Networking 8
Networking 8
Networking 8
Networking 8
Networking 8
100

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

Band steering

100

A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network
administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the
following troubleshooting steps should be taken first?

Identify the problem.

100

A user attempts to log in to a corporate website by utilizing a shortcut. The shortcut has been used many times before. The user then notices some discrepancies on the company website. Which of the following is most likely the reason for this issue?

DNS poisoning

100

Which of the following steps in the troubleshooting methodology comes after using a top-to-bottom examination of the OSI model to determine cause?

Test the theory.

100

A network architect is implementing an off-premises computing facility and needs to ensure that operation will not be impacted by major outages. Which of the following should the architect consider?

Hot site

200

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?


Jumbo frames

200

A new server is deployed in a trusted zone and is validated to be online with all appropriate services running. However, users in a perimeter network cannot access the server. Which of the following should a network administrator do to resolve the reported issue?

Update the firewall ACL to allow access to the new server.

200

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

Access, distribution, and core

200

Which of the following would an adversary do while conducting an evil twin attack?

Trick users into using an AP with an SSID that is identical to a legitimate network.

200

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer
determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Add a new AAA record.

300

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following
tools should the administrator use to best identify the devices?

nmap

300

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific
file server. Which of the following is the most likely cause?

Incorrect ACLs

300

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

A microwave is in the office.

300

An ISP provided a company with an IP range of 98.174.235.142/28. A network technician configured a router with a subnet mask of 255.255.255.224 and default gateway of 98.174.235.129. After the configuration was set up. the company is unable to connect to the ISP. Which of the following would resolve this issue?

Change the subnet mask to .240.

300

A small coffee shop wants to set up multiple 2.4GHz wireless access points. The access points will support a large number of users, and the network technician wants to mitigate interference as much as possible. Which of the following is the number of 22MHz channels that the equipment can support?

3

400

A network engineer wants to implement a solution where all web servers will send event data over port 514. Which of the following services will accomplish this task?

Syslog

400

A security administrator wants to discover zero-day attacks before they can be used on the company’s network. Which of the following can the administrator use to accomplish this task?

Honeypot

400

Which of the following SD-WAN features allows a router to be shipped directly to the installation site and does not require site-level configuration?

Zero-touch provisioning

400

A network administrator is troubleshooting a connection between two switches that is experiencing intermittent errors. The administrator needs to determine which port on the remote switch the faulty cable is connected to. Which of the following is the best tool to use to identify the error?

LLDP run

400

A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?

Link aggregation

500

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

Network signal

500

A network administrator is trying to locate the switch interface a PC is connected to. The administrator accesses the local switch, pings the PC IP address, and then uses the command show arp. Which of the following commands should the administrator use next?

show mac-address-table

500

Which of the following types of routes will take precedence when building a routing table for a given subnet?

Static

500

Which of the following is a difference between EOL and EOS?

EOL discontinues the product but may offer support.

500

Which of the following are the main differences between ESP and AH? (Choose two.)

ESP provides confidentiality through the use of encryption, AH provides authentication for IP headers and their payloads.

M
e
n
u