A network technician has deployed an application that can remotely control desktops with different operating systems. The technician needs to be able to use a single client application for this control. Which of the following has the technician utilized?
A VoIP device is not getting power at a new user's desk. The technician tests the components with a PoE injector at the switch and resolves the issue. Which of the following is the MOST likely cause of the issue?
A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?
Which of the following technologies relies on circuit switching?
An administrator is working on an email migration project and needs to verify if the new MX records have propagated across public DNS servers. Which of the following is the MOST appropriate software tool for the administrator to use?
Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?
Which of the following DNS record types can help limit spam?
Internal users have been unable to access the web server on a local network that they are to use. qi have been to the help desk, and a technician has decided to apply the following commands to the equipment:
access-list 103 permit tcp any any eq 80
access-list 103 permit tcp any any eq 443
access-list 103 deny ip any any
On which of the following devices would the technician apply these commands?
C. Border router
A Chief Information Officer (CIO) is reviewing a proposal to provide access security for the IT department’s restricted area. Which of the following is a preventive measure that should be implemented?
A network technician receives a help desk ticket indicating all users at a branch office are having problems connecting to the corporate wireless network, The technician verifies the wireless controller can see the WAPS at this
office and they are configured appropriately. After reviewing recently closed tickets, the network technician discovers a software upgrade was implemented to the wireless network at that branch office overnight. Which of the
following is MOST likely the cause of the issue?
Which of the following would an organization MOST likely have users sign before granting administrative access?
NDA: It is a contract through which the parties agree not to disclose information covered by the agreement. An NDA creates a confidential relationship between the parties, typically to protect any type of confidential and proprietary information or trade secrets. As such, an NDA protects non-public business information.
PUA: Potentially Unwanted Applications) are programs that, while not especially malicious, generally diminish the user experience by consuming valuable computer resources, tracking users, displaying advertisements, or allowing the installation of additional third party software. The PUA category provides users with increased insight and control over their computers by detecting applications that are not categorized as malware, but that users may not want installed on their computer or network.
AUP: An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
DLP: Data loss prevention (DLP) is an approach that seeks to improve information security and protect business information from data breaches. It prevents end-users from moving key information outside the network. DLP also refers to tools that enable a network administrator to monitor data accessed and shared by end users.
A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the company’s network? (Choose three.)
A network technician is connecting medical monitoring devices on a personal area network for patients' phones. Which of the following technologies should be used?
Several open conference rooms have active wired network connections. To discourage unauthorized users a network technician wants to require users in the conference rooms to authenticate to the network before gaining access. Which of the following would be the BEST network technology to use?
A network technician is running copper cable from a core switch to a network closet that is approximately 574ft(175m) away. Which of the following should the technician use to accomplish this?
Which of the following allows for connectionless communications?
A network engineer is planning to connect a legacy network switch to a core switch for redundancy. The proposed cable will run in the celling above high-voltage industrial equipment and fluorescent lights. The legacy
switch has 1000BASE-T ports with no expansion slots. The engineer has decided to use multimode cable to make this connection. Which of the following will be needed to connect the two switches?
A network technician is installing a new lab network for systems engineers to test patches and updates in a simulated production environment. The engineers have requested that the lab network have unrestricted access to the Internet, but they want to limit connectivity from the LAN to the systems engineers only. Which of the following will the technician MOST likely implement to meet these requirements?
A company wants to create a high-speed, highly redundant, metro-area network with the fastest possible fault handling in order to provide telecommunications circuits to its customer base. Which of the
following technologies would be BEST to use?
A network administrator is concerned about the management traffic between a machine and the corporate router. Which of the following protocols should the administrator use to prevent a security breach?
You have been tasked with implementing an ACL on the router that will:
1. Permit appropriate, secure remote-access technologies from the management network to all other local network segments. Explicitly deny all other traffic from the management network
2. Ensure the user subnet cannot remotely menage devices in the Linux and Windows Server segments
3. Prohibit any traffic that has not been specifically allowed.
see the solution below:
See the image for solution.
A network technician needs to determine the reason for an outage in a building. During troubleshooting, the technician views the rules on a firewall and determines it has been configured to block
specific traffic and is affecting some users. According to the network troubleshooting methodology, which of the following should be the technician's NEXT step?
Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?
A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?
A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?
A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any risks associated with the wireless signal propagating outside of the facility. Which of the following has the administrator implemented?
WPA2 is a type of encryption used to secure the vast majority of Wi-Fi networks. A WPA2 network provides unique encryption keys for each wireless client that connects to it.
A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?
A company recently removed 50 computers that were connected via Cat 5e cables and replaced them with wireless tablets. Which of the following should be performed to help ensure network security?
A network support team needs to install a wireless network at a new branch office. The team must provide the strongest security to prevent unauthenticated users from viewing the traffic on the wireless network Which of the following solutions would BEST meet these needs?
An engineer is rebooting a remote server after applying monthly patches. The patches are large and may take the server down for up to 20 minutes. The engineer wants to know exactly when the server
comes up. The server's static IP address is 22.214.171.124. Which of the following commands can the engineer issue to accomplish this task?
Users are reporting that the company website is responding. A technician performs the following steps:
1. Pings the loopback address
2. Pings the default gateway
3. Pings the DNS server
4. Pings the IP address of the web server
All tests are successful, but users still report the server is unreachable. The technician next performs an nslockup and receives the proper server IP address. Which of the following would cause the website to be unreachable?
A technician needs to back up network devices to a central location to prepare for a natural disaster. Which of the following should the technician use?
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
Which of the following devices would allow a network administrator to block an application at Layer7 on the network?
A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?
When deploying UTP cables In a networking environment, which of the following are acceptable standards? (Select TWO).
Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?
A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following Is MOST likely the issue?
A network technician has installed multiple new lightweight access points across the network. Which of the following devices should the technician use to manage the new access points?
A technician is troubleshooting a server In the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?
A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?
Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance?
A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?
A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?
Which of the following protocols operates at Layer 4 of the OSI model?
A home user has contacted the help desk to transfer files from an old smartphone to a new one. The help desk analyst informs the home user this can be completed using Bluetooth. Which of the following types of topologies is this called?
Which of the following would block access to an untagged port when connected to a Layer 2 device?
While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL?
A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?
Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?
A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?
Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?
Which of the following should a network administrator deploy to control all preventive security measures?
An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?
Which of the following types of packets uses the 126.96.36.199/3 address space by routers to exchange routing information?
A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?
Which of the following routing conventions is known as a link-state protocol?
Which of the following OSI layers contains the LLC function?
A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?
A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?
A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)
A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?
A company hires another firm to test the integrity of its information security controls. This is an example of
A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?
An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Select TWO).
A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?
Which of the following statements about the OSI model is true?
A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 188.8.131.52/24. Which of the following would be the BEST way to divide this network without wasting addresses?
A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?
Which of the following components can be used to manage network traffic to all nodes in a hypervisor?
A web server administrator has changed the domain registrar’s A record for the company’s website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?
A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?
A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?
A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A small team is overloaded with requests for database resources. The Chief Information Officer (CIO) is concerned the company does not have the resources to deploy and manage these additional services efficiently. Which of the following types of cloud services would be the MOST effective?
A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?
Which of the following ports are used for electronic mail protocols? (Choose three.)
A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.
Which of the following should the vendors recommend in response to the quote request?
An administrator is redesigning a company's network and wants to reduce the amount of hardware needed Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration?
A user does not have access to network services but has Internet access. The technician notices the
computer has an IP address of 192.168.1.144 when the network is 10.10.10.0. Which of the following is MOST likely the issue?
A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command:
Which of the following is the technician attempting to alter?
A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this?
A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?
A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?
Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)
A network technician is reviewing the following output from a router:
Which of the following is this an example of?
Which of the following BEST describes the RADIUS authentication service protocol?
A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:
Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)
A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?
A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?
A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?
The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?
An email server, which is called “Frederick,” has an IPv6 address of 2001:5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?
A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?
A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 184.108.40.206. Which of the following should the technician perform to troubleshoot the issue?
A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems.
Which of the following standards BEST fits these requirements?
A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?