You are on page 1of 195

N10-006.

comptia

Number: N10-006
Passing Score: 800
Time Limit: 120 min

https://www.gratisexam.com/

Sections
1. Network security
2. Troubleshooting
3. Industry standards, practices, and network theory
4. Mix questions

https://www.gratisexam.com/
Exam A

QUESTION 1
A network technician is assisting the company with developing a new business continuity plan.

Which of the following would be an appropriate suggestion to add to the plan?

https://www.gratisexam.com/

A. Build redundant links between core devices


B. Physically secure all network equipment
C. Maintain up-to-date configuration backups
D. Perform reoccurring vulnerability scans

Correct Answer: A
Section: Network security
Explanation

Explanation/Reference:
Explanation:
The business continuity plan focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a
disaster.
By keeping redundant links between core devices critical business services can be kept running if one link is unavailable during a disaster.

QUESTION 2
Which of the following describes a smurf attack?

A. Attack on a target using spoofed ICMP packets to flood it


B. Intercepting traffic intended for a target and redirecting it to another
C. Spoofed VLAN tags used to bypass authentication
D. Forging tags to bypass QoS policies in order to steal bandwidth

Correct Answer: A
Section: Network security
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's
spoofed source IP are broadcast to a computer network using an IP Broadcast address.
Most devices on a network will, by default, respond to this by sending a reply to the source IP address. If the number of machines on the network that receive and
respond to these packets is very large, the victim's computer will be flooded with traffic. This can slow down the victim's computer to the point where it becomes
impossible to work on.

QUESTION 3
A malicious user floods a switch with frames hoping to redirect traffic to the user's server.

Which of the following attacks is the user MOST likely using?

A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack

Correct Answer: B
Section: Network security
Explanation

Explanation/Reference:
Explanation:
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an
Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the
hacker's known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker's computer first
instead of sending it to the original destination. As a result, both the user's data and privacy are compromised.

QUESTION 4
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.

This is an example of which of the following attacks?

A. Smurf attack
B. VLAN hopping
C. Blue snarfing
D. Spear phishing

https://www.gratisexam.com/
Correct Answer: B
Section: Network security
Explanation

Explanation/Reference:
Explanation:
The VoIP phone port can be used to attack a VLAN on the local network.
VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping
attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

QUESTION 5
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server.

Which of the following is the BEST explanation that describes this scenario?

A. Compromised system
B. Smurf attack
C. SQL injection attack
D. Man-in-the-middle

Correct Answer: A
Section: Network security
Explanation

Explanation/Reference:
Explanation:
As the extra unexplainable traffic comes from an internal host on your network we can assume that this host has been compromised.
If your system has been compromised, somebody is probably using your machine--possibly to scan and find other machines to compromise

QUESTION 6
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations.

Which of the following standards should be consulted?

A. DWDM
B. MIMO
C. TEMPEST
D. DOCSIS

Correct Answer: C

https://www.gratisexam.com/
Section: Network security
Explanation

Explanation/Reference:
Explanation:
Tempest was the name of a government project to study the ability to understand the data over a network by listening to the emanations. Tempest rooms are
designed to keep emanations contained in that room to increase security of data communications happening there.

QUESTION 7
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers.

Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software


B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Correct Answer: A
Section: Network security
Explanation

Explanation/Reference:
Explanation:
To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed
further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside
disgruntled employee.

QUESTION 8
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as
the default setting?

A. The VoIP phone would request a new phone number from the unified communications server.
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.
D. The VoIP phone would request a different configuration from the unified communications server.

https://www.gratisexam.com/
Correct Answer: B
Section: Network security
Explanation

Explanation/Reference:
Explanation:
Without configuring any other specific parameters, the switchport security feature will only permit one MAC address to be learned per switchport (dynamically) and
use the shutdown violation mode; this means that if a second MAC address is seen on the switchport the port will be shutdown and put into the err-disabled state.

QUESTION 9
A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices.

Which of the following would need to be configured on each network device to provide that information in a secure manner?

A. S/MIME
B. SYSLOG
C. PGP
D. SNMPv3
E. RSH

Correct Answer: D
Section: Network security
Explanation

Explanation/Reference:
Explanation:
The network monitoring need to use a network management protocol. SNMP has become the de facto standard of network management protocols. The security
weaknesses of SNMPv1 and SNMPv2c are addressed in SNMPv3.

QUESTION 10
A firewall ACL is configured as follows:

10. Deny Any Trust to Any DMZ eq to TCP port 22


11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any
protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only.

Reordering the ACL in which of the following manners would meet the company's objectives?

https://www.gratisexam.com/
A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10

Correct Answer: A
Section: Network security
Explanation

Explanation/Reference:
Explanation:
ACL are processed in TOP DOWN process in routers or switches. This means that when a condition in the ACL is met, all processing is stopped.
We start by allowing any protocol on the 10.200.0.0/16 subnet:11. Allow 10.200.0.0/16 to AnyDMZ eq to Any
We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22
We allow browsing (port 80 and 443) on the 10.0.0.0/8 subnet: Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
Finally, we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any

QUESTION 11
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system.

Which of the following should the technician perform?

https://www.gratisexam.com/

A. Disable the network based firewall


B. Implicit deny all traffic on network
C. Configure a VLAN on Layer 2 switch
D. Add the system to the DMZ

Correct Answer: D
Section: Network security
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:
By putting the system in the DMZ (demilitarized zone) we increase the security, as the system should be opened for remote access.
A DMZ is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside
users from getting direct access to a server that has company data. A DMZ often contains servers that should be accessible from the public Internet.

QUESTION 12
The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which
of the following NAC features?

A. Quarantine network
B. Persistent agents
C. Posture assessment
D. Non-persistent agents

Correct Answer: C
Section: Network security
Explanation

Explanation/Reference:
Explanation:
Network Admission Control (NAC) can permit or deny access to a network based on characteristics of the device seeking admission, rather than just checking user
credentials. For example, a client’s OS, Windows Registry settings, AD membership status, and version of antivirus software could be checked against a set of
requirements before allowing the client to access a network.
This process of checking a client’s characteristics is called posture assessment.

QUESTION 13
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such
as printers and servers?

A. Quarantine network
B. Core network
C. Guest network
D. Wireless network

Correct Answer: C
Section: Network security
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users.

QUESTION 14
Which of the following is a security benefit gained from setting up a guest wireless network?

A. Optimized device bandwidth


B. Isolated corporate resources
C. Smaller ACL changes
D. Reduced password resets

Correct Answer: B
Section: Network security
Explanation

Explanation/Reference:
Explanation:
A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users. The
corporate resources would be inaccessible (isolated) from the guest network.

QUESTION 15
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected
the .mp4 files in the directory, she views one of the files and believes it contains illegal material.

Which of the following forensics actions should Ann perform?

A. Erase the files created by the virus


B. Stop and escalate to the proper authorities
C. Check the remaining directories for more .mp4 files
D. Copy the information to a network drive to preserve the evidence

Correct Answer: B
Section: Network security
Explanation

Explanation/Reference:
Explanation:
Computer forensics is about legal evidence found in computers and digital storage.
A plan should include first responders securing the area and then escalating to senior management and authorities when required by policy or law.

QUESTION 16

https://www.gratisexam.com/
A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under
a cubicle overnight.

Which of the following steps of incident handling has been incorrectly performed?

A. Document the scene


B. Forensics report
C. Evidence collection
D. Chain of custody

Correct Answer: D
Section: Network security
Explanation

Explanation/Reference:
Explanation:
To verify the integrity of data since a security incident occurred, you need to be able to show a chain of custody.
A chain of custody documents who has been in possession of the data (evidence) since a security breach occurred. A well-prepared organization will have process
and procedures that are used when an incident occurs.
A plan should include first responders securing the area and then escalating to senior management and authorities when required by policy or law. The chain of
custody also includes documentation of the scene, collection of evidence, and maintenance, e-discovery (which is the electronic aspect of identifying, collecting, and
producing electronically stored information), transportation of data, forensics reporting, and a process to preserve all forms of evidence and data when litigation is
expected. The preservation of the evidence, data, and details is referred to as legal hold.

QUESTION 17
A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity.

Which of the following should the network technician do NEXT?

A. Establish a theory of probable cause.


B. Document actions and findings.
C. Determine next steps to solve the problem.
D. Determine if anything has changed.

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
The technician has already identified the symptom: Loss of connectivity on a specific network segment. The next step in identifying the problem is to “Determine if
anything has changed”.
Common troubleshooting steps and procedures:
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
Determine if anything has changed.
1. Establish a theory of probable cause.
Question the obvious.
1. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
1. Establish a plan of action to resolve the problem and identify potential effects.
2. Implement the solution or escalate as necessary.
3. Verify full system functionality and if applicable implement preventive measures.
4. Document findings, actions, and outcomes.

QUESTION 18
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to
the same shared printer.

Which of the following should be the FIRST question the helpdesk asks?

A. Does the printer have toner?


B. Are there any errors on the printer display?
C. Is the user able to access any network resources?
D. Is the printer powered up?

Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The user has already provided you with the information relevant to the first step in the 7-step troubleshooting process. The next step is to “Question the obvious.”
The user has stated: “…his colleagues are able to print their documents to the same shared printer.” The obvious question in this instance is whether the user can
access any network resources.
1. Identify the problem.
Information gathering.
Identify symptoms.

https://www.gratisexam.com/
Question users.
Determine if anything has changed.
1. Establish a theory of probable cause.
Question the obvious.
1. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
1. Establish a plan of action to resolve the problem and identify potential effects.
2. Implement the solution or escalate as necessary.
3. Verify full system functionality and if applicable implement preventive measures.
4. Document findings, actions, and outcomes.

QUESTION 19
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue
is related to an unauthorized home router.

Which of the following should the technician do NEXT in the troubleshooting methodology?

A. Document the findings and action taken.


B. Establish a plan to locate the rogue DHCP server.
C. Remove the rogue DHCP server from the network.
D. Identify the root cause of the problem.

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
By testing the behavior of rogue DHCP servers and determining that the issue is related to an unauthorized home router, the technician has completed the third
step in the 7-step troubleshooting process. The next step is to establish a plan of action to resolve the problem and identify potential effects. Establishing a plan to
locate the rogue DHCP server meets the requirements of this step.
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
Determine if anything has changed.
1. Establish a theory of probable cause.
Question the obvious.
1. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.

https://www.gratisexam.com/
If theory is not confirmed, re-establish a new theory or escalate.
1. Establish a plan of action to resolve the problem and identify potential effects.
2. Implement the solution or escalate as necessary.
3. Verify full system functionality and if applicable implement preventive measures.
4. Document findings, actions, and outcomes.

QUESTION 20
A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing
condition.

myClient$ wificard --getinfo


agrCtlRSSI:-72
agrExtRSSI:0
state:running
op mode: station
lastTxRate:178
MaxRate:300
802.11 auth:open
link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless
Channel:149,1

Given this output, which of the following has the technician learned about the wireless network? (Select TWO).

A. The WAP is using RC4 encryption


B. The WAP is using 802.11a
C. The WAP is using AES encryption
D. The WAP issuing the 2.4GHz channel
E. The WAP is using the 5GHz channel
F. The WAP is using 802.11g

Correct Answer: CE
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption protocol, which is an AES based
protocol.
The output shows that the wireless network operates on channel 149, which is a channel in the 5GHz band.

https://www.gratisexam.com/
QUESTION 21
An administrator only has telnet access to a remote workstation.

Which of the following utilities will identify if the workstation uses DHCP?

A. tracert
B. ping
C. dig
D. ipconfig
E. netstat

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The ipconfig command displays the TCP/IP configuration of a Windows system. The ipconfig /all command displays the system’s TCP/IP configuration in detail.
This output includes whether DHCP is enabled or not.

QUESTION 22
A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.

The technician would like to see the results of the tracert command.

Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network?

https://www.gratisexam.com/

A. Enable split horizon to allow internal tracert commands to pass through the firewall
B. Enable IGMP messages out and block IGMP messages into the network
C. Configure the firewall to allow echo reply in and echo request out of the network

https://www.gratisexam.com/
D. Install a backdoor to access the router to allow tracert messages to pass through

Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Tracert makes use of ICMP echo packets to trace the route between two hosts. For the command to be successful, the firewall has to allow incoming echo replies
and outgoing echo requests.

QUESTION 23
A network technician has received comments from several users that cannot reach a particular website.

Which of the following commands would provide the BEST information about the path taken across the network to this website?

A. ping
B. netstat
C. telnet
D. tracert

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The tracert command is used to determine the amount of hops a packet takes to reach a destination. It makes use of ICMP echo packets to report information at
every step in the journey. This is how the path taken across the network is obtained.

QUESTION 24
After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration.
The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e,
and the administrator's password.

Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation
IP address is 192.168.0.10/23?

A. Use the reset button on the back of the firewall to restore it to its factory default, and then log onto
B. Run the following command on the administrator's workstation: arp –s 192.168.1.200 01:4a:d1:fa:b1:0e

https://www.gratisexam.com/
C. Use an SNMP tool to query the firewall properties and determine the correct management IP address
D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Address Resolution Protocol (ARP) is used to resolve IP addresses to MAC addresses. The arp –s command adds a static permanent address to the ARP cache.
This will allow the administrator to access the firewall.

QUESTION 25
A network technician has detected a personal computer that has been physically connected to the corporate network.

Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?

A. nbtstat –a
B. show mac address-table
C. show interface status
D. show ip access-list
E. nslookup hostname

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The show mac address-table command is used to view the ageing timer, and also the unicast and multicast MAC addresses stored in the MAC address table by the
switch. Furthermore, you can view all of the addresses in the table or only the addresses learned or specified on a particular port or VLAN.

QUESTION 26
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall.

Which of the following tools can be used to locate its physical location within the wall?

A. Cable certifier
B. Multimeter

https://www.gratisexam.com/
C. Cable tester
D. Toner probe

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Toner probes are specifically used to trace cables hidden in floors, ceilings, or walls. They can also be used to track cables from the patch panels to their
destinations.

QUESTION 27
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers.

Which of the following has happened to the user?

A. The user is connected using the wrong channel.


B. The user is connected to the wrong SSID.
C. The user is experiencing an EMI issue.
D. The user is connected to the wrong RADIUS server.

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The user is connecting to an SSID assigned to a different subnet. Therefore, the user has access to SMB shares and printers that are not recognizable.

QUESTION 28
A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.

This is an example of which of following threats?

A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP

https://www.gratisexam.com/
Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being aware of it. Therefore, if the device was not installed
by the networking team, the administrator would not know about it being there.

QUESTION 29
Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the
signal is consistently dropping, yet the device indicates a strong signal.

Which of the following is the MOST likely cause of the issue?

A. Signal-to-noise ratio
B. AP configuration
C. Incorrect SSID
D. Bounce

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The signal between the access point and Ann’s wireless device is being bounced off walls, windows, glass mirrors, carpeted floors, and many other objects. This
results in the slow connection. The radio waves are travelling at the same rate, but as a result of signal bounce, it's taking longer to reach its destination.

QUESTION 30
A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are
experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline.

Which of the following is a reason why the media department is not connecting?

A. Wrong SSID
B. Rogue access point
C. Placement
D. Channel mismatch

https://www.gratisexam.com/
Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The sporadic wireless connectivity is being caused by interference. Moving the access point to different location would solve the problem.

QUESTION 31
A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk
has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port
during production.

Given this information, which of the following is the cause of the problem?

A. Distance limitation
B. Electromagnetic interference
C. Cross talk
D. Speed and duplex mismatch

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
When cables are installed near electrical devices the signal within the cable might become corrupt. The cable connecting the control station to the switch port is
now surrounded by the production machinery. Electromagnetic interference could occur when the machinery is running, causing the intermittent operation.

QUESTION 32
A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a
different RJ-45 port, the device connects successfully.

Which of the following is causing this issue?

A. EMI
B. RFI
C. Cross-talk
D. Bad wiring

https://www.gratisexam.com/
Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The question states that the device worked on a different port. This indicates that the wiring is faulty.

QUESTION 33
A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level.
However, the interface on the router will not come up.

Which of the following is the MOST likely cause?

A. The wrong wavelength was demuxed from the multiplexer.


B. The SFP in the multiplexer is malfunctioning.
C. There is a dirty connector on the fiber optic cable.
D. The fiber optic cable is bent in the management tray.

Correct Answer: A
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
A multiplexer (or mux) is a device that selects one of several analog or digital input signals and forwards the selected input into a single line. A demultiplexer (or
demux) is a device taking a single input signal and selecting one of many data-output-lines, which is connected to the single input. Since the signal going in is good,
the problem must be with the signal output. If the correct wavelength was demultiplexed, the interface will be displayed on the router.

QUESTION 34
While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage.

Which of the following is MOST likely the issue?

A. Maximum cable length exceeded


B. Dirty connectors
C. RF interference caused by impedance mismatch
D. Bend radius exceeded

https://www.gratisexam.com/
Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The excessive bending of fiber-optic cables can increase microbending and macrobending losses. Microbending causes light attenuation induced by deformation of
the fiber, while macrobending causes the leakage of light through the fiber cladding and this is more likely to happen where the fiber is excessively bent.

QUESTION 35
A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new
access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet.

Which of the following is the MOST likely cause of this issue?

A. The gateway is misconfigured on the new router.


B. The subnet mask is incorrect on the new router.
C. The gateway is misconfigured on the edge router.
D. The SSID is incorrect on the new router.

Correct Answer: A
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
A missing or incorrect default gateway parameter limits communication to the local segment.
The question states: “All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router
cannot get to the Internet”.

QUESTION 36
While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations
cannot access the Internet.

Which of the following should the technician check to resolve the problem?

A. Default gateway address


B. Misconfigured DNS
C. DHCP server
D. NIC failure

https://www.gratisexam.com/
Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
If a DHCP server fails, the workstations are assigned an address from the 169.254.0.0 address range by Automatic Private IP Addressing (APIPA). APIPA also
configures a suitable subnet mask, but it doesn’t configure the system with a default gateway address. This allows communication on the local network, but not
externally.

QUESTION 37
A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a
command line utility:

Network Destination Netmask GatewayInterface


192.168.1.0 255.255.255.0 192.168.1.254 eth0
192.168.1.10 255.255.255.255 192.168.1.10 eth0
127.0.0.1 255.0.0.0 On-Link lo
127.0.0.0 255.0.0.0 On-Link lo
255.255.255.255 255.255.255.255 102.168.1.10 eth0

Which of the following is the reason for the computer issue, given the above output?

A. Wrong default gateway netmask


B. Incorrect default gateway address
C. Default gateway on the wrong interface
D. Missing default gateway

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The output appears to be a result of running the netstat –r command. If the default gateway was present, the first line would show the Network Destination as
0.0.0.0 and the Netmaskas 0.0.0.0.

QUESTION 38
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The
ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:

https://www.gratisexam.com/
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps
Duplex: Auto
State: No Shutdown

None of the workstations at the company are able to access the Internet.

Which of the following are the reasons? (Select TWO).

A. There is a duplex mismatch between the router and ISP.


B. The router interface is turned off.
C. The interface is set to the incorrect speed.
D. The router is configured with the incorrect subnet mask.
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.

Correct Answer: EF
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
According to the IP Address Range Calculator, for the given subnet mask and the IP range address range assigned by the ISP, the first host address should be
10.10.150.17 and the broadcast address should be 10.10.150.31. Therefore, the router interface is configured with the incorrect IP address and the default gateway
is configured incorrectly.

QUESTION 39
Which of the following WAN technologies is associated with high latency?

A. T1
B. Satellite

https://www.gratisexam.com/
https://www.gratisexam.com/

C. Cable
D. OCx

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Latency in this instance is the time it takes for the signal to and from the satellite. Since signal has to travel to the satellite, then from the satellite to the ground
station, and then out to the Internet (or IP WAN). Not forgetting the return trip, and processing delays.

QUESTION 40
A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was
installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts.

Which of the following is MOST likely the cause of the problem?

A. Damaged cable
B. Duplex mismatch
C. Incorrect VLAN assignment
D. Speed mismatch

Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
If a port is accidentally assigned to the wrong VLAN in a switch, it’s as if that client was magically transported to another place in the network. This would explain the
inability to communication with the printer, as it is on a different VLAN.

QUESTION 41
A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight.
The next day, customers began having issues accessing public websites.

Which of the following will resolve the issue?

https://www.gratisexam.com/
A. Update the DNS server with the proxy server information.
B. Implement a split horizon DNS server.
C. Reboot the web proxy and then reboot the DNS server.
D. Put the proxy server on the other side of the demarc.

Correct Answer: A
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Proxy servers act as an intermediary for requests from clients seeking resources from other servers. If the DNS server is not communicating with the proxy server,
these requests are not forwarded. Therefore, updating the DNS server with the proxy server information will solve the problem.

QUESTION 42
Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious
user may have changed the switches' settings before they were installed in secure areas.

Which of the following is the MOST likely way in which the malicious user gained access to the switches?

A. Via SSH using the RADIUS shared secret


B. Via HTTP using the default username and password
C. Via console using the administrator's password
D. Via SNMP using the default RO community

Correct Answer: B
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
A new network switch is accessed via HTTP to perform the initial configuration. The username and password used is a factory default.

QUESTION 43
A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at
the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct
interface.

Which of the following would be the result of this action?

https://www.gratisexam.com/
A. The normal amount of errors and the connection problem has been resolved.
B. The interface status will indicate that the port is administratively down.
C. The traffic will flow, but with excessive errors.
D. The interface status will show line protocol down.

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Devices of different types are connected with a straight through cable (patch cable). In this case, it is used to connect two devices of the same type. It is for this
reason that the interface will display the line protocol down status.

QUESTION 44
Which of the following helps prevent routing loops?

A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon

Correct Answer: D
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
Routing loops occur when the routing tables on the routers are slow to update and a redundant communication cycle is created between routers. Split horizon,
which prevents the router from advertising a route back to the other router from which it was learned, can be used to resist routing loops. Poison reverse, also
known as split horizon with poison reverse, is also used to resist routing loops.

QUESTION 45
After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites.

Which of the following should be checked?

A. Server host file


B. Subnet mask

https://www.gratisexam.com/
C. Local hosts file
D. Duplex settings

Correct Answer: C
Section: Troubleshooting
Explanation

Explanation/Reference:
Explanation:
The local hosts file is a text file that contains hostname-to-IP address mappings. By default, host to IP address mappings that are configured in the Hosts file
supersede the information in DNS. If there is an entry for a domain name in the Hosts file, then the server will not attempt to query DNS servers for that name.
Instead, the IP address that is configured in the Hosts file will be used. If the IP address corresponding to a name changes and the Hosts file is not updated, you
may be unable to connect to the host.

QUESTION 46
The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that
would be able to operate at a higher frequency than their phones.

Which of following standards should be used?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.1x

Correct Answer: A
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
In this question, we need a wireless network that operates at a frequency higher than the 2.4GHz frequency.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless
connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11a standard supports speeds up to 54Mbps and uses the 5-GHzband.

QUESTION 47
A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength.

Which of the following standards is implemented on the network?

https://www.gratisexam.com/
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g

Correct Answer: C
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless
connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
802.11b supports speeds up to 11Mbps and uses the 2.4GHz frequency.
In this question, the user is using an 802.11n WLAN card. Although the 802.11n WLAN card can support speeds up to 300Mbps, the user is only able to connect at
11Mbps because the user is connected to a wireless network configured to use 802.11b.

QUESTION 48
A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video
streaming to multiple devices.

Which of the following would be the appropriate wireless technology for this design?

A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a

Correct Answer: B
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
In this question, we need a wireless network capable of supporting HD video streaming to multiple devices. We therefore need the fastest wireless network speed
available.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless
connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11ac standard is the fastest wireless network supporting speeds of over 3Gbps and uses the 5-GHz band.

https://www.gratisexam.com/
QUESTION 49
A company is deploying a new wireless network and requires 800Mbps network throughput.

Which of the following is the MINIMUM configuration that would meet this need?

A. 802.11ac with 2 spatial streams and an 80MHz bandwidth


B. 802.11ac with 3 spatial streams and a 20MHz bandwidth
C. 802.11ac with 3 spatial streams and a 40MHz bandwidth
D. 802.11ac with 4 spatial streams and a 160MHz bandwidth

Correct Answer: A
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
Spatial streaming is used in wireless communications where multiple-input-multiple-output(MIMO) is being used. With MIMO, multiple antennas are used for
transmission and reception. MIMO was available in 802.11n but its capabilities have been extended in 802.11ac.
802.11ac supports a mandatory 80 MHz channel bandwidth for stations (vs. 40 MHz maximum in 802.11n), 160 MHz available optionally and more (up to 8) special
streams.
A single antenna and 80 MHz channel bandwidth provides a bandwidth of 433Mbps. In this question, we need a minimum bandwidth of 800Mbps. Two antennas
and 80 MHz channel bandwidth provides a bandwidth of 867Mbps and therefore meets the requirement.

QUESTION 50
A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to
establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in
perfect condition.

Which of the following should the technician check to ensure the new host will connect?

A. Confirm the new host is using 10GBaseSR due to the manufacturing environment
B. Confirm the new host is compatible with 10BaseT Ethernet
C. Confirm the existing 10Base2 equipment is using the proper frame type
D. Confirm that CSMA/CD is disabled on the Ethernet network

Correct Answer: B
Section: Industry standards, practices, and network theory
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:
The question states that the equipment is old and that CAT3 cabling is being used.
10BaseT Ethernet networks are old and slow by today’s standards. 10BaseT Ethernet networks use CAT3 UTP cabling and offer a maximum bandwidth of just
10Mpbs.
A new host computer nowadays will have a network card that supports 1000Mpbs to be used with CAT5, CAT5e or CAT6 network cables in a 1000BaseT network.
In this question, we need to check that the network card on the new host computer is backward-compatible with the old 10BaseT network.

QUESTION 51
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file.

This standards and policies document is usually called which of the following?

A. SOP
B. BEP
C. AUP
D. SLA

Correct Answer: C
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
AUP stands for Acceptable Use Policy. An Acceptable Use Policy defines what a user can or cannot do with his or her computer during business hours. For
example, using the company’s Internet connection to look at the sports scores on a sports website may be deemed inappropriate or unacceptable during business
hours. Other examples include the use of social media websites such as Facebook or using Instant Messaging clients to chat to your friends.

QUESTION 52
A service provider is unable to maintain connectivity to several remote sites at predetermined speeds.

The service provider could be in violation of the:.

https://www.gratisexam.com/

https://www.gratisexam.com/
A. MLA.
B. SLA.
C. SOW.
D. MOU.

Correct Answer: B
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
SLA stands for Service Level Agreement. This is a common document in business used to define a minimum standard of service that a customer can expect from a
supplier. SLA’s are particularly common in the I.T. sector where a service provider is offering a service to a customer. As a customer, you want your hosted services
and Internet or WAN connections to be available all the time. SLAs often guarantee 99.9% uptime for a service.
In this question, the service provider is providing WAN links to remote sites with a guaranteed bandwidth on the WAN links. A failure to maintain the connectivity to
the remote sites would be a violation of the Service Level Agreement (SLA).

QUESTION 53
A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a
few hours per quarter.

Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?

A. MLA
B. MOU
C. SOW
D. SLA

Correct Answer: C
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
SOW stands for Statement of Work. When a company has been hired for a project that involves many tasks, a statement of work is often issued at the start of the
project.
The SOW will outline the tasks or activities in a project, their costs and the timelines for deliverables within the project. In an IT project, the SOW would define what
tasks will be performed (hardware and software upgrades etc.), why the work is being done and how long each stage of the project will take.

QUESTION 54

https://www.gratisexam.com/
A technician has prolonged contact with a thermal compound.

Which of the following resources should be consulted?

A. HCL
B. MSDS
C. SLA
D. HVAC

Correct Answer: B
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
MSDS stands for Material Safety Data Sheet. An MSDS is a health and safety document that contains information on the potential hazards of working with a
chemical product and how to work safely with the chemical product.
In this question, the thermal compound is a chemical product so the MSDS will provide information about the effects of prolonged contact with the thermal
compound.

QUESTION 55
An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the
server room and result in suffocation.

Which of the following systems are they MOST likely discussing?

A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups

Correct Answer: A
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
Fire suppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different
ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A
common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the

https://www.gratisexam.com/
server room is to fill the server room with an inert gas such as carbon dioxide.

QUESTION 56
Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?

A. 110 block
B. MDF
C. DSU
D. CSU

Correct Answer: B
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
MDF stands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel rack accessible from both sides. On one side of the rack is cabling
that connects the service provider’s network. The other side of the rack is for the connections to the customer’s equipment.

QUESTION 57
In an engineering office, all plotters are configured via static IP.

Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO).

A. Rack monitoring
B. Device placement
C. Wall plate labeling
D. Room numbering
E. Patch panel labeling

Correct Answer: CE
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
By labeling each wall plate (where the plotters’ network cables plug in to) and the patch panel ports (where the cables connecting to each wall plate terminate), we’ll
be able to see which device is connected to which port. If equipment moves are required, we will be able to easily see which patch cables need to be moved in the
patch panel.

https://www.gratisexam.com/
QUESTION 58
A network technician is attempting to locate a switch connected to the fourth floor west side of the building.

Which of the following will allow quick identification of the switch, when looking at a logical diagram?

A. Building layout
B. Patch panel labeling
C. Packet sniffing
D. Naming conventions

Correct Answer: D
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
The building in this question has several floors and the floors are large enough to be identified by area such as ‘west side’ etc. It is likely that a logical diagram of the
network in such a building would be quite complicated and the network is likely to have several switches.
A naming convention is a standard for naming items, in this case, networking components. When it comes to naming switches, using names like Switch1, Switch2
etc. for example won’t help when you need to know where the switches are located.
In a building with multiple floors with each floor large enough to be defined by area names, you could a naming convention like SW1-FL4-WS where SW1 identifies
the item as a Switch with the number 1, FL4 identifies the location as Floor 4 and WS further identifies the location as West Side. Using this convention, switch
number 2 on the third floor east side would be named SW2-FL3-ES.

QUESTION 59
Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?

A. Configuration procedures
B. Stakeholder notification
C. Impact analysis
D. Rollback procedure

Correct Answer: D
Section: Industry standards, practices, and network theory
Explanation

Explanation/Reference:
Explanation:
A rollback procedure is something that should be documented in a change management document. In this question, the network technician has made a change

https://www.gratisexam.com/
during a maintenance window. The change has not worked so the technician needs to ‘undo’ the change he made to revert the system back to its previous state.
The network technician can then investigate why the change has not worked as expected.
The rollback procedure is the list of steps required to undo the changes made to the system.

QUESTION 60
DRAG DROP

Your company recently purchased a new building down the street from the existing office.

For each of the tasks below, select the appropriate antenna type and encryption object for all wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal propagation, while maximizing security.
2. Restrict the wireless signal generated by the access points (AP's) inside Building 1, so that it minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1's internal wireless network is for visitors only and must not require any special configuration on the visitor's device to connect.

Instructions: When you have completed the simulation, select the Done button to submit.

Select and Place:

https://www.gratisexam.com/
Correct Answer:

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 61
SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 access points and a single switch. The network must meet the
following parameters.

The SSIDs need to be configured as corpnet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access points and Switch are on should only support 30 devices maximum

The access Points should be configured to only support TKIP clients at a maximum speed

Instructions: Click on the devices to review their information and adjust the setting of the APs to meet the given requirements.

https://www.gratisexam.com/
Correct Answer: See explanation below
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:
This simulation is still under construction. On the first exhibit, the layout should be as follows

https://www.gratisexam.com/
Access Point Name AP1
IP Address 192.168.1.3
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes

Mode G
Channel 1

Speed Auto
Duplex Auto

WPA
Passphrase S3cr3t!

Exhibit 2 as follows

Access Point Name AP2


IP Address 192.168.1.4
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes

Mode G
Channel 6

Speed Auto
Duplex Auto

WPA
Passphrase S3cr3t!

Exhibit 3 as follows

Access Point Name AP3


IP Address 192.168.1.5
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes

Mode G
Channel 11

https://www.gratisexam.com/
Speed Auto
Duplex Auto

WPA
Passphrase S3cr3t!

QUESTION 62
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?

A. Warrant
B. Legal document
C. Chain of custody
D. Forensic report
E. Documentation of the scene

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 63
A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email?

A. CNAME
B. MX
C. PTR
D. A

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 64

https://www.gratisexam.com/
Which of the following is considered a classless routing protocol?

A. IGRP
B. IS-IS
C. RIPv1
D. STP

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 65
A network technician needs to set up two public facing web servers and wants to ensure that if they are compromised the intruder cannot access the intranet.

Which of the following security techniques should be used?

A. Place them behind honeypots


B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 66
A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of
its interfaces.

How many broadcast domains are present in this company's network?

A. 1
B. 2

https://www.gratisexam.com/
C. 5
D. 16
E. 28

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 67
A company plan established to resume normal system operations following a disruption in business would be described as which of the following?

https://www.gratisexam.com/

A. First responders
B. User awareness training
C. Disaster recovery
D. Business continuity

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 68
A client is concerned about a hacker compromising a network in order to gain access to confidential research data.

Which of the following could be implemented to redirect any attackers on the network?

A. DMZ
B. Content Filter

https://www.gratisexam.com/
C. Botnet
D. Honeypot

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 69
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a
wired connection shows 5 of 5 packets respond.

Which of the following tools should be used to discover the cause of the poor performance?

A. Port scanner tool


B. Interface monitoring tool
C. Packet capture tool
D. Spectrum Analyzer tool

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 70
A network technician has just received an email regarding a security issue detected on the company's standard web browser.

Which of the following will MOST likely fix the issue?

A. Firmware update
B. OS update
C. Vulnerability patch
D. Driver update

Correct Answer: C

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 71
There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d.

Which of the following is the MOST probable reason the vendor made this suggestion?

A. It is a rapid version of spanning tree that uses BPDU to detect problems


B. It is a regular version of port mirroring that uses hellow packets to detect loops
C. It is a simple version of spanning tree that uses BPDU to detect problems
D. It is a rapid version of port mirroring that uses BPDU to detect problems

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 72
A NAC service has discovered a virus on a client laptop.

In which of the following locations would the NAC service place the laptop?

A. On the DMZ network


B. On the sandbox network
C. On the honeypot
D. On the quarantine network

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 73
A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become
disconnected from the network and now require a technician to fix the issue locally at each PC.

Which of the following should be done to prevent this issue in the future?

A. Enable automatic rebooting of the PCs after patching is completed


B. Require the patching server to update the oldest PCs off hours
C. Disable automatic driver updates to PCs on the patching server
D. Throttle the connection speed of the patching server to match older PCs

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 74
A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel.

The technician has cabled this port to be used with which of the following?

A. 10baseT
B. POTS
C. 568B
D. 568A

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 75
Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?

A. MPLS

https://www.gratisexam.com/
B. ESP
C. GRE
D. PPP

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 76
A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the
internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers.

Which of the following is the BEST way to mitigate this risk?

A. Add an outbound ACL to the firewall


B. Change the FTP server to a more secure SFTP
C. Use the implicit deny of the firewall
D. Move the server to the DMZ of the firewall

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 77
A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php

Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the
freesmartphone.it domain?

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

https://www.gratisexam.com/
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 78
Which of the following types of equipment should be used for telecommunications equipment and have an open design?

A. 2/4 post racks


B. Rail Racks
C. Vertical frame
D. Ladder racks

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 79
A facility would like to verify each individual's identity prior to allowing access to the datacenter. Additionally, the facility would like to ensure that users do not tailgate
behind other users.

Which of the following would BEST meet these goals?

A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap
B. Implement a security guard at the facility entrance and a keypad on the datacenter entrance
C. Implement a CCTV camera and a proximity reader on the datacenter entrance
D. Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance

Correct Answer: A
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:

QUESTION 80
A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb.

Which of the following media would be optimal for this application?

A. CAT5e cable
B. Coax cable
C. Fiber Optic cable
D. CAT6 cable

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 81
Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the
switches he receives "Destination Unreachable".

Which of the following issues could this be?

A. Denial of service attack


B. Misconfigured DNS settings
C. Misconfigured Split Horizon
D. RADIUS authentication errors

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 82
A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire.

Which of the following is the best choice for the fire suppression system?

A. Portable extinguishers
B. Wet Pipe
C. Clean Gas
D. Dry Pipe

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 83
Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsibility

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 84
A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The
report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the
missing update or patch.

Which of the following solutions would work BEST to present this data?

https://www.gratisexam.com/
A. Security policy
B. Penetration scan
C. Virus scan
D. Vulnerability scanner

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 85
Which of the following is a logical host on the network where unauthorized users believe they are on the production network?

https://www.gratisexam.com/

A. Virtual server
B. VLAN
C. Honeypot
D. Virtual Terminal

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 86
Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor support technician to properly set up and configure the SAN on the
network. In order to begin SAN I/O optimization, which of the following would Joe need to provide the vendor support technician?

A. Network diagrams
B. Baseline documents

https://www.gratisexam.com/
C. Asset management document
D. Access to the datacenter

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 87
Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The
manufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network.

Which of the following should Joe perform in order to resolve this issue?

A. Load the latest hardware drivers for his USB drive


B. Install the latest OS on his computers
C. Download the latest playback software for his musicfiles
D. Flash the latest firmware for his router

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 88
A technician has completed a survey of a wireless network and documented signal strengths.

This document is known as which of the following?

A. LogicalNetwork map
B. Heat map
C. Network baseline
D. Bandwidth survey

Correct Answer: B

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 89
A network technician must allow use of HTTP from the internet to an internal resource running HTTP.

This is an example of which of the following?

A. Dynamic DNS
B. Virtual Private networking (VPN)
C. Dynamic NAT
D. Port Forwarding

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 90
A network topology in which all nodes have point to point connections to all other nodes is known as which of the following?

A. Mesh
B. Ring
C. Bus
D. Star

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 91

https://www.gratisexam.com/
A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home.

Which of the following servers should the technician implement?

A. DNSSEC
B. PPP
C. RAS
D. VLAN
E. NAT

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 92
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high.

Which of the following should the technician use to verify if this is a concern?

A. Log management
B. Network diagram
C. Network baseline
D. Real time monitor

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 93
A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should
have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN.

Which of the following is the BEST way to configure the new wireless network in the new building?

https://www.gratisexam.com/
A. Use the same SSIDs on different channels and AP isolation
B. Use different SSIDs on different channels and VLANs
C. Use different SSIDs on the same channels with VLANs
D. Use the same SSIDs on same channels with AP isolation

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 94
A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened.

Which of the following should be one FIRST to resolve the problem?

A. Ensure that port 20 is open


B. Ensure that port 161 is open
C. Flush the DNS cache on the local workstation
D. Validate the security certificate from the host

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 95
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?

A. Frequency
B. Modulation
C. RF interference
D. Spectrum

Correct Answer: B

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 96
A network administrator is following best practices to implement firewalls, patch management and policies on the network.

Which of the following should be performed to verify the security controls in place?

A. Penetration testing
B. AAA authentication testing
C. Disaster recovery testing
D. Single point of failure testing

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 97
Which of the following is a connectionless protocol? (Select TWO)

A. ICMP
B. SSL
C. TCP
D. SSH
E. HTTP
F. UDP

Correct Answer: AF
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 98
Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on
the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address.

Which of the following is an addressing scheme that will work in this situation?

A. Teredo tunneling
B. Private
C. APIPA
D. Classless

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 99
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route
packages.

This is an example of which of the following network segmentation techniques?

A. Compliance implementation
B. Separate public/private newtorking
C. Honeypot implementation
D. Performance optimization

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 100
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom.

https://www.gratisexam.com/
Which of the following is the malicious student implementing?

A. Removing the AP from the classroom


B. ACL
C. Jamming
D. Firewall
E. IPS

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 101
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IP Zone Dest IP Zone Port Action
Any Untrust Any DMZ 80 Allow

The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 102
Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?

A. Multiplexing

https://www.gratisexam.com/
B. Zero-day attack
C. Smurfing
D. Blue jacking

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 103
A technician is concerned about security and is asked to set up a network management protocol.

Which of the following is the best option?

A. SLIP
B. SNMPv3
C. TKIP
D. SNMPv2

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 104
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network.

Which of the following ACL should the technician configure? (Select TWO)

A. PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80


B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
C. PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
D. PERMIT SRCIP: ANYSPORT:80 DSTIP:192.168.0.0/24 DPORT:80
E. PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80

https://www.gratisexam.com/
Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 105
A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building.

Which of the following is the MOST common connector that will be used on the switch to connect the media converter?

A. FDDI
B. Fiber coupler
C. MT-RJ
D. ST

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 106
Which of the following protocols is considered a hybrid routing protocol?

A. OSPF
B. RIPv2
C. IS-IS
D. BGP
E. EIGRP

https://www.gratisexam.com/

https://www.gratisexam.com/
Correct Answer: E
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 107
Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her
corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP
address.

Which of the following is the MOST likely reason why the router is not receiving a DHCP address?

A. The administrator has enabled DHCP snooping on the network


B. The administrator is blocking DHCP requests that originate from access points
C. The administrator is blocking the wireless router's MAC address using MAC filtering
D. The Administrator has implemented a feature that only allows white-listed MAC addresses

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 108
As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO)

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5

Correct Answer: BC
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:

QUESTION 109
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network.

Which of the following should the technician check FIRST?

A. WAP placement
B. Encryption type
C. Bandwidth saturation
D. WAP SSID

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 110
A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and it
happens several times throughout the day.

Which of the following troubleshooting methods should the technician perform FIRST?

A. Test the theory


B. Establish a plan of action
C. Gather information
D. Question the obvious

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 111

https://www.gratisexam.com/
A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results:
Avg % Processor Time =10%
Avg Pages/Second = 0
Avg Disk Queue Length = 3

Based on the results, which of the following is causing a bottleneck?

A. Hard drive
B. Memory
C. Processor
D. NIC

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 112
A technician has responded to a security issue with an employee's computer.

Which of the following basic forensic steps should be taken NEXT?

A. Secure the area


B. Initiate Data collection
C. Create the forensics report
D. Verify the chain of custody

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 113
A network technician has downloaded the latest vendor switch O/S, which includes new features and enhancements.

Which of the following should the technician perform FIRST when updating the switches?

https://www.gratisexam.com/
A. Backup the current configuration for each switch
B. Install during non-business hours to test the system
C. Test the O/S on one of the production switches
D. Power cycle the company's border router

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 114
Which of the following protocols is used to send mail to another server on the Internet?

A. RTP
B. SNMP
C. POP
D. SMTP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 115
Which of the following ports is used to provide secure sessions over the web by default?

A. 22
B. 25
C. 80
D. 5004

Correct Answer: A
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:

QUESTION 116
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?

A. Social engineering
B. Bluesnarfing
C. Man-in-the-middle
D. Evil Twin

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 117
Which of the following is the BEST way to prevent various types of security threats throughout the network on a routine basis?

A. Disaster recovery planning


B. User training and awareness
C. Penetration testing
D. Business continuity training

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 118
A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-
step change. The network manager decides to initiate a rollback.

Which of the following describes what the network administrator will do NEXT?

https://www.gratisexam.com/
A. Return the system to step four since this was the last working step.
B. Request additional time since the change is near completion.
C. Leave the change as is and inform users of a workaround.
D. Return the system back to the original state before the change.

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 119
A network administrator was told by the Chef Information Officer (CIO) to set up a new office with a network that has redundancy.

Which of the following topologies would the network administrator need to administer?

A. Hybrid
B. Bus
C. Mesh
D. Partial mesh
E. Star

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 120
An engineer is reviewing network logs on a management switch and discovers that, compared to previous reports, a large amount of traffic is coming from a
particular node. Upon further investigation, the engineer determines traffic coming from the port in question is using points that indicate NAT is occurring
somewhere downstream from that point. After conferring with another network manager, the team determines a user has added an unauthorized SOHO WLAN
router to the network. Among the vulnerabilities that could result from such an action is the possibility of the user inadvertently connecting the LAN interface of the
SOHO router into the LAN port coming from the corporate network.

This configuration would MOST likely result in which of the following scenarios?

https://www.gratisexam.com/
A. Excessive interface on the corporate LAN port
B. DHCP scope exhaustion
C. Evil twin stacks
D. Competing DHCP servers on a single LAN

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 121
An organization wants to improve its ability to detect infiltration of servers in a DMZ, IPS/IDS solutions are currently located on the edge between DMZ and Untrust,
and DMZ and Trust.

Which of the following can increase visibility inside the DMZ?

A. Layer 7 firewall
B. Honeypot
C. NAC server
D. Host-based firewalls in the DMZ

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/DMZ_(computing)

QUESTION 122
A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running
from the back of the user’s VoIP phone is routed directly under the rolling chair and has been smashes flat over time.

Which of the following is the most likely cause of this issue?

A. Cross-talk
B. Electromagnetic interference

https://www.gratisexam.com/
C. Excessive collisions
D. Split pairs

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 123
Which of the following tools would a network technician use to troubleshoot a span of single-mode fiber cable?

A. Punchdown tool
B. Spectrum analyzer
C. Ethernet tester
D. OTDR

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 124
A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet
browsers, the application began to fail. Many users rolled back the update, but this did not correct problem.

Which of the following should the company do to reduce this type of action from affecting the network?

A. Implement a disaster recovery plan with a hot site to allow users to continue working.
B. Segment the network and create a test lab for all updates before deployment.
C. Verify the update hashes match those on the vendor’s website.
D. Coordinate the Internet Server update to coincide with the users’ updates.

Correct Answer: B
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:

QUESTION 125
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and
external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement
of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in
the infrastructure.

The scope of activity as described in the statement of work is an example of:

A. session hijacking
B. vulnerability scanning
C. social engineering
D. penetration testing
E. friendly DoS

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 126
A network technician is selection the best way to protect a branch office from as many different threat from the Internet as possible using a single device.

Which of the following actions would meet the objective?

A. Configure a network-based firewall.


B. Configure a firewall with UTM.
C. Configure a host-based firewall.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 127
A network technician has been tasked to provide a local office with wireless Internet access. The network technician had determined the users will need a wireless
router that provides a maximum of 54Mbps of bandwidth while operating in the 2.4Ghz band.

Which of the following wireless standards will the network technician deploy?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:
802.11g provides transmission over short distances at up to 54Mbps in the 2.4GHz bands.

Incorrect Answers:
A: 802.11a provides transmission at up to 54Mbps but it operates in the 5GHz band.
B: 802.11b operates in the 2.4GHz band but only provides transmission at up to 11Mbps.
D: 802.11n operates in the 2.4GHz band but uses spatial multiplexing to provide transmission in excess of 54Mbps.

QUESTION 128
A technician is looking at an issue with a computer connecting to the network. The technician determines wire 3 of a UTP Ethernet cable run has a break in it. This
computer was previously connected to the switch at 1Gbps throughput. This PC is a kiosk and does not need anything more than 50-60Mbps connection speed.

Which of the following can the technician do to resolve the issue quickly?

A. Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex.
B. Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex.
C. Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex.
D. Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex.

Correct Answer: D
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
http://pinouts.ru/NetworkCables/ethernet_10_100_1000_pinout.shtml

QUESTION 129
Which of the following physical devices provides the BEST security to a datacenter?

A. Cipher lock
B. Thumbprint reader
C. Video monitoring
D. Mantrap
E. Key pad

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 130
A network administrator need to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25.

Which of the following devices will allow for deep packet inspection?

A. Layer 7 firewall
B. Web proxy
C. Layer 3 switch
D. Protocol analyzer

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
http://www.infosectoday.com/Articles/Deep_Packet_Inspection_Technologies.htm

QUESTION 131
An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN.

https://www.gratisexam.com/
Which of the following describes this methodology?

A. PKI
B. Federated identity
C. Two-factor authentication
D. Biometric authentication
E. AAA

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 132
A technician uses a cable tester to verify the pinout in an Ethernet cable. After testing each pin, the technician records the following output:

Based on this information, which of the following identification describes this cable?

A. Crossover cable
B. Rollover cable
C. Patch cable
D. RJ-48 cable

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 133
An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address.

https://www.gratisexam.com/
Which of the following is the employee MOST likely using?

https://www.gratisexam.com/

A. Proxy server
B. Least-cost routing
C. IPv6
D. VPN concentrator

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 134
A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network.

Which of the following should system administrator do to confirm the network is protected?

A. Analyze packet captures.


B. Utilize netstat to locate active connections.
C. Use nmap to query known ports.
D. Review the ID3 logs on the network.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Packet_analyzer

QUESTION 135

https://www.gratisexam.com/
A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up
and the network technician can ping devices in all office trailers, however, connectivity is sporadic.

Which of the following is MOST likely the cause of this issue?

A. Latency
B. Throttling
C. Interference
D. Split horizon

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 136
A client has combined the voice-data circuit from a provider and is getting the maximum download and upload speeds of 2.0Mbps.

Which of the following services is being used?

A. ADSL
B. T1
C. E1
D. VDSL

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 137
Joe, a network administrator, has installed an SFTP server behind a load-balancing router. He opened port 21 but was unable to establish a connection.

Which of the following ports should he have opened?

https://www.gratisexam.com/
A. Port 20
B. Port 22
C. Port 162
D. Port 443

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol

QUESTION 138
A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email
connectivity.

Which of the following rules should the technician verify FIRST?

A. All outbound traffic is blocked


B. All inbound traffic is blocked
C. A DMZ has been created
D. An implicit deny is enables

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 139
Which of the following network infrastructure implementations would be used to connect two remote sales back to the main campus for all data and voice traffic?

A. Crossover cable
B. Multimode fiber
C. Satellite
D. MPLS

Correct Answer: B

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Multi-mode_optical_fiber

QUESTION 140
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s
computer.

This type of attack is an example of:

A. ARP cache poisoning


B. IP spoofing
C. amplified DNS attack
D. evil twin

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/ARP_spoofing

QUESTION 141
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the
access point.

Which of the following is the MOST likely cause?

A. An evil twin has been implemented.


B. A successful WPS attack has occurred.
C. The user is experiencing ARP poisoning.
D. The user is connected to a botnet.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup

QUESTION 142
A user reports slow performance. A technician troubleshooting the issue users a performance monitoring tool and receives the following results:

Avg. % Processor Time = 15%


Avg. Pages/Second = 5
Avg. Disk Queue Length = 1

Based on these results, which of the following is causing a bottleneck?

A. Hard drive
B. Memory
C. NIC
D. Processor

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 143
A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers
that the switch connecting these workstations has failed.

Which of the following will be the QUICKEST option configure a new switch?

A. Baseline
B. Image
C. Archive
D. Syslog

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 144
A technician is testing a new web-based tool capable of generating automatic teller machine (ATM) cash and service availability reports. The web-based tool was
developed by a consortium of financial institutions.

Which of the following cloud delivery models and technologies are being utilized? (Select two.)

A. SaaS
B. Public
C. Community
D. PaaS
E. Private
F. IaaS

Correct Answer: CE
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 145
Workers in a company branch office are required to click on an initial web page and agree to have web surfing mentioned.

This is an example of:

A. an end-user license agreement


B. an SLA
C. an AUP
D. an MOU

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Acceptable_use_policy

QUESTION 146

https://www.gratisexam.com/
Which of the following ports does SIP use?

A. 443
B. 1720
C. 2427/27/27
D. 5004/5005
E. 5060/5061

Correct Answer: E
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Session_Initiation_Protocol

QUESTION 147
A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server.

Which of the following types of monitoring should be put in place?

A. SNMP
B. SMTP
C. NIDS
D. SMS

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://community.fireeye.com/docs/DOC-6353#jive_content_id_SNMP_Traps_Event_Push

QUESTION 148
After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity is
intermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boiler
rooms of each building.

Which of the following is the MOST likely reason for the connectivity issue?

https://www.gratisexam.com/
A. The wrong SFPs are being used
B. There is interference from the electrical room.
C. CM1 fiber should be used instead
D. There is heat from the boiler room

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/products/collateral/interfaces-modules/transceiver-modules/data_sheet_c78-455693.html

QUESTION 149
Several users at an adjacent office building report connectivity issues after a new building was built in between the two offices. The network technician has
determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the
SSID, encryption and channels are all correct.

Which of the following is MOST likely the cause of this issue?

A. Device saturation
B. Antenna type
C. Bandwidth saturation
D. Interference

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 150
Ann, a technician, connects a pair of switches using redundant links. When she checks the status of the links, one of them is not active, even when she changes
ports.

Which of the following MOST likely disabled the redundant connection to the other switch?

A. Spanning tree
B. IGRP routing

https://www.gratisexam.com/
C. SSID mismatch
D. Port mirroring

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html

QUESTION 151
A network administrator has determined the ingress and egress traffic of a router’s interface are not being correctly reported to the monitoring server.

Which of the following can be used to determine if the router interface uses 64b vs 32b counters?

A. SNMP walk
B. Packet analyzer
C. SYSLOG server
D. Port Scanner

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://www.snmpsoft.com/cmd-tools/snmp-walk/

QUESTION 152
Which of the following is an example of a signaling protocol used in VoIP telephony?

A. VRRP
B. H 323
C. RTSP
D. SIP

Correct Answer: D
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
https://en.wikipedia.org/wiki/Session_Initiation_Protocol

QUESTION 153
A network administrator is troubleshooting an issue with unstable wireless connections in a residence hall. Students on the first and second floors are reporting the
hall’s SSID is not visible in the evenings. The network administrator has verified the wireless system is operating normally.

Which of the following is the MOST likely cause for the problem reported by students?

A. Internet router maintenance is scheduled.


B. An ARP attack is underway.
C. The SSID is set to hidden.
D. A jammer is being used.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 154
Which of the following is the number of bits there are in 1024 bytes?

A. 512b
B. 4096b
C. 8000b
D. 8192b

https://www.gratisexam.com/

Correct Answer: D
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:

QUESTION 155
Policies, procedures and end-user training are effective ways to mitigate:

A. zero-day attacks
B. attempted DDoS attacks
C. man-in-the-middle attacks
D. social engineering attempts

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://www.sans.org/reading-room/whitepapers/bestprac/defenses-zero-day-exploits-various-sized-organizations-35562

QUESTION 156
When a criminal or government investigation is underway, which of the following describes the identification, recovery or exchange of electronic information relevant
to that investigation?

A. Data transport
B. First responder
C. eDiscovery
D. Encryption

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
http://searchfinancialsecurity.techtarget.com/definition/electronic-discovery

QUESTION 157
A network architect is designing a highly redundant network with a distance vector routing protocol in order to prevent routing loops, the architect has configured the
routers to advertise failed routes with the addition of an infinite metric.

Which of the following methods has the architect chosen?

https://www.gratisexam.com/
A. Spanning tree
B. Split horizon
C. Route poisoning
D. Hold down timers

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
https://books.google.co.za/books?id=C5G6DAAAQBAJ&pg=PT1507&lpg=PT1507&dq=advertise+failed+routes+with+the+addition+of+an+infinite
+metric&source=bl&ots=hPhUeuDuis&sig=d2zmlLrjHOSadqWLfeFEPjfNJjU&hl=en&sa=X&ved=0ahUKEwi_z9Gr5vXQAhUhJMAKHRFHCeQQ6AEIGjAA#v=onepa
ge&q=advertise%20failed%20routes%20with%20the%20addition%20of%20an%20infinite%20metric&f=false

QUESTION 158
A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The
network is to be designed to handle a large number of roaming wireless devices.

Which of the following features should the engineer use in order to dynamically limit the number of devices in each broadcast domain?

A. VLAN pooling
B. Subnetting
C. WPA2
D. LWAPP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Lightweight_Access_Point_Protocol

QUESTION 159
A company is setting up a brand new datacenter and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators.
Infrastructure cost is not an issue.

Which of the following should be installed to meet the requirements?

https://www.gratisexam.com/
A. Conduit
B. Cable trays
C. Patch panels
D. Raised floor

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 160
A technician troubleshooting an area that is having difficulty connecting to a WAP.

After identifying the symptoms, which of the following should the technician do NEXT?

A. Document findings.
B. Resolve the issue.
C. Establish the probable cause.
D. Implement a solution.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
http://www.examcollection.com/certification-training/network-plus-network-troubleshooting-methodology.html

QUESTION 161
A network engineer is designing a wireless network that uses multiple access point for complete coverage.

Which of the following channel selections would result in the LEAST amount of interference between each access point?

A. Adjacent access point should be assigned channels 1, 6, and 11 with a 20MHz channel width.
B. Adjacent access points should be assigned channels 2,6, and 10 with a 20MHz channel width.
C. Adjacent access points should be assigned channels 7 and 11 with a 40MHz channel width.
D. Adjacent access points should be assigned channels 8 and 11 with a 40MHz channel width.

https://www.gratisexam.com/
Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
http://www.windowsnetworking.com/articles-tutorials/wireless-networking/tips-assigning-wi-fi-channels.html

QUESTION 162
A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled.

Which of the following options will help to quickly identify the switches connected to each port?

A. Configure TACACs+ on each network device.


B. Enable a discovery protocol on the network devices.
C. Configure each uplink to send LACP discovery units.
D. Enable a packet sniffer on each network device’s uplink port.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:
“Neighbor discovery protocols are essential for network administrators and management tools to accurately construct a view of the network topology. Each
manufacturer has its own supported mix of neighbor discovery protocols, loosely based on how standards-focused that vendor is and how much it wants to pay in
royalties to use proprietary protocols. The two most widely used are LLDP (Link Layer Discovery Protocol), an IEEE standard, and CDP (Cisco Discovery Protocol).”

References:
http://www.networkcomputing.com/networking/5-basic-switch-settings-you-must-know/879127198

QUESTION 163
The BEST way to secure the most vulnerable attack vector for a network is to:

A. Update all antivirus definitions on workstations and servers.


B. Use biometrics and SSO for authentication.
C. Remove unneeded services running on the servers.
D. Provide end-user awareness training to office staff.

Correct Answer: A
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:

QUESTION 164
Which of the following encryption types would MOST likely be used for securing a client-to-server VPN connection?

A. TKIP
B. Kerberos
C. ISAKMP
D. AES

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 165
Host1’s application generates a payload of 2500B of data and sends to Host2.

When the application on Host2 receives the payload it will be:

A. more than 2500B due to encapsulation.


B. 2500B in size.
C. less than 2500B due to decapsulation.
D. 1500B due to the default MTU settings.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
http://techterms.com/definition/payload

QUESTION 166
A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem.

https://www.gratisexam.com/
Which of the following should the technician do NEXT according to the network troubleshooting methodology?

A. Remove the ARP entry the user’s desktop.


B. Identify a suitable time to resolve the issue on the affected desktop.
C. Duplicate the issue in a lab by removing the ARP entry.
D. Document the findings and provide a plan of action.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
http://www.examcollection.com/certification-training/network-plus-network-troubleshooting-methodology.html

QUESTION 167
An administrator notices an abnormally high level of network traffic from a server. Upon logging into the server, the administrator runs the following command:

Which of the following should the administrator use to correlate the active connection with the running service?

A. netstat –p
B. Open task manager
C. route print
D. Open services.mac

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
https://technet.microsoft.com/en-us/library/cc958877.aspx

QUESTION 168
A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the

https://www.gratisexam.com/
other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least
amount of overhead. Additionally, all computers on the network will be part of a single VLAN. The connection between these computers should produce the highest
throughput possible, in the most cost effective manner.

Which of the following devices would be MOST appropriate?

A. A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gb Layer 2 switch.
B. A UTM should be used as a gateway device, with BGP as the routing protocol. The computers should be connected to one another using 1Gb Fibre Channel.
C. A router should be used as a gateway device, with EIGRP as the routing protocol. The computers should be connected to one another using a single 802.11N
MIMO access point.
D. A router should be used as a gateway device, with OSPF as the routing protocol. The computers should be connected to one another using a Gb Layer 3 switch.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:
A Gb Layer 2 switch is the cheapest switching solution offering 1Gbps network connectivity between the computers. RIPv2 has a lower overhead as required in the
question.

Incorrect Answers:
B: A 1Gb Fibre Channel network is expensive and is no faster than a 1Gbps network switch. Furthermore, the computers would require Fibre Channel network
adapters that do not come as standard on off-the-shelf computers.

C: An 802.11N MIMO access point is a wireless access point. These typically run at 300mbps which is slower than a 1Gbps network switch. Furthermore, the
computers would require MIMO network adapters that do not come as standard on off-the-shelf computers.

D: A layer 3 switch is more expensive than a layer 2 switch. The question states that all the computers are in the same VLAN. Therefore, there is no need for inter-
VLAN routing so a layer 3 switch is not required. OSPF also has a higher overhead than RIPv2.

QUESTION 169
A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the
company file server. Right now, any employee can upload and download files with basic system credentials.

Which of the following would require additional credentials?

A. Kerberos authentication
B. MDS authentication
C. Multifactor authentication

https://www.gratisexam.com/
D. Single sign-on authentication

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 170
A network technician replaced a faulty Ethernet cable. The technician replaced one side of the patch in the incorrect part of the patch panel. Within a few minutes,
the technician was informed that users were experiencing slow or no Internet connectivity all over the building. A broadcast storm began.

After removing the replacement cable, which of the following should the technician do NEXT?

A. Replace the cable during the next maintenance window.


B. Review labeling and logical network diagram documentation.
C. Attempt to isolate the storm to the domain by rebooting the switch.
D. Re-terminate all of the other Ethernet cables on the switch to isolate the issue.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 171
In a network that requires multilayer switches to use authentication via RADIUS/TACACS+, which of the following access control models will the switches need to
utilize?

A. 802.1q
B. 802.3af
C. PKI
D. 802.1x

Correct Answer: D
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t11/ht_8021x.html#wp1258507

QUESTION 172
A network administrator is comparing several different wireless technologies. To calculate the effective maximum file transfer rate instead of the theoretical, which
of the following should be measured?

A. Throughput
B. Latency
C. Goodput
D. Bandwidth

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Wireless_Throughput_Calculations_and_Limitations

QUESTION 173
An organization is required to implement a wireless network. The organization must implement wireless routers compatible with 802.11ac protocol that have
maximum possible range.

Which of the following wireless router frequencies is a viable option?

A. 2.4GHz
B. 3.7GHz
C. 5.0GHz
D. 6.0GHz

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 174
A firewall technician has received calls stating the network is running slowly. The technician has found the firewall is functioning properly.

https://www.gratisexam.com/
Which of the following should the technician review to determine the cause of the slow performance?

A. SNMP traps
B. Heat maps
C. Top talkers
D. Port scanner

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 175
A network’s design includes gateways connecting an assembly-line network. The assembly-line network users specialized cabling and interfaces to allow the
assembly-line robots to communicate with one another.

The IP is connecting the technician workstations with which of the following network types?

https://www.gratisexam.com/

A. CSU/DSU
B. SCADA/ICS
C. IS-IS
D. LAN

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/SCADA

https://www.gratisexam.com/
QUESTION 176
A network administrator updated an Internet server to evaluate some new featured in the current release. A week after the update, the Internet server vendor warns
that the latest release may have introduced a new vulnerability and a patch is in the works.

Which of the following should the network administrator do to BEST migrate this risk?

A. Enable the host-based firewall on the Internet server.


B. Enable HIPS to protect the server until the patch is released.
C. Utilize WAF to restrict malicious activity to the Internet server.
D. Downgrade the server and defer the new feature testing.

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 177
Which of the following anti-malware solutions should be implemented to deter attackers from loading custom files onto a distributed target platform?

A. Cloud-based anti-malware
B. Host-based anti-malware
C. Network-based anti-malware
D. Signature-based anti-malware

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Intrusion_detection_system

QUESTION 178
A company has decided to upgrade its legacy phone system to VoIP. The new phones will download the configurations from a TFTP server each time they boot up.

Which of the following firewall ports must be opened to ensure the phones can communicate with the server?

A. 20

https://www.gratisexam.com/
B. 53
C. 69
D. 161

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/Trivial_File_Transfer_Protocol

QUESTION 179
A technician needs to set up uplink ports for multiple switches to communicate with one another. ALL VLANs should be transferred from the designed server switch.

Which of the following should be set on the uplink ports if VLAN 1 is not the management VLAN? (Select two.)

A. STP
B. Port mirroring
C. Port security
D. 802.1x
E. 802.1q
F. VTP
G. Link aggregation

Correct Answer: AF
Section: Mix questions
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/98155-tshoot-vlan.html#topic12

QUESTION 180
A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they
are able to access the sites using the web browsers.

Which of the following is the MOST likely cause?

A. ICMP traffic being blocked by the firewall


B. VLAN hopping

https://www.gratisexam.com/
C. TACACS misconfiguration
D. MTU black hole

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://www.bleepingcomputer.com/forums/t/459888/why-i-cant-i-ping-any-website-although-i-can-access-them/

QUESTION 181
When introducing new devices to the network, the organization’s security policy requires that devices be monitored to establish normal traffic patterns for the
device.

Which of the following is generated from initial monitoring?

A. SLA
B. Baseline
C. Forensic log
D. Vulnerability assessment

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
http://searchnetworking.techtarget.com/How-to-set-a-network-performance-baseline-for-network-monitoring

QUESTION 182
An administrator has configured EAP-TLS to support NAC on the network. The company is trying to implement which of the following standards?

A. Kerberos
B. SNMPv3
C. 802.3af
D. 802.1x

Correct Answer: D
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol

QUESTION 183
UDP is BEST used for:

A. remote desktop connections


B. file download
C. streaming media
D. secure tunneling

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/User_Datagram_Protocol

QUESTION 184
A network administrator believes that the traffic from a load balancer is only being sent to a single backend server. However, the administrator does not have
administrative access to the load balancers or the backend servers.

Which of the following should the administrator do to verify this suspicion?

A. Selectively disable the switch ports connected to the load balancers to determine if traffic is still flowing.
B. Enable port mirroring on the switch connected to the backend servers and analyze the traffic captured.
C. Create a port channel on the switch that includes all of the backend servers and verify the interfaces all have equal traffic.
D. Configure the switch port connected to the load balancer’s ingress port to send traffic to a collector for analysis.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 185
A technician is configuring mobile devices for new employees.

https://www.gratisexam.com/
Which of the following documents should be updated to show that the new employees are receiving these mobile devices?

A. Network diagram
B. Asset management
C. Organizational chart
D. Standard operating procedure
E. Change management

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 186
Given the following system requirements:
Automatically assigns IP addresses
Only authorized workstations can be connected
Notify the network administrator of potentially malicious activity

Which of the following must be implemented to satisfy these conditions? (Select three.)

A. DNS
B. Content filtering
C. MAC filtering
D. NIDS
E. VPN
F. RADIUS
G. DHCP server
H. URL cache
I. Load balancer

Correct Answer: CDG


Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
https://en.wikipedia.org/wiki/MAC_filtering
https://en.wikipedia.org/wiki/Intrusion_detection_system
http://whatismyipaddress.com/dhcp

QUESTION 187
A network engineer sends the firewall administrator the following packet capture of a suspicious packet received by the company main web server:

After receiving the suspicious packet, the firewall administrator reviews the following ACL, which was configured on the border firewall:

Which of the following statements BEST describes scenario?

A. The suspicious packet was sent to the web server by an internal host.
B. The packet is legitimate traffic and was blocked by the web service.
C. The suspicious packet made it through the firewall due to an ACL misconfiguration.
D. The web server has been compromised and is responding with malformed packets.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 188
A company technician has set up the network so that all external protections and internal protections across the network are segregated from any malicious attacks
and there are firewalls configured on both sides of the DMZ. During the configuration review of the device installation, there is evidence of unauthorized network
traffic penetrating the internal network.

Which of the following is either missing or incorrectly configured in the firewall settings?

https://www.gratisexam.com/
A. Stateful settings
B. UTM
C. ACL
D. Implicit deny
E. Stateless settings

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://technet.microsoft.com/en-us/library/cc700820.aspx

QUESTION 189
Users report they are receiving an unusual amount of suspicious email from the network administrator.

Which of the following is the cause of this security issue?

A. Ping of death
B. DDoS attack
C. Jamming
D. Malware

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 190
A network technician has been asked to add a user to an administrative group on the network.

Which of the following change management procedures should be followed?

A. Network configuration
B. Potential impact analysis
C. Rollback process

https://www.gratisexam.com/
D. Approval process

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 191
Which of the following is an advantage of utilizing a Layer 2 switch rather than a hub?

A. A switch avoids broadcast storms


B. A switch detects frame collisions
C. A switch increases broadcast domains
D. A switch increases collision domains

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
http://www.ebay.com/gds/Network-Switches-vs-Hubs-Advantages-and-Disadvantages-/10000000177330010/g.html

QUESTION 192
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a backend directory service.

Which of the following services could be run on the VPN concentrator to perform this authentication?

A. Kerberos
B. RADIUS
C. GRE
D. IPsec

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
https://security.stackexchange.com/questions/130095/what-is-the-difference-between-a-radius-server-and-active-directory

QUESTION 193
A network administrator at a large campus has determined that many connectivity issues reported in the residence halls are due to residents connecting the LAN
side of personal routers to the campus network.

Which of the following can be implemented to resolve this problem?

A. Loop protection
B. Disable the default VLAN
C. DHCP snooping
D. Disabling multicast

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 194
In a home network, all clients are accessing the Internet via a single host.

This is an example of which of the following?

A. Point-to-multipoint
B. Peer-to-peer
C. Partial mesh
D. Hybrid

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 195
A PC is having trouble connecting to a remote resource.

https://www.gratisexam.com/
Which of the following will identify the routers a packet travels through and provide real-time feedback regarding latency?

A. tracert
B. NETBIOS
C. ipconfig
D. nslookup
E. ping

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 196
A company is building a new 10Gb Ethernet top of rack network.

Which of the following media is MOST cost-effective for this implementation?

A. CAT5e
B. Multimode fiber

https://www.gratisexam.com/

C. Single mode fiber


D. Fibre channel

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-5000-series-switches/white_paper_c11-522337.html

https://www.gratisexam.com/
QUESTION 197
When setting up a virtual machine, which of the following is an advantage of a virtual NIC as compared to a hardware NIC?

A. A virtual NIC does not require a dedicated slot.


B. A virtual NIC does not have to be assigned an IP address.
C. A virtual NIC is backwards compatible to work with IPv4.
D. A virtual NIC exceeds the IP port limits.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 198
A company would like to offer free wireless Internet to visiting customers without compromising security on their internal network.

Which of the following firewall rules should a technician configure to accomplish this?

A. Block all LAN to LAN traffic


B. Block all LAN to WLAN traffic
C. Block all WAN to LAN traffic
D. Block all WLAN to LAN traffic

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
http://searchsecurity.techtarget.com/WLAN-security-Best-practices-for-wireless-network-security

QUESTION 199
A company is moving into a larger office space. A site survey is performed, a network layout is created, and access points are placed throughout the building.

Which of the following steps should the network technician take NEXT to ensure blanket wireless coverage?

A. Create a heat map and adjust access points.


B. Broadcast the SSID to connect all devices.

https://www.gratisexam.com/
C. Replace all antennas with omni-directional types.
D. Configure 5GHz dual channel broadcasting.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 200
Which of the following would BEST mitigate the risk of social engineering?

A. Man traps
B. Business continuity planning
C. End-user training
D. Penetration testing

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 201
Which of the following is an effect of the protocol mechanism QoS with reference to unified communication?

A. QoS ensures that unified communication video service is delivered as high definition between the unified communication endpoints.
B. QoS enables the unified communication traffic compression algorithm to conserve bandwidth across the WAN.
C. QoS ensures that real time traffic is not delayed between unified communication endpoints.
D. QoS prevents any degradation in the voice/video signal quality by tunneling the packets between the unified communication endpoints.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
QUESTION 202
A network technician is troubleshooting a WAN link that traverses a 100-foot span of RG6. The technician utilizes a Time Domain Reflectometer (TDR) to proof the
cable during the troubleshooting process. The TDR returns a trace that drops off suddenly at 51 feet (15.54 meters).

Which of the following is this indicative of?

A. Open
B. TX/RX reverse
C. Short
D. Crosstalk

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 203
Which of the following WAN technologies decreases bandwidth performance as the distance from the provider increases?

A. DSL
B. T1
C. Frame relay
D. ISDN

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
https://www.lifewire.com/speed-of-dsl-internet-service-817523

QUESTION 204
Which of the following allows for spatial reuse utilizing several multipath distortions as RF data streams?

A. Omni-directional
B. MIMO

https://www.gratisexam.com/
C. Distributed
D. Beam forming

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
https://en.wikipedia.org/wiki/MIMO

QUESTION 205
Which of the following areas MUST all other OSPF areas connect to in a properly configured network?

A. 0
B. 1
C. 110
D. 255

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
http://www.certiology.com/computing/computer-networking/ospf-area-types.html

QUESTION 206
A network technician needs to implement an Ethernet network in a factory environment. Existing shielded twisted pair wiring does not provide enough protection
from the interference of the factory equipment.

Which of the following copper wired Ethernet networks should be used?

A. 10Base2
B. 100BaseFX
C. 100BaseT
D. 10GBaseSR

Correct Answer: C
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
https://en.wikipedia.org/wiki/Fast_Ethernet

QUESTION 207
Which of the following should a first responder perform when arriving at a site to perform a basic forensic investigation?

A. Isolate the area and block radio transmissions to the device.


B. Search for hidden storage devices and duplicate them on site.
C. Power off all computers and devices to stop them from erasing data.
D. Utilize a strong magnet to secure all data on drives from being erased.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

QUESTION 208
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.

Which of the following should be placed on the router interface to accomplish this goal?

A. Static routes for all port 80 traffic


B. DHCP reservations for all /24 subnets
C. ACL for ports 20 and 21
D. MAC filtering using wildcards

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
NEW QUESTIONS:

QUESTION 209
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's
router IP address. Which of the following is the MOST likely problem?

https://www.gratisexam.com/
A. Faulty crossover cable
B. DNS server is down
C. Switching loop
D. Outside interface shutdown

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 210
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).

A. dig
B. nslookup
C. nbstat
D. ifconfig
E. ipconfig

Correct Answer: DE
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 211
When querying a DNS server for an AAAA record, which of the following is an appropriate response?

A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

Correct Answer: D
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 212
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration
change will allow the PING to be successful?

A. Replace the router with a Layer 2 switch that supports VLANs


B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D. AllowICMP to pass through the Router

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 213
Which of the following network devices restricts traffic based on words, signatures, and URLs?

A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 214
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?

https://www.gratisexam.com/
A. Port security is blocking all traffic.
B. An IDS is blocking all traffic.
C. Implicit deny is blocking all traffic.
D. SMTP is blocking all traffic.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 215
Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

https://www.gratisexam.com/
https://www.gratisexam.com/
A. Network security policy
B. Network baseline
C. Logical network diagram
D. Wiring schematic

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 216
A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the
remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

A. Data link
B. Network
C. Session
D. Physical

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 217
Which of the following uses types and codes rather than ports?

A. EIGRP
B. ICMP
C. UDP
D. IPv6

Correct Answer: B
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 218
A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which
of the following network troubleshooting methodology steps should Joe have performed FIRST?

A. Determine if anything has changed


B. Once a theory is confirmed determine the next step is to resolve the problem
C. Implement the solution or escalate as necessary
D. Question the obvious

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 219
Which of the following defines an IP address that is NOT routed on the Internet?

A. Multicast
B. Public
C. Private
D. Classful

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 220
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees
normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?

https://www.gratisexam.com/
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 221
Which of the following specifications would Sara, an administrator, implement as a network access control?

A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 222
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?

A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing

Correct Answer: A
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 223
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?

A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 224
Which of the following provides the MOST protection against zero day attacks via email attachments?

A. Anti-spam
B. Anti-virus
C. Host-based firewalls
D. Patch management

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 225
Which of the following access controls enforces permissions based on data labeling at specific levels?

A. Mandatory access control

https://www.gratisexam.com/
B. Separation of duties access control
C. Discretionary access control
D. Role based access control

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 226
A username provides which of the following?

A. Biometrics
B. Identification
C. Authorization
D. Authentication

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 227
Use of group accounts should be minimized to ensure which of the following?

A. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:

QUESTION 228
Privilege creep among long-term employees can be mitigated by which of the following procedures?

A. User permission reviews


B. Mandatory vacations
C. Separation of duties
D. Job function rotation

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 229
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 230
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

A. TELNET
B. SSH
C. RDP
D. HTTP

https://www.gratisexam.com/
E. DNS
F. FTP

Correct Answer: BC
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 231
Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?

A. RDP
B. SSL VPN
C. ISAKMP
D. TLS 2.0

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 232
Which of the following is based ENTIRELY on using ICMP packets?

A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 233
Which of the following could be used to stop unknown threats?

A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 234
Which of the following describes a DNS server?

A. Translates an IP address to a name


B. Caches commonly viewed web pages
C. Assigns IP addresses to network devices
D. Provides port security for a network

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 235
A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the
technician do NEXT?

A. Implement the solution


B. Question users
C. Test the theory
D. Escalate the problem

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 236
A company has just installed wireless in their office. In one corner of the office building users are not able to establish a connection. Which of the following can be
changed on the AP to help resolve this issue?

A. SSID
B. Channels
C. Signal strength
D. Encryption

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 237
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?

A. CAT3
B. CAT5
C. CAT5e
D. CAT6

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 238
A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point.
Which of the following is the MOST likely reason some users cannot connect?

A. Incorrect channel
B. Weak encryption
C. Incompatible NICs
D. Incorrect SSID

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 239
Which of the following will allow multiple frequencies to be combined?

A. WiMAX
B. MPLS
C. MIMO
D. Channel bonding

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 240
Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?

A. NAT
B. RIP
C. PAT
D. ACL

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 241
Which of the following allows a technician to gather information about the operating system?

A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 242
Which of the following is indicative of an FTP bounce?

A. Arbitrary IP address

https://www.gratisexam.com/

B. Reverse DNS lookups


C. Same Port Number
D. File Transfer Success

Correct Answer: A
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 243
The software that allows a machine to run multiple operating systems at once is called the:

A. Server manager
B. Hypervisor
C. Boot loader
D. Partition manager

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 244
Which of the following routing protocols relies on hop count as its ONLY metric?

A. BGP
B. EIGRP
C. OSPF
D. RIP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 245
A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is
the MOST likely problem?

IP address: 172.16.204.12

https://www.gratisexam.com/
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255

A. DNS address
B. Subnet mask
C. Default gateway
D. Broadcast address
E. IP address

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 246
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an
unknown proxy. This type of attack is known as which of the following?

A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 247
Which of the following is the BEST way to mitigate security threats on a network?

A. Social engineering
B. User training

https://www.gratisexam.com/
C. Incident response
D. Man-in-the- middle

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 248
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?

A. An IPS
B. A protocol analyzer
C. A traffic shaper
D. An IDS

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 249
Which of the following is an IPv6 address?

A. 00:14:38:05:7B:E5
B. 10.10.1.1
C. 192.168.1.1
D. 2001:cdba::3257:9652

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 250
A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the
remote access?

A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 251
Which of the following is a routed protocol that functions at layer 3 of the OSI model?

A. IP
B. Frame relay
C. PPP
D. ADSL

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 252
Something you have, something you are, and something you know are the three tenets of:

A. Social engineering
B. Change management
C. Remote access
D. Access control

https://www.gratisexam.com/
Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 253
A firewall that operates at Layer 7 of the OSI model is known as a(n):

A. Circuit gateway
B. Packet filter
C. Application level
D. Redundant firewall

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 254
Which of the following allows a central point to simultaneously address other points without addressing all of them?

A. Multicast
B. Subnetting
C. Unicast
D. Broadcast

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 255

https://www.gratisexam.com/
Which of the following WAP security features offers the STRONGEST encryption?

A. WPA
B. WPA2
C. WEP
D. Hidden SSID

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 256
Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 257
Which of the following mediums is circuit switched?

A. PSTN
B. ATM
C. Frame relay
D. MPLS

Correct Answer: A

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 258
Which of the following is true about tunneling and encryption?

A. SIP encrypts all data going through the tunnel.


B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 259
Which of the following is a secure way to connect to a device?

A. RSH
B. TFTP
C. SNMPv2
D. SFTP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 260
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

https://www.gratisexam.com/
A. RJ-11
B. BNC
C. LC
D. DB-9

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 261
Which of the following are network topologies? (Select TWO).

A. Ethernet
B. Duplex
C. Star
D. Circular
E. Bus

Correct Answer: CE
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 262
Which of the following uses eight groups of characters for addressing?

A. MAC
B. IPv4
C. IPv6
D. DHCP

Correct Answer: C
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 263
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule.
Which of the following attacks is in progress?

A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 264
Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?

A. 10GBaseLR
B. 10GBaseSR
C. 10GBaseX
D. 10GBaseT

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 265
Which of the following is the network topology in which computers connect in a closed circle?

https://www.gratisexam.com/
A. Bus
B. Mesh
C. Ring
D. Star

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 266
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

A. RTP
B. NTP
C. TFTP
D. ARP

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 267
An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be
installed?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: D
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 268
Which of the following cables has the MOST twists per inch?

https://www.gratisexam.com/

A. CAT3
B. CAT5
C. CAY5e
D. CAT6

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 269
Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?

A. The address is a Class A address.


B. The address is a Class B address.
C. The address is a Class C address.
D. The address is a Class D address.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:

QUESTION 270
Which of the following cables is MOST likely to be terminated into a patch panel?

A. Serial
B. RG-6
C. RG-59
D. CAT6

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 271
Which of the following MUST be kept synchronized in order for Kerberos to work?

A. Certificate
B. Ticket
C. Time
D. Token

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 272
Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch

https://www.gratisexam.com/
Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 273
Which of the following uses certificates as a form of security?

A. Kerberos
B. LDAP
C. PKI
D. CHAP

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 274
Which of the following cables will MOST likely be used to connect to a satellite dish?

A. RG-6
B. CAT5e
C. Fiber
D. CAT6

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 275

https://www.gratisexam.com/
A VoIP line will MOST likely have which of the following connectors?

A. RJ-11
B. DB-25
C. BNC
D. RJ-45

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 276
Which of the following is a proprietary routing protocol?

A. RIP
B. EIGRP
C. OSPF
D. BGP

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 277
Which of the following is an invalid MAC address?

A. AA:CE:58:FD:90:08
B. 44:98:3E:F8:33:23
C. 56:AD:BX:89:55:54
D. 94:9E:FE:EE:8C:DF

Correct Answer: C

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 278
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?

A. Star
B. Mesh
C. Bus
D. Ring

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 279
A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage?

A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 280
Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).

https://www.gratisexam.com/
A. Cable modern
B. Layer 2 switch
C. Router
D. NIDS
E. Layer 3 switch

Correct Answer: CE
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 281
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 282
The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?

A. 1
B. 3
C. 4
D. 5

Correct Answer: C
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 283
Which of the following is used to provide hot standby capabilities using paired routers?

A. CARP
B. L2TP
C. PPTP
D. ISAKMP

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 284
Which of the following is used to assign an IP address to a device?

A. DHCP
B. NTP
C. DNS
D. RADIUS

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 285
Which of the following protocols is used to transmit outgoing email?

A. RDP

https://www.gratisexam.com/
B. NTP
C. POP3
D. SMTP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 286
A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?

A. Channel
B. SSID
C. Firewall rule
D. Encryption

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 287
A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?

A. Identify the problem.


B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement preventative measures.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:

QUESTION 288
Which of the following is a purpose of a VLAN?

A. Decreases bandwidth on a network


B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 289
Which of the following would Sandy, a technician, find in a network map?

https://www.gratisexam.com/

A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 290

https://www.gratisexam.com/
Which of the following protocols would be used to send email to an email server?

A. NTP
B. FTP
C. SNMP
D. SMTP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 291
Which of the following default ports would need to be open on a firewall to allow remote desktop access?

A. 143
B. 443
C. 3389
D. 8080

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 292
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that
the cable was crimped correctly?

A. Punch down tool


B. Cable certifier
C. Loopback plug
D. Toner probe

Correct Answer: B

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 293
Which of the following DNS records would allow for a website to have more than one FQDN?

A. TXT
B. PTR
C. MX
D. CNAME

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 294
A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are
no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be
placed where the customer requests, without any other major changes to the environment?

A. PoE
B. Layer 3 switching
C. STP
D. VLAN

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 295

https://www.gratisexam.com/
Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?

A. The channels are overlapping with other wireless networks and should be changed.
B. The SSIDs are incompatible and should be renamed.
C. The users have incompatible wireless network cards and should upgrade.
D. The default idle period for logoff is too short and should be changed to a longer limit.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 296
Which of the following BEST describes how a layer 2 switch functions?

A. Switches packets within the same subnet based on MAC addresses


B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets between different subnets based on MAC addresses

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 297
Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified?

A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0

Correct Answer: A

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 298
Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet.
Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue?

A. Incorrect VLAN tagging


B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 299
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A. 255.255.255.0
B. 255 255.255.128
C. 255.255.255.192
D. 255.255.255.248

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 300
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate

https://www.gratisexam.com/
with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration:

interface VLAN 105


IP address 192.168.105.5 255.255.255.0

Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?

A. The subnet mask is incorrect.


B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 301
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access
any internal network resources.
Which of the following is the MOST likely reason?

https://www.gratisexam.com/

A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID

Correct Answer: A
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:

QUESTION 302
Which of the following is the default subnet mask for a Class B address?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 303
Which of the following default ports would need to be disabled to block TFTP traffic?

A. 20
B. 21
C. 69
D. 123

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 304
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

A. 20
B. 21
C. 22

https://www.gratisexam.com/
D. 23

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 305
Which of the following ports is the default telnet port?

A. 20
B. 21
C. 22
D. 23

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 306
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).

A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080

Correct Answer: DE
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:

QUESTION 307
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 308
Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?

A. Name the SSID on the 802.11n network only


B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 309
Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?

A. Channel
B. WEP
C. SSID
D. WPA

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 310
Which of the following default services uses TCP/UDP port 88?

A. LDAP
B. IGMP
C. HTTP
D. Kerberos

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 311
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

A. 20
B. 53
C. 80
D. 3389

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 312

https://www.gratisexam.com/
Which of the following uses port 53 by default?

A. RDP
B. QoS
C. DHCP
D. DNS

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 313
Which of the following ports does DHCP use? (Select TWO).

A. 22
B. 23
C. 67
D. 68
E. 69

Correct Answer: CD
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 314
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled
on the firewall? (Select TWO).

A. 23
B. 25
C. 53
D. 80

https://www.gratisexam.com/
E. 443

Correct Answer: DE
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 315
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?

A. 21
B. 22
C. 23
D. 25

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 316
Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).

A. 21
B. 22
C. 23
D. 53
E. 67

Correct Answer: BC
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 317
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?

A. 20
B. 21
C. 23
D. 25

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 318
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy
server to accomplish this?

A. 20
B. 80
C. 143
D. 443

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 319
A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed
open ports on the firewall to accomplish this? (Select TWO).

A. 20
B. 80
C. 143

https://www.gratisexam.com/
D. 443
E. 8080

Correct Answer: BD
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 320
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations.
Which of the following actions should be taken on the new firewall? (Select TWO).

A. Allow UDP port 21 outbound


B. Allow UDP port 22 outbound
C. Allow UDP port 80 outbound
D. Allow TCP port 21 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound

Correct Answer: EF
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 321
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the
following ways should the firewall be configured?

A. Allow TCP port 3389 outbound


B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound

Correct Answer: D
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 322
An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways
should the firewall be configured? (Select TWO).

A. Allow TCP port 23


B. Allow TCP port 25

https://www.gratisexam.com/

C. Allow TCP port 110


D. Allow UDP port 25
E. Allow UDP port 110

Correct Answer: BC
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 323
Which of the following protocols uses port 3389?

A. IMAP
B. DHCP
C. SSH
D. RDP

Correct Answer: D
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 324
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to
access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would
BEST allow access to the bank website?

A. Allow UDP port 53


B. Allow TCP port 80
C. Allow UDP port 340
D. Allow TCP port 443

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 325
attempting to access a popular website. Which of the following will MOST likely correct the error?

A. HTTP uses UDP


B. DNS port 23 needs to be allowed
C. HTTP needs port 443 allowed
D. UDP port 53 needs to be allowed

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 326
A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to
increase the bandwidth. Which of the following would be the BEST solution?

https://www.gratisexam.com/
A. Disable SSID
B. Channel bonding
C. MIMO
D. Increase the signal

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 327
An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on the
executive's desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive's
office?

A. Turn off SSID broadcasting for the executive's access point


B. Replace the 802.11n access point in the office with an 802.11a access point.
C. Change the channel on the access point to channel 11.
D. Turn off as many lights in the executive's office as possible to reduce interference.

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 328
A network technician needs to install an additional access point to the company's wireless network. The network has two 802.11b access points. Which of the
following channels should be used to allow the access point's coverage areas to overlap?

A. 1, 6, 11
B. 2, 5, 10
C. 3, 13, 23
D. 4, 8, 16

https://www.gratisexam.com/
Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 329
Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this
issue?

A. Change the security method


B. Reduce the transmission power
C. Change the SSID
D. Change the frequency

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 330
An 801.11g wireless access point was configured as follows:

- AP encryption forced to WPA2-AES mode only


- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40

Which is true about the above configuration?

A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is
known by the client.
B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client.

Correct Answer: C
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:

QUESTION 331
Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the
business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks?

A. PPPoE authentication
B. MAC filtering
C. WPA encryption
D. Wireless channel

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 332
A company only wants preapproved laptops to be able to connect to a wireless access point.
Which of the following should be configured?

A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 333
company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of
the following firewall rules would BEST accomplish this?

https://www.gratisexam.com/
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 334
Which of the following occurs when antenna gain is increased on an access point?

A. Connection speeds decrease


B. Throughput decreases
C. Cell size increases
D. Attenuation increases

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 335
Which of the following technologies allows more than two transceivers with an access point?

A. MIMO
B. FIFO
C. 802.1x
D. WPA

Correct Answer: A
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:

QUESTION 336
Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of
wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit
the access to the wireless network? (Select TWO).

A. WPA encryption
B. Changing wireless channels
C. MAC filtering
D. Changing wireless speed standards
E. SSID disable

Correct Answer: AC
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 337
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure
these WAPs will be able to communicate?

A. Enable mixed mode


B. Disable SSID
C. Disable encryption
D. Enable `n' only mode

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 338

https://www.gratisexam.com/
Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that
users max out at 802.11g speeds. Which of the following would MOST likely fix this issue?

A. Enable wireless multimedia (WMM) for QoS


B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 339
Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following
features are the MOST important for the new switch to support?

A. PoE and QoS


B. LACP and OSPF
C. 802.1x and 802.11n
D. NAT and VTP

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 340
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

A. Enable an SNMP agent


B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2

https://www.gratisexam.com/
Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 341
Which of the following solutions will detect and disable a rogue access point?

A. Port scan
B. Packet sniffer
C. IPS
D. IDS

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 342
When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands
would be MOST helpful in determining the MAC address?

A. ping
B. arp
C. route
D. dig

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 343

https://www.gratisexam.com/
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution
would provide the BEST solution?

https://www.gratisexam.com/

A. Private IP Addressing
B. Wireless Access Points
C. Wide Area Networking
D. Virtual Local Area Networks

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 344
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the
microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?

A. Disable SSID broadcast


B. Increase the signal strength
C. Move the access point
D. Change the broadcast channel

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 345
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line?

https://www.gratisexam.com/
(Select TWO).

A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables

Correct Answer: AB
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 346
Which of the following security threats relies primarily on user deception and misinformation?

A. Rogue access points


B. DoS attacks
C. Man-in-the-middle attacks
D. Phishing

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 347
At which of the following layers of the OSI model do packets exist?

A. Network
B. Session
C. Data link
D. Transport

https://www.gratisexam.com/
Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 348
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?

A. Core switch
B. MDF
C. Ethernet router
D. IDF

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 349
A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration
changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot
the connectivity issues?

A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 350
A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following
tools should be used?

A. Cable certifier
B. Toner probe
C. Cable tester
D. Protocol analyzer

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 351
Which of the following layers of the OSI model is between the Data Link and Transport layers?

A. Application
B. Session
C. Network
D. Physical

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 352
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the
Internet.
Which of the following is the MOST likely reason?

A. Incorrectly configured ACL


B. Implicit allow statement
C. SMTP requests are being denied

https://www.gratisexam.com/
D. All protocols are being allowed in

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 353
A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this
connection?

A. Telephone
B. Parallel
C. Serial
D. CAT6

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 354
Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to.
Which of the following would allow him to test basic functionality of the NIC?

A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:

https://www.gratisexam.com/
Explanation:

QUESTION 355
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used
to verify the wiring back to the patch panel?

A. Butt set
B. Cable certifier
C. Toner probe
D. Snips

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 356
Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST
likely need to be configured?

A. IP address on the native VLAN interface


B. Port security
C. Port forwarding
D. IP addres on the fiber interface

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 357
Which of the following devices is used to distribute network traffic equally over multiple links?

A. Content filter
B. DNS server

https://www.gratisexam.com/
C. Load balancer
D. Proxy server

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 358
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the
following items is MOST likely missing in the configuration?

A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 359
Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block.
Which of the following tools should he use?

https://www.gratisexam.com/

A. Toner probe
B. Punch down
C. Wire tester

https://www.gratisexam.com/
D. Crimper

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 360
Which of the following protocols is used for remote management of devices?

A. SNMP
B. TFTP
C. Syslog
D. SMTP

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 361
A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following
commands would MOST likely be used on that workstation to verify its current network settings?

A. net share
B. hostname
C. ipconfig
D. tracert

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 362
Which of the following methods limits access to a network based on characteristics of the network card?

A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 363
An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?

A. T1 loopback
B. Butt set
C. Multimeter
D. Protocol analyzer

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 364
Which of the following protocols is used to allow multiple hosts to share a common IP address?

A. HTTPS
B. ARP
C. CARP
D. NAT

https://www.gratisexam.com/
Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 365
Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine a connection problem within a subnet?

A. Wire mapper
B. Protocol analyzer
C. Cable tester
D. SYSLOG server

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 366
Which of the following is the prefix for a link-local IPv6 address?

A. FE80::/10
B. FF00::/8
C. 2FFE::/16
D. FEEF:/12

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 367
Which of the following could be used to estimate RTT across a router?

https://www.gratisexam.com/
A. Dig
B. Traceroute
C. Arp
D. Uptime

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 368
Which of the following does the IP address 169.254.222.10 indicate?

A. No DHCP server connectivity


B. The DNS server is unavailable
C. Firewall issue
D. Duplicate IP addresses are found

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 369
Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?

A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet.
B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet.
C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace.
D. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.

Correct Answer: B
Section: Mix questions

https://www.gratisexam.com/
Explanation

Explanation/Reference:
Explanation:

QUESTION 370
Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

A. Routing loop
B. MTU black hole
C. Framing errors
D. SYN flood

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 371
Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?

A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 372
Which of the following separates broadcast domains?

A. Port mirroring

https://www.gratisexam.com/
B. Router
C. Convergence
D. Switch

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 373
A national cable company providing TV, telephone, and Internet service to home users over its IP network, has been tracking a large increase of network bandwidth
due to P2P file sharing. Which of the following should the company deploy to ensure excellent TV and telephone service?

A. QoS
B. Load balancing
C. High availability
D. Fiber optics

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 374
Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring
station. Which of the following protocols will support secure transmission of the data?

A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP

Correct Answer: A
Section: Mix questions
Explanation

https://www.gratisexam.com/
Explanation/Reference:
Explanation:

QUESTION 375
Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?

A. Project management
B. Quality of service
C. Configuration management
D. Bandwidth shaping

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 376
Which of the following technologies could be implemented to improve call clarity when using VoIP technology?

A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 377
A customer has not been using security on a wireless network and has recently received many attacks through this vector.
Which of the following would be the MOST secure way to harden this wireless network?

A. Disable the SSID

https://www.gratisexam.com/
B. WPA encryption
C. VLAN implementation
D. WEP encryption

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 378
Which of the following needs to be configured on a switch to use a packet sniffer?

https://www.gratisexam.com/

A. Port trunking
B. Port mirroring
C. Tagged VLAN
D. Untagged VLAN

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 379
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken
recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?

A. Wire tap
B. Network sniffer
C. Load balancing appliance

https://www.gratisexam.com/
D. NIPS

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 380
Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?

A. Butt set
B. Toner probe
C. Wire mapper
D. Cable certifier

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 381
An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the
following network devices would be required to provide this functionality?

A. Router
B. Forward proxy
C. Load balancer
D. Firewall

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 382
Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?

A. Connectionless
B. Stateful
C. Full Duplex
D. Quality of Service

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 383
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?

A. ipconfig
B. ping
C. route
D. nbstat

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 384
A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?

A. The arp table of the new customer's router.


B. The route table of the next-hop router.
C. The route table of the new customer's router.
D. The arp table of a network user.

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 385
When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?

A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution.
C. Establish a theory of probable cause.
D. Document findings, actions, and outcomes.

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 386
A technician needs to verify an Ethernet run is functioning properly.
Which of the following tools should be used?

A. Protocol analyzer
B. Crimper
C. Cable tester
D. Punch down tool

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 387

https://www.gratisexam.com/
A supervisor requests that a technician downloads a MIB for a particular server.
Which of the following protocols requires MIBs?

A. IPSec
B. SSL
C. ISAKMP
D. SNMP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 388
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A. Signal strength
B. SSID enable
C. Encryption
D. Password hardening

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 389
Which of the following should be implemented in a networked environment carrying teleconferencing packets?

A. L2TP
B. SSH
C. QoS
D. SNMP

Correct Answer: C

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 390
Lisa, a network technician, needs to introduce a few more cables to the existing patch panel.
Which of the following tools would she use?

A. OTDR
B. Multimeter
C. Punch down tool
D. Temperature monitor

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 391
A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for
the HIGHEST level of security?

A. WPA2
B. WPA
C. WEP64
D. WEP128

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 392

https://www.gratisexam.com/
A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily
increasing rates. Which of the following is the MOST likely cause of the increased traffic?

A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 393
A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?

A. VPN
B. Throughput tester
C. Firewall
D. OC3

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 394
Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

A. Network map
B. Environmental monitor
C. Placement map
D. Syslog

Correct Answer: D

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 395
Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

A. Telnet
B. FTP
C. SNMP
D. SSH
E. RDP

Correct Answer: AD
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 396
A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?

A. Call the wireless provider and ask for a T3 circuit.


B. Move the wireless router to a better location where line of sight is obtained.
C. Reinstall the operating system to the PC to ensure the newest patches are installed.
D. Install a hub to ensure there is a clear path for the cables to run.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 397
Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are

https://www.gratisexam.com/
found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?

A. Frequency interference
B. Low signal strength
C. Standard mismatch
D. Incorrect channel

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 398
Kim, a user, cannot access the network using wireless.
Which of the following is MOST likely the cause?

A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 399
A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?

https://www.gratisexam.com/

https://www.gratisexam.com/
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 400
Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select
TWO).

A. MAC addressing
B. IP addressing
C. Port speed
D. IPv6 addressing
E. Duplex

Correct Answer: CE
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 401
Zach, a technician, discovers a switch is not communicating with the other switches in a stack.
Which of the following is the MOST likely cause?

A. Both T568A and T568B standards are being used.


B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked.

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 402
Which of the following technologies allows for redundant links within a Layer 2 segment?

A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 403
A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly
placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new
distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?

A. Check for switching loops between core and distribution switches.


B. Check whether an incorrect VLAN has been assigned to the new distribution switch.
C. Check for inconsistent or missing routes between the core and distribution switches.
D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
QUESTION 404
Which of the following is used to create a secure connection between a client and a host?

A. VLAN
B. Proxy server
C. IIS server
D. VPN

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 405
A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the
technician use to trace the network cabling back to the punch down block?

A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 406
Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to the
corresponding switch's SFP at the MDF. Which of the following is the MOST likely cause?

A. A crossover cable is being used.


B. DB loss is too high on all strands.
C. Only TX or RX strand is working.
D. TX and RX are reversed.

https://www.gratisexam.com/
Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 407
Which of the following is the correct representation of an IPv6 address?

A. ::
B. 0:0:0:0:0:0:0:0:1
C. 1:2:3:4:AB:CD:EF
D. 2001::4860:800f::

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 408
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?

A. Channel bonding
B. MIMO
C. Spartial reuse
D. 20MHz channel spacing

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 409

https://www.gratisexam.com/
Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?

A. Network map
B. Cable management
C. Change management
D. Asset management

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 410
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:

A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 411
A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a
network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?

A. Bad connectors
B. Cross-talk
C. EMI / Interference
D. dB loss

Correct Answer: D

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 412
An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be
used?

A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 413
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?

A. LLDP
B. VLAN tagging
C. QoS
D. SIP trunking

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 414
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when

https://www.gratisexam.com/
investigating the problem at Lisa's workstation?

A. nslookup
B. route
C. nbtstat
D. arp

Correct Answer: A
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 415
Which of the following utilities would a technician use to determine the location of lost packets on a routed network?

A. ping
B. nslookup
C. route
D. tracert

Correct Answer: D
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 416
A DSL modem connects to the provider's network using which of the following authentication techniques?

A. PoE
B. MS-CHAP
C. PPPoE
D. EAP

Correct Answer: C

https://www.gratisexam.com/
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 417
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?

A. Loopback plugs
B. Butt set
C. Cable certifier
D. Toner probe

Correct Answer: B
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

QUESTION 418
169.254.0.100 is an IP address which would MOST likely come from which of the following?

A. CIDR
B. DHCP
C. APIPA
D. DNS

Correct Answer: C
Section: Mix questions
Explanation

Explanation/Reference:
Explanation:

https://www.gratisexam.com/
https://www.gratisexam.com/

https://www.gratisexam.com/

You might also like