Random 1
Random 2
Random 3
Random 4
Random 5
100

Double Points


A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports. Which of the following should the company implement to prevent this in the future?

A. URL filters

B. VPN

C. ACLs

D. NAC

NAC

100

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

A. CPU usage

B. Memory

C. Temperature

D. Bandwidth

CPU usage

Memory

100

Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?

A. NIC teaming

B. Load balancer

C. RAID array

D. PDUs

NIC teaming

100

Which of the following is used to track and document various types of known vulnerabilities?

A. CVE

B. Penetration testing

C. Zero-day

D. SIEM

CVE

100

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

A. Establish a plan of action to resolve the issue and identify potential effects

B. Verify full system functionality and, if applicable, implement preventive measures

C. Implement the solution or escalate as necessary

D. Test the theory to determine the cause

Test the theory to determine the cause

200

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?

A. dig

B. nmap

C. tracert

D. nslookup

nmap

200

Double Points

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?

A. Install load balancers

B. Install more switches

C. Decrease the number of VLANs

D. Reduce the lease time

Reduce the lease time

200

An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization's requirements?

A. Load balancing

B. Geofencing

C. Public cloud

D. Content delivery network

Content delivery network

200

The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

A. Captive portal

B. Two-factor authentication

C. Complex passwords

D. Geofencing

Two-factor authentication

Complex passwords

200

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

A. Firewall

B. AP

C. Proxy server

D. IDS

IDS

300

Which of the following would be BEST to use to detect a MAC spoofing attack?

A. Internet Control Message Protocol

B. Reverse Address Resolution Protocol

C. Dynamic Host Configuration Protocol

D. Internet Message Access Protocol

Reverse Address Resolution Protocol

300

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

A. Spanning Tree Protocol

B. Neighbor Discovery Protocol

C. Link Aggregation Control Protocol

D. Address Resolution Protocol

Neighbor Discovery Protocol

300

Double Points

A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?

A. Check the system's IP address

B. Do a ping test against the servers

C. Reseat the cables into the back of the PC

D. Ask what changes were made

Ask what changes were made

300

A network engineer performs the following tasks to increase server bandwidth: ✑ Connects two network cables from the server to a switch stack ✑ Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?

A. Load balancing

B. Multipathing

C. NIC teaming

D. Clustering

NIC teaming

300

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

A. Coaxial

B. Single-mode fiber

C. Cat 6e

D. Multimode fiber

Coaxial

400

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

A. NetFlow analyzer

B. Bandwidth analyzer

C. Protocol analyzer

D. Spectrum analyzer

Spectrum analyzer

400

A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?

A. Correct the DNS server entries in the DHCP scope

B. Correct the external firewall gateway address

C. Correct the NTP server settings on the clients

D. Correct a TFTP Issue on the company's server

Correct the DNS server entries in the DHCP scope

400

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

A. CSMA/CD

B. LACP

C. PoE+

D. MDIX

MDIX

400

Double Points

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?

A. 255.255.128.0

B. 255.255.192.0

C. 255.255.240.0

D. 255.255.248.0

255.255.240.0

400

A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?

A. Move the UTM onto the LAN side of the network

B. Enable TLS inspection on the UTM

C. Enable stateful inspection on the UTM

D. Configure the UTM to deny encrypted files from being transferred

Move the UTM onto the LAN side of the network

500

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

A. Verify the session time-out configuration on the captive portal settings

B. Check for encryption protocol mismatch on the client's wireless settings

C. Confirm that a valid passphrase is being used during the web authentication

D. Investigate for a client's disassociation caused by an evil twin AP

Verify the session time-out configuration on the captive portal settings

500

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: ✑ Device ✑ LC/LC patch cable ✑ Patch panel ✑ Cross-connect fiber cable ✑ Patch panel ✑ LC/LC patch cable ✑ Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

A. TX/RX is reversed

B. An incorrect cable was used

C. The device failed during installation

D. Attenuation is occurring

TX/RX is reversed

500

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?

A. IP scanner

B. Terminal emulator

C. NetFlow analyzer

D. Port scanner

IP scanner

500

Which of the following is the LARGEST MTU for a standard Ethernet frame?

A. 1452

B. 1492

C. 1500

D. 2304

1500

500

Double Points

A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?

A. Swap the fiber pairs in one of the SFPs

B. Replace the jumpers with single-mode fiber

C. Set the correct MTU on the new interface

D. Install an optic that matches the fiber type

Replace the jumpers with single-mode fiber

M
e
n
u