An attacker follows an employee through a badge-secured door before the door closes. Which of the following types of attacks is occurring?
Tailgating
A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?
Link aggregation
A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?
Tag the traffic to voice VLAN.
Which of the following can support a jumbo frame?
Switch
A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager
verify?
NTP
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?
ESP
Which of the following protocols has a default administrative distance value of 90?
EIGRP
An office is experiencing intermittent connection issues. A network engineer identifies that the issue occurs whenever someone uses the fax machine that is connected to a switch. Which of the following should the engineer do first to resolve the issue?
Configure a VLAN.
A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
Update the firmware.
Which of the following fiber connector types is the most likely to be used on a network interface card?
LC
Which of the following connectors provides console access to a switch?
RJ45
A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Choose two.)
5GHz frequency, Non-overlapping channel
Which of the following network topologies contains a direct connection between every node in the network?
Mesh
A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?
Mesh
A manager is evaluating the environmental design of a data center. Which of the following setups should the manager implement if the maximum thermal dissipation is the highest concern?
A hot-cold
A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?
The router interface is a broadcast address.
A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following is the most likely cause?
The port is shut down.
Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?
OSPF
An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?
Definition file for event translation
A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?
Decommission and replace the switch.
A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as wwww.comptia.org. Which of the following records should the administrator use?
CNAME
A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?
Trusted
Which of the following network devices converts wireless signals to electronic signals?
Access point
A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large
attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?
Signal degradation
Which of the following activities would have groups from different departments evaluate the disaster recovery process?
Tabletop exercises