning a network scope. The web server needs to be within 12.31 69.1 to
12.31.69.29. Which of the following would meet this requirement?
A. Lease time
485. A company needs to virtualize a replica of its internal physical network without changing the logical
topology and the current setup. Which of the following technologies meets this requirement? A. NFV
486. Which of the following describes the ability of a corporate IT department to expand its cloudhosted VM environment with minimal effort? Scalability
487. A network admin is troubleshooting an issue with a new Internet connection. The ISP is asking
detailed questions about the config of the router that the network admin is troubleshooting. Which of
the following commands is the network admin using? show config, show route
488. A network administrator is adding a new switch to the network. Which of the following network
hardening techniques would be BEST to use once the switch is in production? A. Disable unneeded ports
489. At which of the following OSI model layers does an IMAP client run?
D. Layer 7
490. A network engineer receives the following when connecting to a switch to configure a port:
d. the switchport the engineer is trying to configure is down
491. A network admin is troubleshooting the comm between two Layer 2 switches that are reporting a
very high runt count. After trying multiple ports on both switches, the issue persists. Which of the
following should the network admin perform to resolve the issue? increase MTU size on both switches
492. Users within a corporate network need to connect to the Internet, but corporate network policy
does not allow direct connections. Which of the following is MOST likely to be used? proxy server
493. Two users on a LAN establish a video call. Which of the following OSI model layers ensures the
initiation coordination, and termination of the call?
Session
494. A network admin would like to purchase a device that provides access ports to endpoints ability to
route between networks. What would be BEST for the admin to purchase?Layer 3 switch
495. A tech is concerned that a client's cable issues may be causing intermittent connectivity. Which of
the following would help the tech determine the issue?run the show interface command on the switch
496. Which of the following would be the BEST way to connect branches to a main office?VPN headend
497. A network admin is investigating a performance issue on a dual-link connection—VPN and MPLS—
to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While
communicating, the delay is measured at 18ms, which is higher than expected when the link is
operational but lower than expected the VPN connection. Which of the following will point to root cause
of the Issue? checking the routing tables on both sides to ensure there is no asymmetric routing
498. A company is moving to a new building designed with a guest waiting area that has existing
network ports. What would BEST secure the network?disable unneeded switchports in the area
499. A tech is troubleshooting reports that a networked printer is unavailable. The printer's IP address is
configured with a DHCP reservation, but the address cannot be pinged from the print server in the same
subnet. Which of the following is MOST likely the cause of me connectivity failure?
incorrect gateway
500. The first 244 loT sensors were able to connect to the TFTP server, download the configuration file,
and register to an loT management system. The other sensors are being shown as offline. Which of the
following should be performed to determine the MOST likely cause of the partial deployment of the
sensors?
check the dhcp network scope
501. An admin notices that after contact with several switches in an MDF they failed due to discharge.
Which sensors should the admin deploy to monitor static electricity conditions in the MDF? humidity
502. A technician is consolidating a topology with multiple SSlDs into one unique SSiD deployment.
Which of the following features will be possible after this new configuration?
A. seamless roaming
503. An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the
following is the best solution to provide services without adding infrastructure?
satellite
504. A network admin wants to check all network connections and see the output in integer form.
Which of the following commands should the admin run on the command line?
netstat
505. An engineer needs to verify the external record for SMTP traffic. The engineer logged in to the
server and entered the nslookup command. Which of the following commands should the engineer send
before entering the DNS name?
d. set querytype=Mx
506. A tech discovered that some information on the local database server was changed during a tile
transfer to a remote server. Which of the following should concern the tech the MOST? integrity
507. A Fortune 500 firm is deciding On the kind or data center equipment to install given its five-year
budget Outlook. The Chief Information comparing equipment based on the life expectancy Of different
models. Which Of the following concepts BEST represents this metric?
A. MTBF
508. During an annual review of policy documents, a company decided to adjust its recovery time
frames. The company agreed that critical applications can be down for no more than six hours, and the
acceptable amount of data loss is no more than two hours. Which of the following should be
documented as the RPO?
A. two hours
509. An attacker targeting a large company was able to inject malicious A records into internal name
resolution servers. Which of the following attack types was MOST likely used?
A. DNS poisoning
510. A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been
operating at 100% capacity for a long duration. Which of the following performance metrics is MOST
likely to be impacted with sustained link saturation?
A. Latency
511. Several employees have expressed concerns about the company monitoring their internet activity
when they are working from home. The company wants to mitigate this issue and reassure employees
that their private internet activity is not being monitored. Which of the following would satisfy company
and employee needs?
A. Split tunnel
512. Which of the following issues are present with RIPv2? Time to converge, scalability
513. A Network engineer is investigating issues on a Layer 2 Switch. The department typically snares a
Switchport during meetings for presentations, but atter the first user Shares, no Other users can
connect. Which Of the following is MOST likely related to this issue?
Port security is configured on
the switch
514. Which of the following describes the BEST device to configure as a DHCP relay?
B. Router
515. A network administrator is decommissioning a server. Which of the following will the network
administrator MOST likely consult?
D. change management documentation
516. A client utilizes mobile tablets to view high-resolution images and videos via Wi-Fi within a
corporate office building. The previous administrator installed multiple high-density APs with Wi-Fi 5,
providing maximum coverage, but the measured performance is still below expected levels. Which of
the following would provide the BEST solution?
D. directional antenna
517. Which would enable a network tech to implement dynamic routing? layer 3 switch
518. A network tech is troubleshooting an application issue. The technician is able to recreate the issue
in a virtual environment. According to the troubleshooting methodology, which of the following actions
will the technician most likely perform NEXT? Establish a theory of probable cause
519. A desktop support dept has observed slow wireless speeds for a new line of laptops using the org's
standard image. No other devices have experienced the same issue. Which of the following should the
network admin recom troubleshooting 1st to resolve this issue? updating the device wireless drivers
520. Which of the following bandwidth management techniques uses buffers at the client side to
prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that
exceed the agreed traffic rate?
D. traffic prioritization
521. AGRE tunnel has been configured between two remote sites. Which of the following features,
when configured, ensures me GRE overhead does not affect payload? jumbo frames
522. A coffee shop owner hired a network consultant to provide recommendations for installing a new
wireless network. The coffee shop customers expect high speeds even when the network is congested.
Which of the following standards should the consultant recommend?
B. 802.11ax
523. An administrator is setting up a multicast server on a network, but the firewall seems to be
dropping the traffic. After logging in to the device, me administrator sees me following entries: Which
of the following firewall rules is MOST likely causing the issue? Rule 1
524. A network admin installed an additional IDF during a building expansion project. Which of the
following docs need to be updated to reflect the change? BYOD policy, Physical network diagram
525. A user from a remote office is reporting slow file transfers. Which of the following tools will an
engineer MOST likely use to get detailed measurement data?
B. IPerf
526. A tech was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the
following protocols uses those transceivers?
Fiber channel
527. Which of the following can be used to store various types of devices and provide contactless
delivery to users?
Access control vestibules
528. A false camera is installed outside a building to assist with physical security. Which of the following
is the device assisting?
Detection
529. A network technician was hired to harden the security of a network. The technician is required to
enable encryption and create a password for AP security through the web browser. Which of the
following would BEST support these requirements?
B. WPA2
530. A tech installed an 8-port switch in a user's office. The user needs to add a 2nd computer in the
office, so the tech connects both PCs to the switch & connects the switch to the wall jack. However, the
new PC cannot connect to resources. The tech then observes the following:
• The new computer does not get an IP address on the client's VLAN.
• Both computers have a link light on their NICs.
• The existing computer operates normally.
• The new PC appears to be operating normally except for the network issue.
Which of the following should the tech do NEXT to address the situation?
Contact the network team to resolve the port security issue
531. A network is experiencing extreme latency when accessing a particular website. Which of the
following commands will BEST help identify the issue? tracert
532. Which of the following protocols can be used to change device configs via encrypted and
authenticated sessions?
SSH, IPSec
533. Which of the following would be increased by adding encryption to data communication across the
network?
D. Confidentiality
534. A technician wants to monitor and provide traffic segmentation across the network. The technician
would like to assign each department a specific identifier. Which of the following will the technician
MOST likely use?
C. VLAN tagging
535. Which of the following can be used to validate domain ownership by verifying the presence of preagreed content contained in a DNS record?
D. TXT
536. While walking from the parking lot access-controlled door an employee sees an authorized user
open the door. Then the employee notices that another person catches the door before It closes and
goes inside Which of the following attacks Is taking place?
tailgating
537. Which of the following layers of the OSI model receives data from the application layer and
converts it into syntax that is readable by other devices on the network?
C. Layer 6
538. A large metro city is looking to standardize the ability for police department laptops to connect to
the city govt's VPN The city would like a wireless solution that provides the largest coverage across the
city with a min # of transmission towers Latency and overall bandwidth needs are not high priorities.
Which of the following would BEST meet the city's needs?
B. LTE
539. A network technician is attempting to increase throughput by configuring link port aggregation
between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following
is the BEST choice concerning speed and duplex for all interfaces that are participating in the link
aggregation?
B. Full duplex and 1GB speed
540. A company rents a large event space and includes wireless internet access for each tenant. Tenants
reserve a 2-hour window from the company each week, which includes a tenant-specific SSID However,
all users share the company's network hardware. The support team is receiving complaints from tenants
that some users are unable to connect to the wireless network Upon investigation, the support teams
discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions,
tenants throughout the day are unable to connect. Which of the following actions would MOST likely
reduce this Issue? Change the DHCP scope end to 10.1.10.250, Reduce DHCP lease time to four hours.
541. A network tech reviews an entry on the syslog server and discovers the following message from a
switch: SPANNING-TREE Port 1/1 BLOCKED
Which of the following describes the issue?
A loop was discovered and the impact was mitigated
542. An org is interested in purchasing a backup solution that supports the org's goals. What concept
would specify the max duration that a given service can be down before impacting ops? MTTR
543. Switch 3 was recently added lo an existing stack to extend connectivity to various parts of the
network. After the update, new employees were not able to print to the main networked copiers from
then workstations. Following are the port configurations for the switch stack in question:
Enable the printer ports on Switch 3; Reconfigure me VLAN on the printer ports on Switch 3.
544. A network administrator is planning a WLAN for a soccer stadium and was advised to use MUMIMO to improve connection performance in high-density areas. The project requires compatibility with
clients connecting using 2.4GHz or 5GHz frequencies. Which of the following would be the BEST wireless
standard for this project?
B. 802.11ax
545. A WAN technician reviews activity and identifies newly installed hardware that is causing outages
over an 8-hour period. Which of the following should be considered FIRST? Device configuration
review
546. An engineer needs to restrict the database servers that are in the same subnet from
communicating with each other. The database servers will still need to communicate with the
application servers in a different subnet. In some cases, the database servers will be clustered, and the
servers will need to communicate with other cluster members. Which of the following technologies will
be BEST to use to implement this filtering without creating rules?
A. Private VLANs
547. A network engineer is investigating reports of poor network performance. Upon reviewing a report,
the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely
cause of these errors? A bad wire on the Cat5e cable
548. A network mgr is configuring switches in IDFs to ensure unauthorized client computers are not
connecting to secure network. What is the mgr MOST likely performing? Configuring DHCP snooping
549. The lack of a formal process to grant network permissions to different profiles of employees and
contractors is leading to an increasing number of security incidents Non-uniform and overly permissive
network accesses are being granted. Which of the following would be the MOST appropriate method to
improve the security of the environment?
D. Implement role-based access control
550. An admin wants to increase the availability of a server that is connected to the office network.
Which of the following allows for multiple NICs to share a single IP address and offers maximum
performance while providing fault tolerance in the event of a NIC failure? A. Multipathing
551. A tech is monitoring a network interface and notices the device is dropping packets. The cable and
interfaces are in working order. Which of the following is MOST likely the cause?
CPU usage
552. A technician is configuring a wireless network and needs to ensure users agree to an AUP before
connecting. Which of the following should be implemented to achieve this goal?
A. Captive portal
553. Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources
554. While setting up a new workstation, a technician discovers that the network connection is only 100
full duplex (FD), although it is connected to a gigabit switch. While reviewing the interface information in
the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors.
The technician moves the computer to another switchport and experiences the same issues. Which of
the following is MOST likely the cause of the low data rate and port errors?
B. Duplex issues
555. A network administrator views a network pcap and sees a packet containing the following. Which
of the following are the BEST ways for the administrator to secure this type of traffic? (Select TWO).
Set a private community siring, Use SNMPv3
556. A network device needs to discover a server that can provide it with an IPv4 address. Which of the
following does the device need to send the request to? Broadcast address
557. A new global ISP needs to connect from central offices in North America to the United Kingdom.
Which of the following would be the BEST cabling solution for this project?
A. Single-mode
558. A technician is investigating packet loss to a device that has varying data bursts throughout the day.
Which of the following will the technician MOST likely configure to resolve the issue?
A. Flow control
559. Branch users are experiencing issues with videoconferencing. Which of the following will the
company MOST likely configure to improve performance for these applications?
C. Quality of service
560. An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical
to operations. To meet corporate reqs, the director set up two different datacenters across the country
that will stay current on data and applications. In the event of an outage, the company can immediately
switch from one to another. Which of the following does this BEST describe? hot site
561. A network administrator is configuring a load balancer for two systems. Which of the following
must the administrator configure to ensure connectivity during a failover?
A. VIP
562. To comply with industry reqs, a security assessment on the cloud server should identify which
protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools
is the MOST appropriate to complete the assessment?Use nmap & set the servers’ public Ips as the
targets
563. A network administrator is reviewing interface errors on a switch. Which of the following indicates
that a switchport is receiving packets in excess of the configured MTU?
GIANTS
564. A network admin decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address
mgnt. The devices were properly connected into the LAN but autoconfig of the IP address did not occur
as expected. What should the network admin verify?the network gateway is config’ed to send router
ads
565. A systems administrator is configuring a firewall using NAT with PAT. Which of the following would
be BEST suited for the LAN interface?
C. 172.23.0.0/16
566. A rogue AP was found plugged in and providing Internet access to employees in the break room.
Which of the following would be BEST to use to stop this from happening without physically removing
the WAP?
Port security
567. What technology allows traffic to be sent through two different ISPs to increase performance?
Fault tolerance
568. At the destination host, what OSI model layer will discard a segment with a bad checksum in the
UDP header? Transport
569. A network tech is investigating an issue with handheld devices in a warehouse. Devices have not
been connecting to the nearest APs, but they have been connecting to an AP on the far side of the
warehouse. What is the MOST likely cause of this issue? The nearest Aps are configured for 802.11g
570. A company requires a disaster recovery site to have equipment ready to go in the event of a
disaster at its main datacenter. The company does not have the budget to mirror all the live data to the
disaster recovery site. Which of the following concepts should the company select?
Warm site
571. Which of the following uses the destination IP address to forward packets? Router
572. A user is having difficulty with video conferencing and is looking for assistance. Which of the
following would BEST improve performance?Quality of service
573. A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of
the receiver's voice. Which are the causes of this issue? Jitter, QoS misconfiguration
574. A network tech is configuring a new firewall for a company with the necessary access reqs to be
allowed through the firewall. What would normally be applied as the LAST rule in firewall?Implicit deny
575. Which of the following would be used to expedite MX record updates to authoritative NSs?
D. Time to live
576. A client moving into a new office wants the IP network set up to accommodate 412 network
devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the
following subnet masks should be used to achieve the required result?
255.255.254.0
577. A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the
following BEST represents this value?
C. Time to live
578. Which of the following attacks is this MOST likely an example of?
A. ARP poisoning
579. Which of the following attacks encrypts user data and requires a proper backup implementation to
recover?
C. Ransomware
580. Which of the following services can provide data storage, hardware options, and scalability to a
third-party company that cannot afford new devices?
B. IaaS
581. Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI
model?
vSwitch
582. An IT tech suspects a break in one of the uplinks that provides connectivity to the core switch.
Which of the following command-line tools should the tech use to determine where the incident is
occurring?
show interface
583. Which of the following compromises internet-connected devices and makes them vulnerable to
becoming part of a botnet?
Malware infection, dictionary attack
584. A company is utilizing MFA for data center access. Which of the following is the MOST effective
security mechanism against physical intrusions due to stolen credentials?
Access control vestibule
585. A network tech needs to ensure the company's external mail server can pass reverse lookup
checks. Which of the following records would the tech MOST likely configure? PTR – pointer record
586. Which of the following BEST describes a North-South traffic flow?
d. management application connecting to managed devices
587. A network admin Is looking at switch features and is unsure whether to purchase a model with PoE
Which of the following devices that commonly utilize PoE should the admin consider? VoIP phones,
cams
588. Which of the following topologies requires MOST connections when designing a network?
Mesh
589. When accessing corporate network resources, users are required to authenticate to each
application they try to access. Which of the following concepts does this BEST represent?
Zero trust
590. During a recent security audit, a contracted penetration tester discovered the organization uses a
number of insecure protocols. Which of the following ports should be disallowed so only encrypted
protocols are allowed?
23, 69
591. The power company notifies a network admin that it will be turning off the power to the building
over the weekend. What is the BEST solution to prevent the servers from going down?Redundant PSUs
592. An international company is transferring its IT assets including a number of WAPs from the United
States to an office in Europe for deployment. Which of the following considerations should the company
research before Implementing the wireless hardware? B. regulatory impacts
593. After a critical power issue, the network team was not receiving UPS status notifications. The
network team would like to be alerted on these status changes. Which of the following would be BEST
to use tor these notifications?
A. traps
594. A company streams video to multiple devices across a campus. When this happens, several users
report a degradation of network performance. Which of the following would MOST likely address this
issue?
A. enable IGMP snooping on the switches
595. Users are reporting poor wireless performance in some areas of an industrial plant The wireless
controller is measuring a tow EIRP value compared to me recommendations noted on me most recent
site survey. Which of the following should be verified or replaced for the EIRP value to meet the site
survey's specifications?
AP transmit power, AP association time
596. Which of the following will reduce routing table lookups by performing packet forwarding decisions
independently of the network layer header?
A. MPLS
597. Users in a branch can access an ln-house database server, but II is taking too long to fetch records.
The analyst does not know whether the Issue is being caused by network latency. Which of the following
will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. SNMP
598. A network engineer needs to reduce the overhead of file transfers. Which of the following
configuration changes would accomplish that goal?
A Link aggregation
599. A newly installed VoIP phone is not getting the IP address it needs to connect to the phone system.
Which of the following tasks needs to be completed to allow the phone to operate correctly?
A. Assign the phone’s switchport to the correct VLAN
600. An admin would like to have two servers at different geo locations provide fault tolerance and high
performance while appearing as one URL to users. Which of the following should the admin implement?
Load balancing
601. All packets arriving at an interface need to be fully analyzed. Which of the following features should
be used to enable monitoring of the packets?
C. port mirroring
602. A operator is granted access to a monitoring app, configuration app, and timekeeping app. The
operator is denied access to the financial and project management app by the system's security config.
Which of the following BEST describes the security principle in use?
eparation of duties
603. Which of the following ports should be used to securely receive mail that is synchronized across
multiple devices?
D. 993
604. A computer engineer needs to ensure that only a specific PC can connect to port 1 on a switch.
Which of the following features should the engineer configure on the switch interface? port security
605. A network tech troubleshooting a specific port on a switch. Which of the following commands
should the technician use to see the port configuration?
show interface
606. Which of the following describes when an active exploit is used to gain access to a network?
Penetration test
607. A network admin is investigating a network event that is causing all communication to stop. The
network admin is unable to use SSH to connect to the switch but is able to gain access using the serial
console port. While monitoring port statistics, the admin sees the following:
high collisions
608. Which of the following is used to elect an STP root?
Bridge protocol data unit
609. A company is considering shifting its business to the cloud. The management team is concerned at
the availability of the third-party cloud service. Which of the following should the management team
consult to determine the promised availability of the cloud provider?
service level agreement
610. Which of the following connectors and terminations are required to make a Cat 6 cable that
connects from a PC to a non-capable MDIX switch?
T1A-568-A, T1A-568, RJ-45
611. To access production apps and data, developers must first connect remotely to a different server
From there, the developers are able to access production data What does this BEST represent?jump box
612. technician is connecting a Cat 6 Ethernet cable to a device mat only has LC poos. Which of the
following win the technician MOST likely use to accomplish this task?
A media converter
613. A network tech is having issues connecting an loT sensor to the internet The WLAN settings were
enabled via a custom command line, and a proper IP address assignment was received on the wireless
interlace. However, when trying to connect to the internet, only HTTP redirections are being received
when data Is requested. Which of the following will point to the root cause of the Issue? C. verifying
the minimum RSSI for operation in the device’s documentation
614. Which of the following types of datacenter architectures will MOST likely be used in a large SDN
and can be extended beyond the datacenter? three-tiered network, spine & leaf
615. Which of the following must be functioning properly in order for a network admin to create an
accurate timeline during a troubleshooting process?
A. NTP
616. A corporate client is experiencing global system outages. The IT team has identified multiple
potential underlying causes throughout the enterprise Each team member has been assigned an area to
trouble shoot. Which of the following approaches is being used?
Divide-and-conquer
617. A technician is configuring a static IP address on a new device in a newly created subnet. The work
order specifies the following reqs:
The IP address should use the highest address available.
• The default gateway needs to be set to 172.28.85.94. The subnet mask needs to be
255.255.255.224.
Which of the following addresses should the engineer apply to the device?
172.28.85.93
618. new student is given creds to log on to the campus Wi-Fi. The student stores the password in a
laptop and is able to connect; however, the student is not able to connect with a phone when only a
short distance from the laptop. Given the following information:..causing this connection failure?
incorrect passphrase
619. A company has multiple offices around the world. The computer rooms in some office locations are
too warm Dedicated sensors are in each room, but the process of checking each sensor takes a long
time. Which of the following options can the company put In place to automate temperature readings
with internal resources?
Use SNMP with an existing collector server
620. What is conducted frequently to maintain updated list of a system's weaknesses?Vulnerability scan
621. A network client is trying to connect to the wrong TCP port. Which of the following responses
would the client MOST likely receive?
RST
622. Troubleshooting process, the admin performs a traceout from the client to the server, and also
from the server to the client. While comparing the outputs, the admin notes they show different hops
between the hosts. Which of the following BEST explains these findings?
switch loop
623. A tech notices that equipment is being moved around/misplaced in the server room, even though
the room is locked. What would be the BEST solution to identify who is responsible?Install cameras
624. A network attack caused a network outage by wiping the configuration and logs of the border
firewall. Which of the following sources, in an investigation to determine how the firewall was
compromised, can provide the MOST detailed data?
Syslog server messages
625. network admin is setting up a new phone system and needs to define the location where VoIP
phones can download configuration files. Which of the following DHCP services can be used to
accomplish this task?
scope options
626. A network admin is installing a new server in the data center. The admin is concerned the amount
of traffic generated will exceed 1GB. and higher throughput NiCs are not available for installation. Which
of the following is the BEST solution for this issue?
Install an additional NIC and configure LACP
627. A company just migrated its email service to a cloud solution. After the migration, two-thirds of the
internal users were able to connect to their mailboxes, but the connection fails for the other one-third
of internal users. Users working externally are not reporting any issues. The network administrator
identifies the following output collected from an internal host:
c:\user> nslookup newmail.company.com
Non-Authoritative answer:
Name: newmail.company.com
IPs: 3.219.13.186, 64.58.225.184, 184.168.131.243
Which of the following verification tasks should the network admin perform NEXT?
Check the firewall ACL to verify all required IP addresses are included
628. An auditor assessing network best practices was able to connect a rogue switch into a network Jack
and get network connectivity. Which of the following controls would BEST address this risk?
Activate port security on the switchports providing end user access
629. A network admin installed a new VoIP network. Users are now experiencing poor call quality when
making calls. What should the admin do to increase VoIP performance?Configure a voice VLAN
630. Which of the following OSI model layers is where a tech would view UDP information?
Transport
632. Which of the following OSI model layers contains IP headers?
Network
633. A tech is investigating an issue with connectivity at customer's location. The tech confirms that
users can access resources locally only. The tech theorizes that the local router has failed and
investigates further. The tech's testing results show that the route is functional: however, users still are
unable to reach resources on the internal. What should the tech should do NEXT? Identify the symptoms
634. An engineer recently decided to upgrade the firmware on a router. During the upgrade, the help
desk received calls about a network outage. The network manager would like to create a policy to
prevent this from happening in the future. What documents should the manager create?
change
mgnt
635. During a risk assessment which of the following should be considered when planning to mitigate
high CPU utilization of a firewall?
load balancing
636. An IT officer is installing a new WAP. Which of the following must the officer change to connect
users securely to the WAP?
AES encryption
637. Which of the following provides guidance to an employee about restricting non-business access to
the company's video conferencing solution?
Acceptable use policy
638. Which of the following would be to install to find/block any malicious users within a network? IPS
639. Which of the following would be the MOST cost-effective recovery solution for a company's lowerpriority applications?
C. Hot site
640. network admin responds to a support ticket that was submitted by a customer who is having issues
connecting to a website inside of the company network The admin verifies that the customer could not
connect to a website using a URL Which of the following troubleshooting steps would be BEST for the
admin to take?
Attempt to connect to the site via IP address
641. Which of the following BEST describes a spirt-tunnel client-to-server VPN connection?
The client sends some network traffic down the VPN tunnel and other traffic to the local gateway.
642. A security engineer is installing a new IDS on the network. The engineer has asked a network admin
to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the
following should the network admin do?
Install a network tap for the IDS
643. A client who shares office space and an IT closet with another company recently reported
connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site
maintenance in the shared IT closet. Which of the following security techniques would BEST secure the
physical networking equipment?
Disabling unneeded switchports
644. A network administrator needs to provide evidence to confirm that recent network outages were
caused by increased traffic generated by a recently released application. Which of the following actions
will BEST support the administrator's response?
C. collect the router’s NetFlow data
645. An admin is investigating reports of network slowness in a building. While looking at the uplink
interface statistics In the switch's CLI, the admin discovers the uplink Is at 100% utilization However, the
admin is unsure how to ID what traffic is causing the saturation. Which of the following tools should the
admin utilize to identify the source and destination addresses of the traffic?
NetFlow
646. A network engineer locates an unapproved AP connected to the corporate LAN that is broadcasting
a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of
attacks BEST describes this finding?
Rogue access point
647. A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput
to associated devices. Which of the following is the MOST cost-efficient way for the office to increase
network performance?
Enable channel bonding
648. A tech needs to configure a routing protocol for an internet-facing edge router. Which of the
following routing protocols will the tech MOST likely use?
A BGP
649. A tech knows the MAC address of a device and is attempting to find the device's IP address. Which
of the following should the tech look at to find the IP address?
DHCP leases, MAC address
table
650. A network tech receives a report about a performance issue on a client PC that is connected to port
1/3 on a network switch. The tech observes the following configuration output from the switch: Speed
651. Which of the following is used to provide disaster recovery capabilities to spin up an critical devices
using internet resources?
Cloud site
652. An IT admin received an assignment with the following objectives
• Conduct a total scan within the company's network tor all connected hosts
• Detect all the types of operating systems running on all devices
• Discover all services offered by hosts on the network
• Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
nmap
653. Which of the following records can be used to track the number of changes on a DNS zone?
SOA
654. A network admin is designing a wireless network. The admin must ensure a rented office space has
a sufficient signal. Reducing exposure to the wireless network is important. Which of the following
would MOST likely facilitate the correct accessibility to the Wi-Fi network?
Channel utilization
655. Which of the following is the MOST cost-effective alternative that provides proper cabling and
supports gigabit Ethernet devices?
Twisted cable with a minimum Cat 5e cert
656. An employee reports to a network administrator that internet access is not working. Which of the
following should the administrator do FIRST? determine if anything has changed
657. Due to a surge in business, a company is onboarding an unusually high number of salespeople. The
salespeople are assigned desktops that are wired to the network. The last few salespeople to be
onboarded are able to access corporate materials on the network but not sales-specific resources.
Which of the following is MOST likely the cause? Recently added users were assigned to the wrong VLAN
Download