Best October Special Limited Time 50% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s50disc

N10-007 PDF

$47.5

$94.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

N10-007 PDF + Testing Engine

$70

$139.99

3 Months Free Update

  • Exam Name: CompTIA Network+ N10-007
  • Last Update: Oct 25, 2021
  • Questions and Answers: 601
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

N10-007 Engine

$55

$109.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

N10-007 CompTIA Network+ N10-007 Questions and Answers

Question # 4

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Full Access
Question # 5

Which of the following protocol types describes secure communication on port 443?

A.

ICMP

B.

UDP

C.

TCP

D.

IP

Full Access
Question # 6

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

A.

10BASE-T

B.

100BASE-T

C.

1000BASE-LX

D.

1000BASE-SX

Full Access
Question # 7

Which of the following concepts would MOST likely be used to identify individual pieces of hardware throughout their life cycle?

A.

Geofencing

B.

Smart locker

C.

Chain of custody

D.

Asset tagging

Full Access
Question # 8

A company's sales department is accustomed lo sharing information with other organizations via FTP; however. FTP recently stopped working for the sales employees. Upon further review, it is determined a junior network technician recently applied an ACL without going through the proper change management process. The network administrator found the following ACL:

Which of the following statement Identifies the main Issue?

A.

An extended ACL is being used rather man a standard ACL.

B.

DNS needs to De allowed before FIP will work.

C.

The ACL contains an Incorrect port number.

D.

The ACL was applied incorrectly to the interface.

Full Access
Question # 9

A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?

A.

NAT

B.

PAT

C.

STP

D.

SNAT

E.

ARP

Full Access
Question # 10

A coffee shop wants to provide WiFi to Its customers. The shop wishes to support as many devices as possible, so it wants to support all available frequencies. Which of the following 802.11 standards should the coffee shop utilize to meet this requirement?

A.

a

B.

b

C.

g

D.

n

Full Access
Question # 11

Which of the following would an organization MOST likely have employees sign before granting access to confidential data?

A.

An AUP

B.

A BYOD policy

C.

An NDA

D.

A PUA

Full Access
Question # 12

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

A.

Physical diagram

B.

Heat map

C.

Asset list

D.

Device map

Full Access
Question # 13

A network administrator wants to ensure devices on the network are not susceptible to published exploits. Which of the following will the administrator MOST likely conduct?

A.

A port scan

B.

A vulnerability scan

C.

A packet analysis

D.

A network log review

Full Access
Question # 14

The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?

A.

The brown pair UTP has a short.

B.

The camera requires 802.3at power

C.

The camera requires Cat 7 cabling.

D.

The switchport has PoE disabled.

Full Access
Question # 15

A company has a DNS a record for the following address: products.companyXYZ. The company wuld to like to add another record,sales.companyXYZ.com, which continually points to the same IP address as product.companyXYZ.com. Which of the following DNS record types would BEST accomplish this?

A.

MX

B.

CNAME

C.

SRV

D.

A

E.

AAAA

F.

PTR

Full Access
Question # 16

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?

A.

Full backups

B.

Load balancing

C.

Hot site

D.

Snapshots

Full Access
Question # 17

A network manager is reviewing recent changes after learning the network health metrics are no longer being recorded. The manager discovers the ACL has been updated to the following:

Which of the following lines in the ACL points to the issue?

A.

Line 1

B.

Line 2

C.

Line 3

D.

Line 4

E.

Line 5

Full Access
Question # 18

A technician receives a report that Joe. an existing user is unable to access the network. Joe confirms that he had full access the previous clay. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe Is able to access the network. Which of the following is the MOST likely cause of this issue?

A.

Incorrect pin-out

B.

Bad port

C.

Transceiver mismatch

D.

Incorrect cable type

Full Access
Question # 19

A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?

A.

The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS

B.

The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the

administrator.

C.

The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch

D.

The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to

management.

Full Access
Question # 20

Users are reporting that the company website is responding. A technician performs the following steps:

1. Pings the loopback address

2. Pings the default gateway

3. Pings the DNS server

4. Pings the IP address of the web server

All tests are successful, but users still report the server is unreachable. The technician next performs an nslockup and receives the proper server IP address. Which of the following would cause the website to be unreachable?

A.

Unresponsive service

B.

Incorrect gateway

C.

Name not resolving

D.

Rogue DHCP server

E.

DNS forward lookup error

Full Access
Question # 21

A network technician is troubleshooting a connection issue and determines the domain name resolution is not getting out past the firewall. Which of the following ports should the technician check to see if it is being blocked by the ACLs?

A.

23

B.

53

C.

110

D.

389

Full Access
Question # 22

A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch Is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network?

A.

Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment.

B.

Move the straight-through Ethernet cable connecting the switches to the first port on both switches.

C.

Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end.

D.

Add a second cable connecting the switches for redundancy and disabling STP on both switches.

Full Access
Question # 23

A OLP system configured on a network's point of egress captured sensitive company documents going out to the Internet from an Internal workstation. The user o that workstation left to work for a competitor the next day. Which of the following attacks is lib MOST likely an example of?

A.

Ransomware

B.

Evil twin

C.

insider threat

D.

Social engineering

Full Access
Question # 24

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Full Access
Question # 25

A network technician is troubleshooting a problem with a user’s client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue?

A.

Reconfigure the user’s VPN connection in the router to fix profile corruption.

B.

Inform the user that provisioning sometimes fails and the connection needs to be attempted again.

C.

Review the logs in the VPN client to check for any informational messages.

D.

Verify the system has the latest OS patches installed.

Full Access
Question # 26

Which of the following protocols is used to transport outgoing mail across networks?

A.

POP

B.

SMTP

C.

IMAP

D.

LDAP

Full Access
Question # 27

A technician arrives at a new building to find cabling has been run and terminated, but only the wall ports have been labeled. Which of the following tools should be utilized to BEST facilitate labeling the patch panel?

A.

Tone generator

B.

Cable tester

C.

Multimeter

D.

Loopback adapter

Full Access
Question # 28

Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance?

A.

Clustering

B.

Load balancing

C.

Redundant circuits

D.

NIC teaming

Full Access
Question # 29

A network administrator installed a multilayer switch In a shared closet. The network team will manage the switch remotely via SSH. Which of the following should the network administrator do to harden the switch in this scenario? (Select TWO).

A.

Disable TACACS+.

B.

Disable HTTP management.

C.

Configure the loopback.

D.

Enable LACP.

E.

Configure IPv6.

F.

Enable port security.

Full Access
Question # 30

A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-point

D.

Point-to-multipoint

Full Access
Question # 31

A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities. Which of the following would mitigate this issue?

A.

Create a VLAN for all unused switchports

B.

Implement a DM2 for all external services

C.

Implement root guard on all switches

D.

Create a honeypot to attract attackers

Full Access
Question # 32

Which of the following network topologies typically has all devices on a network directly connected to every other network device?

A.

Mesh

B.

Star

C.

Ad hoc

D.

Ring

Full Access
Question # 33

A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?

A.

Evil twin

B.

ARP poisoning

C.

DHCP exhaustion

D.

Social engineering

Full Access
Question # 34

A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

A.

VNC application

B.

Kerberos

C.

Geotagging application

D.

Credentials

Full Access
Question # 35

Which of the following should be configured to allow for IP-to-name resolutions?

A.

CNAME

B.

A

C.

PTR

D.

NS

Full Access
Question # 36

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?

A.

Powerline extender

B.

Ethernet-over-power adapter

C.

Power-over-Ethernet switch

D.

Power distribution unit

E.

Ethernet power controller

Full Access
Question # 37

When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?

A.

SNMPv3

B.

SIEM

C.

MIB

D.

SYSLOG

Full Access
Question # 38

A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest?

A.

SMF

B.

Cat 3

C.

Cat 5

D.

Cat 6

E.

RG-6

Full Access
Question # 39

A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?

A.

Protocol analyzer

B.

Tone generator

C.

Spectrum analyzer

D.

Multimeter

Full Access
Question # 40

A technician is trying to identify the cause of an issue several wireless users are experiencing at an office. The office is in a square-shaped building, with four 802.11b WAPs with omnidirectional antennas located in the

four corners of the building. Users near the center of the building report sporadic issues connecting to resources. The technician checks the signal strength in the middle of the building and determines it is adequate. Which of the following is causing the reported issue?

A.

The antenna types are incorrect, and unidirectional should be used.

B.

MAC filtering has not been updated.

C.

There is channel overlap of the access points.

D.

The power levels are set too low on the WAPs.

Full Access
Question # 41

A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?

A.

WPA-PSK

B.

EAP-TLS

C.

AES-CCMP

D.

WEP-TKIP

Full Access
Question # 42

A home user is unable to get to the Internet from a workstation that is connected to a wireless network. When reviewing the results of the ipconfig command, the user wants to verity the default gateway is correct. Which of the following devices should be the gateway?

A.

Cable modem

B.

SOHO router

C.

DNS server

D.

Layer 2 switch

Full Access
Question # 43

A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?

A.

Port enumeration

B.

Baseline review

C.

Vulnerability scanning

D.

Packet analysis

Full Access
Question # 44

A network administrator is installing a campus network of two routers, 24 switches, 76 APs, and 492 VoIP phone sets. Which of the following additional devices should the administrator install to help manage this network?

A.

VoIP PBX

B.

Content filter

C.

RADIUS server

D.

Wireless controller

Full Access
Question # 45

Which of the following BEST describes the functionality of the root guard feature on a switch?

A.

BPDUs entering the root bridge are Ignored.

B.

The STP root bridge cannot be changed.

C.

Broadcast storms entering from a root port are blocked.

D.

Loop protection Is enabled on the root port of a switch.

Full Access
Question # 46

A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

A.

VLAN routing

B.

Server-based firewall configuration issue

C.

Patch cable type

D.

DHCP scope availability

Full Access
Question # 47

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

A.

Partial mesh

B.

Ad hoc

C.

Ring

D.

Bus

Full Access
Question # 48

A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?

A.

Modify the speed and duplex

B.

Plug in to another port

C.

Replace the NIC

D.

Change the switch

Full Access
Question # 49

A network administrator is adding a new WAN circuit from the ISP to a new building. In which of the following locations would the network administrator find the utility entry point?

A.

DMZ

B.

Data tier

C.

IDF

D.

Demarc

Full Access
Question # 50

A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?

A.

One of the wireless access points is on the wrong frequency

B.

The students are attempting to connect 802.11g devices

C.

The students are using more than one wireless device port seat.

D.

Distance limitations are preventing the students from connecting.

Full Access
Question # 51

A network technician needs to distribute an updated OS for all network switches at company locations throughout the world The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet. Which of the following methods should be used to distribute the images while ensuring integrity?

A.

Use a TFTP server and UDP protocol

B.

Use an FTP server and provide the file hash

C.

Use an HTTP server to share the file

D.

Use a modem and dial-up connection

Full Access
Question # 52

A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?

A.

International export controls policy

B.

Remote access policy

C.

Privileged user agreement

D.

Data loss policy

E.

Service-level agreement

Full Access
Question # 53

A technician has replaced a customer’s desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?

A.

ACL

B.

NAC

C.

Traffic shaping

D.

SDN

E.

NTP

Full Access
Question # 54

A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer’s request?

A.

Connect the five PCs to a hub that is not connected to the corporate network.

B.

Connect the five PCs to a switching router and assign the PCs to a separate VLAN.

C.

Connect the five PCs to a hardware firewall that is connected to the router.

D.

Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.

Full Access
Question # 55

A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?

A.

SSH

B.

VNC

C.

RDP

D.

HTTPS

Full Access
Question # 56

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Full Access
Question # 57

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Full Access
Question # 58

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Full Access
Question # 59

A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?

A.

PCI compliance

B.

Database health check

C.

Penetration test

D.

Network baseline

Full Access
Question # 60

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

A.

Brute force

B.

VLAN hopping

C.

Evil twin

D.

DNS poisoning

Full Access
Question # 61

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Full Access
Question # 62

A company needs to implement a fault-tolerant server configuration after the failure of its database server. The company decides to implement load-balancing redundant servers. Which of the following should be used for file storage for the servers?

A.

IDE

B.

Cloud storage

C.

SAN

D.

iSCSI

Full Access
Question # 63

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Full Access
Question # 64

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Full Access
Question # 65

A network technician is working on a new wireless project. The network manager has a primary requirement of achieving speeds of at least 1 Gbps when connected. Which of the following standards would be appropriate for the technician to implement?

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11n

Full Access
Question # 66

A corporation has been the target of hackers who exploited TCP port 80. The network administrator is tasked with securing connections to the web server. Which of the following protocols should be implemented to BEST secure the web server? (Choose two.)

A.

HTTPS

B.

SSH

C.

TLS

D.

VNC

E.

RDP

F.

SFTP

Full Access
Question # 67

A network technician is supporting a library system that w ants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?

A.

IR

B.

Bluetooth

C.

PAN

D.

RFID

Full Access
Question # 68

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Full Access
Question # 69

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Full Access
Question # 70

A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n

Full Access
Question # 71

A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented?

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Full Access
Question # 72

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?

A.

Deploy two APs to the gymnasium with the maximum power level transmitting to cover the adjacent offices.

B.

Deploy a single AP to each adjacent office set to transmit at maximum power.

C.

Use a high-gain antenna on the AP in the gymnasium and install an AP in every other adjacent office.

D.

Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

Full Access
Question # 73

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

A.

1

B.

2

C.

3

D.

4

E.

5

Full Access
Question # 74

Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?

A.

Firewall

B.

Proxy server

C.

IDS

D.

Load balancer

Full Access
Question # 75

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Full Access
Question # 76

A network technician is reviewing the company phone system to make the necessary changes to a firewall configuration. Which of the following protocols are used in VoIP communication? (Choose two.)

A.

SIP

B.

NTP

C.

H.323

D.

SNMP

E.

IMAP

F.

SMB

G.

CSMA

Full Access
Question # 77

Which of the following IPv6 transition methods requires all network devices to support IPv4 and IPv6?

A.

6to4

B.

Teredo

C.

ISATAP

D.

Dual stack

Full Access
Question # 78

A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all

buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?

A.

The SMTP relays in the datacenter

B.

The MAC address reservations

C.

The IP helper address on the switch

D.

The ARP forwarding on the switch

Full Access
Question # 79

The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

A.

Frequency mismatch

B.

Crosstalk

C.

Interference

D.

Channel overlap

Full Access
Question # 80

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Full Access
Question # 81

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?

A.

Pre-shared key

B.

Open

C.

EAP-TLS

D.

WPA2

Full Access
Question # 82

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

A.

10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.

B.

127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

C.

172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.

D.

192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

Full Access
Question # 83

A network technician is planning to upgrade an end-of-life network switch and wants to reuse as much of the existing infrastructure as possible. The end-of-life switch uses a GBIC, but the new switch will use an SFP.

Which of the following will the network technician MOST likely need to perform before completing the upgrade?

A.

Reterminate the fiber with ST connectors.

B.

Reterminate the fiber with SC connectors.

C.

Reterminate the fiber with LC connectors.

D.

Reroute the fiber through a media converter.

Full Access
Question # 84

A customer warns to be able to separate traffic on a local network without using a router. Which of the following should a technician install?

A.

A multilayer switch

B.

A wireless controller

C.

A load balancer

D.

A VPN concentrator

E.

A UTM appliance

Full Access
Question # 85

A network engineer utilizes a box of Cat5e cable in a datacenter for use between 10Gbps switches in a single rack. After the engineer finishes the installation, switch administrators notice random speed drops and

intermittent connection issues. Which of the following is this an example of?

A.

Incorrect cable type

B.

Attenuation

C.

Incorrect pinout

D.

Bad ports

Full Access
Question # 86

Which of the following factors should be considered when evaluating a firewall to protect a datacenter's east-west traffic?

A.

Replication traffic between an on-premises server and a remote backup facility

B.

Traffic between VMs running on different hosts

C.

Concurrent connections generated by Internet DDoS attacks

D.

VPN traffic from remote offices to the datacenter's VMs

Full Access
Question # 87

A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented?

A.

BGP

B.

EIGRP

C.

OSPF

D.

RIPv2

Full Access
Question # 88

A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?

A.

CRC errors

B.

Giants

C.

Runts

D.

Flooding

Full Access
Question # 89

A Chief Information Officer (CIO) wants to control the category of sites that employees access when using the Internet web browser. This objective must be achieved to be compliant with corporate policy and avoid

some security and legal risks. Which of the following devices would BEST accomplish this task? (Choose two.)

A.

IDS

B.

Proxy server

C.

Content filter

D.

Virtual firewall

E.

Hypervisor

F.

Load balancer

Full Access
Question # 90

Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

A.

BYOD

B.

NDA

C.

SLA

D.

AUP

Full Access