Network+ Certification Exam Pt.3

Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model?
VPN
VRRP
vSwitch
VIP
A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
Mandatory access control
User-based permissions
Role-based access
Least privilege
Which of the following would be used to expedite MX record updates to authoritative NSs?
UDP forwarding
DNS caching
Recursive lookup
Time to live
A client moving into a new office wants the IP network set up to accommodate 412 network-connected devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result?
255.255.0.0
255.255.252.0
255.255.254.0
255.255.255.0
A company is being acquired by a large corporation. As part of the acquisition process, the company's address should now redirect clients to the corporate organization page. Which of the following DNS records needs to be created?
SOA
NS
CNAME
TXT
A user is having difficulty with video conferencing and is looking for assistance. Which of the following would BEST improve performance?
Packet shaping
Quality of service
Port mirroring
Load balancing
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall?
Secure SNMP
Port security
Implicit deny
DHCP snooping
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?
Omni
Directional
Yagi
Parabolic
A systems administrator is running a VoIP network and is experiencing jitter and high latency. Which of the following would BEST help the administrator determine the cause of these issues?
Enabling RADIUS on the network
Configuring SNMP traps on the network
Implementing LDAP on the network
Establishing NTP on the network
The following instructions were published about the proper network configuration for a videoconferencing device: "Configure a valid static RFC1918 address for your network. Check the option to use a connection over NAT." Which of the following is a valid IP address configuration for the device?
FE80::1
100.64.0.1
169.254.1.2
172.19.0.2
224.0.0.12
A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?
CRC errors
Giants
Runts
Flooding
A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?
Link aggregation control
Port tagging
Jumbo frames
Media access control
A network administrator wants to reduce overhead and increase efficiency on a SAN. Which of the following can be configured to achieve these goals?
Port aggregation
Traffic shaping
Jumbo frames
Flow control
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
Password complexity
Port security
Wireless client isolation
Secure SNMP
A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would BEST describe this setup?
Bus
Spine-and-leaf
Hub-and-spoke
Mesh
To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?
Use tcpdump and parse the output file in a protocol analyzer.
Use an IP scanner and target the cloud WAN network addressing.
Run netstat in each cloud server and retrieve the running processes.
Use nmap and set the servers' public IPs as the targets.
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
172.15.0.0/18
172.18.0.0/10
172.23.0.0/16
172.28.0.0/8
172.32.0.0/14
A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?
Zero Trust
Planned obsolescence
Time to live
Caching
Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?
Offboarding policy
Acceptable use policy
BYOD policy
Remote access policy
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
Modify the device's MIB on the monitoring system.
Configure syslog to send events to the monitoring system
Use port mirroring to redirect traffic to the monitoring system.
Deploy SMB to transfer data to the monitoring system
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
Network
Data link
Transport
Session
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)
Jitter
Speed mismatch
QoS misconfiguration
Protocol mismatch
CRC errors
Encapsulation errors
Which of the following VPN configurations should be used to separate Internet and corporate traffic?
Split-tunnel
Remote desktop gateway
Site-to-site
Out-of-band management
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?
A media converter
A bridge
An MDIX
A load balancer
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy's requirements?
Recover all systems to a loss of 48 hours of data.
Limit network downtime to a maximum of 48 hours per year.
Recover all systems within 48 hours.
Require 48 hours of system backup maintenance.
Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?
UTP
Coaxial
Fiber
Cat 5
Twinaxial
Which of the following is the physical security mechanism that would MOST likely be used to enter a secure site?
A landing page
An access control vestibule
A smart locker
A firewall
Which of the following BEST describes a North-South traffic flow?
A public Internet user accessing a published web server
A database server communicating with another clustered database server
A Layer 3 switch advertising routes to a router
A management application connecting to managed devices
A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remote location to connect rogue devices and gain access to the organization's resources. Which of the following techniques would BEST address the concern?
Configure port security using MAC filtering.
Manually register the cameras on the switch address table.
Activate PoE+ on the active switchports.
Disable Neighbor Discovery Protocol on the switch.
A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task?
tracert
ipconfig
netstat
nslookup
A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT?
Implement the solution.
Test the theory.
Duplicate the issue.
Document the findings.
Verify functionality.
Which of the following OSI model layers contains IP headers?
Presentation
Application
Data link
Network
Transport
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
Add another AP.
Disable the 2.4GHz radios.
Enable channel bonding.
Upgrade to WiFi 5.
A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?
Gather information from the initial report.
Escalate the issue to a supervisor.
Implement a solution to resolve the issue.
Establish a theory of probable cause.
Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?
iSCSI
FCoE
Three-tiered network
Spine and leaf
Top-of-rack switching
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information. Which of the following is MOST likely the cause of the issue?
Channel overlap
Poor signal
Incorrect power settings
Wrong antenna type
A network technician reviews an entry on the syslog server and discovers the following message from a switch: SPANNING-TREE Port 1/1 BLOCKED - Which of the following describes the issue?
A loop was discovered, and the impact was mitigated.
An incorrectly pinned cable was disconnected.
The link-local address on the port is incorrect.
The port was shut down, and it needs to be reactivated.
A company just migrated its email service to a cloud solution. After the migration, two-thirds of the internal users were able to connect to their mailboxes, but the connection fails for the other one-third of internal users. Users working externally are not reporting any issues. The network administrator identifies the following output collected from an internal host: c:\user> nslookup newmail.company.com Non-Authoritative answer: Name: newmail.company.com - IPs: 3.219.13.186, 64.58.225.184, 184.168.131.243 Which of the following verification tasks should the network administrator perform NEXT?
Check the firewall ACL to verify all required IP addresses are included.
Verify the required router PAT rules are properly configured.
Confirm the internal DNS server is replying to requests for the cloud solution.
Validate the cloud console to determine whether there are unlicensed requests.
A network technician was hired to harden the security of a network. The technician is required to enable encryption and create a password for AP security through the web browser. Which of the following would BEST support these requirements?
ESP
WPA2
IPSec
ACL
Which of the following ports are associated with IMAP? (Choose two.)
25
110
143
587
993
995
A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?
A syslog server
Change management records
A rack diagram
The security log
A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure?
Automate a continuous backup and restore process of the system's state of the active gateway.
Use a static assignment of the gateway IP address on the network clients.
Configure DHCP relay and allow clients to receive a new IP setting.
Configure a shared VIP and deploy VRRP on the routers.
Which of the following protocols would allow a secure connection to a Linux-based system?
SMB
FTP
RDP
SSH
A network administrator is troubleshooting the communication between two Layer 2 switches that are reporting a very high runt count. After trying multiple ports on both switches, the issue persists. Which of the following should the network administrator perform to resolve the issue?
Increase the MTU size on both switches.
Recertify the cable between both switches.
Perform a factory reset on both switches.
Enable debug logging on both switches.
Users attending security training at work are advised not to use single words as passwords for corporate applications. Which of the following does this BEST protect against?
An on-path attack
A brute-force attack
A dictionary attack
MAC spoofing
Denial of service
A network administrator would like to enable NetFlow on a Layer 3 switch but is concerned about how the feature may impact the switch. Which of the following metrics should the administrator graph using SNMP to BEST measure the feature's impact?
CPU usage
Temperature
Electrical consumption
Bandwidth usage
Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?
Business continuity plan
Onboarding and offboarding policies
Acceptable use policy
System life cycle
Change management
A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks need to be completed to allow the phone to operate correctly?
Assign the phone's switchport to the correct VLAN
Statically assign the phone's gateway address
Configure a route on the VoIP network router
Implement a VoIP gateway
Users are reporting intermittent WiFi connectivity in specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Choose two.)
Site survey
EIRP
AP placement
Captive portal
SSID assignment
AP association time
A technician is setting up a new router, configuring ports, and allowing access to the Internet. However, none of the users connected to this new router are able to connect to the Internet. Which of the following does the technician need to configure?
Tunneling
Multicast routing
Network address translation
Router advertisement
A network administrator is testing performance improvements by configuring channel bonding on an 802.11ac AP. Although a site survey detected the majority of the 5GHz frequency spectrum was idle, being used only by the company's WLAN and a nearby government radio system, the AP is not allowing the administrator to manually configure a large portion of the 5GHz frequency range. Which of the following would be BEST to configure for the WLAN being tested?
Upgrade the equipment to an AP that supports manual configuration of the EIRP power settings
Switch to 802.11n, disable channel auto-selection, and enforce channel bonding on the configuration
Set up the AP to perform a dynamic selection of the frequency according to regulatory requirements
Deactivate the band 5GHz to avoid interference with the government radio
Which of the following options represents the participating computers in a network?
Nodes
CPUs
Servers
Clients
An administrator is working with the local ISP to troubleshoot an issue. Which of the following should the ISP use to define the furthest point on the network that the administrator is responsible for troubleshooting?
Firewall
A CSU/DSU
Demarcation point
Router
Patch panel
To access production applications and data, developers must first connect remotely to a different server. From there, the developers are able to access production data. Which of the following does this BEST represent?
A management plane
A proxy server
An out-of-band management device
A site-to-site VPN
A jump box
Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?
Penetration test
Posture assessment
Risk assessment
Vulnerability scan
A systems administrator wants to use the least amount of equipment to segment two departments that have cables terminating in the same room. Which of the following would allow this to occur?
A load balancer
A proxy server
A Layer 3 switch
A hub
A Layer 7 firewall
An administrator needs to connect two laptops directly to each other using 802. 11ac but does not have an AP available. Which of the following describes this configuration?
Basic service set
Extended service set
Independent basic service set
MU-MIMO
A network administrator is reviewing the following metrics from a network management system regarding a switchport. The administrator suspects an issue because users are calling in regards to the switch port's performance. Based on the information in the chart above, which of the following is the cause of these performance issues?
The connected device is exceeding the configured MTU.
The connected device is sending too many packets.
The switchport has been up for too long.
The connected device is receiving too many packets.
The switchport does not have enough CRCs.
A network administrator is installing a new server in the datacenter. The administrator is concerned the amount of traffic generated will exceed 1GB, and higher- throughput NICs are not available for installation. Which of the following is the BEST solution for this issue?
Install an additional NIC and configure LACP
Remove some of the applications from the server
Configure the NIC to use full duplex
Configure port mirroring to send traffic to another server
Install a SSD to decrease data processing time
A malicious user is using special software to perform an on-path attack. Which of the following best practices should be configured to mitigate this threat?
Dynamic ARP inspection
Role-based access
Control plane policing
MAC filtering
Which of the following can be used to store various types of devices and provide contactless delivery to users?
Asset tags
Biometrics
Access control vestibules
Smart lockers
A technician recently set up a small office network for nine users. When the installation was complete, all the computers on the network showed addresses ranging from 169.254.0.0 to 169.254.255.255. Which of the following types of address ranges does this represent?
Private
Public
APIPA
Classless
Which of the following OSI model layers is where a technician would view UDP information?
Physical
Data link
Network
Transport
A network technician at a university is assisting with the planning of a simultaneous software deployment to multiple computers in one classroom in a building. Which of the following would be BEST to use?
Multicast
Anycast
Unicast
Broadcast
Which of the following describes the BEST device to configure as a DHCP relay?
Bridge
Router
Layer 2 switch
Hub
Which of the following compromises Internet-connected devices and makes them vulnerable to becoming part of a botnet? (Choose two.)
Deauthentication attack
Malware infection
IP spoofing
Firmware corruption
Use of default credentials
Dictionary attack
A network administrator is planning a WLAN for a soccer stadium and was advised to use MU-MIMO to improve connection performance in high-density areas. The project requires compatibility with clients connecting using 2.4GHz or 5GHz frequencies. Which of the following would be the BEST wireless standard for this project?
802.11ac
802.11ax
802.11g
802.11n
An organization purchased an allocation of public IPv4 addresses. Instead of receiving the network address and subnet mask, the purchase paperwork indicates the allocation is a /28. This type of notation is referred to as:
CIDR
classful
classless
RFC1918
A network technician is reviewing a document that specifies how to handle access to company resources, such as the Internet and printers, when devices are not part of the company's assets. Which of the following agreements would a user be required to accept before using the company's resources?
BYOD
DLP
AUP
MOU
Which of the following records can be used to track the number of changes on a DNS zone?
SOA
SRV
TXT
NS
A network administrator is trying to add network redundancy for the server farm. Which of the following can the network administrator configure to BEST provide this capability?
VRRP
DNS
UPS
RPO
A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?
Disable unneeded ports
Disable SSH service
Disable MAC filtering
Disable port security
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)
tcpdump
show config
hostname
show route
netstat
show ip arp
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
Secure web access to internal corporate resources.
Upgrade security via the use of an NFV technology.
Connect two datacenters across the Internet.
Increase VPN availability by using a SDWAN technology.
Which of the following security controls indicates unauthorized hardware modifications?
Biometric authentication
Media device sanitization
Change management policy
Tamper-evident seals
A network technician needs to install security updates on several switches on the company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?
Upload the security update onto each switch using a terminal emulator and a console cable.
Configure a TFTP server, SSH into each device, and perform the update.
Replace each old switch with new switches that have the updates already performed.
Connect a USB memory stick to each switch and perform the update.
Which of the following describes traffic going in and out of a data center from the internet?
Demarcation point
North-South
Fibre Channel
Spine and leaf
A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources. Which of the following needs to be reconfigured?
The IP address
The subnet mask
The gateway address
The DNS servers
An IT administrator received an assignment with the following objectives: ✑ Conduct a total scan within the company's network for all connected hosts. ✑ Detect all the types of operating systems running on all devices. ✑ Discover all services offered by hosts on the network. ✑ Find open ports and detect security risks. Which of the following command-line tools can be used to achieve these objectives?
nmap
arp
netstat
A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?
Writing ACLs to prevent access to the switch
Disabling unneeded switchports
Changing the default VLAN
At which of the following OSI model layers does routing occur?
Data link
Physical
Network
An auditor assessing network best practices was able to connect a rogue switch into a network jack and get network connectivity. Which of the following controls would BEST address this risk?
Activate port security on the switchports providing end user access.
Deactivate Spanning Tree Protocol on network interfaces that are facing public areas.
Disable Neighbor Resolution Protocol in the Layer 2 devices.
A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find the IP address? (Choose two.)
IP route table
ARP table
DHCP leases
MAC address table
A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot, ping the router. Which of the following is MOST likely the cause of the incident?
Incorrect subnet mask
Incorrect DNS server
Incorrect IP class
Incorrect TCP port
A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks. Which of the following would be BEST for the administrator to purchase?
An IPS
A Layer 3 switch
A wireless LAN controller
A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?
Prevention
Detection
Identification
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
Evil twin
VLAN hopping
DNS poisoning
Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?
OSPF
RIPv2
STP
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors?
A bad wire on the Cat 5e cable
The wrong VLAN assignment to the switchport
A misconfigured QoS setting on the router
Which of the following is considered a physical security detection device?
Cameras
Biometric readers
Access control vestibules
A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?
ipconfig
netstat
tracert
A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use?
BGP
RIPv2
OSPF
A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause?
MIB mismatch
CPU usage
Encapsulation errors
A technician installed an 8-port switch in a user's office. The user needs to add a second computer in the office, so the technician connects both PCs to the switch and connects the switch to the wall jack. However, the new PC cannot connect to network resources. The technician then observes the following:
✑ The new computer does not get an IP address on the client's VLAN.
✑ Both computers have a link light on their NICs.
✑ The new PC appears to be operating normally except for the network issue.
✑ The existing computer operates normally.
Which of the following should the technician do NEXT to address the situation?
Contact the server team to have a record created in DNS for the new PC.
Contact the network team to resolve the port security issue.
Contact the security team to review the logs on the company's SIEM.
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?
Clientless VPN
Virtual desktop
mGRE tunnel
A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1
Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.
Which of the following is the MOST likely cause for the failure?
SNMP has been secured with an ACL.
The network engineer does not have permission to configure the device.
The network engineer is using the wrong protocol.
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
NetFlow aggregate data
Syslog server messages
Network baseline reports
A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?
Link aggregation
Lower FTP port
Jumbo frames
Which of the following devices have the capability to allow communication between two different subnetworks? (Choose two.)
Access point
Layer 3 switch
Router
IDS
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
LDAP
SSO
EAP
An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?
Management information bases
System baseline
Network device logs
A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch. Which of the following is a cause of the issue on port 1/3?
Duplex
Errors
Speed
Which of the following would be used when connecting devices that have different physical characteristics?
A proxy server
A media converter
A load balancer
A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?
MTTR
RTO
MTBF
A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Choose two.)
Physical network diagram
Acceptable use policy
Data loss prevention policy
Disaster recovery plan
BYOD policy
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
IaaS
Multitenancy
Hybrid
A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?
Reconfigure port tagging for the video traffic.
Implement another DHCP server.
Enable IGMP snooping on the switches.
The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?
Generator
Power distribution unit
Uninterruptible power supply
A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?
show interface
show config
show route
A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line?
netstat -a
netstat -e
netstat -n
Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)
TIA-568-A - TIA-568-B
TIA-568-B - TIA-568-B
RJ11
RJ45
A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?
Captive portal
Wireless client isolation
Role-based access
A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?
A
AAAA
CNAME
A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an APIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing?
DHCP exhaustion
A rogue DHCP server
A DNS server outage
A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?
Validate the findings in a top-to-bottom approach.
Establish a plan of action to resolve the issue.
Document the findings and actions.
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
Client-to-site VPN
Clientless VPN
Site-to-site VPN
RDP
A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used?
Top-to-bottom
Bottom-to-top
Divide-and-conquer
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A network expansion caused by an increase in the number of branch locations to the headquarters
An increase in network security using encryption and packet encapsulation
A mandatory requirement to increase the deployment of an SDWAN network
Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling?
RJ11
LC ports
Patch panel
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
MTTR
MOU
SLA
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?
Warm
Cold
Cloud
Which of the following would be used to forward requests and replies between a DHCP server and client?
Lease
Scope
Relay
Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time?
Using a tone generator and wire map to determine the fault location
Using a multimeter to locate the fault point
Using an OTDR in one end of the optic cable to get the fiber length information
A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?
Interference from other devices
Insufficient bandwidth capacity
Duplicate SSIDs
Which of the following is a benefit of the spine-and-leaf network topology?
Increased network security
Stable network latency
Simplified network management
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?
Adjust the proper logging level on the new firewall.
Tune the filter for logging the severity level on the syslog server.
Activate NetFlow traffic between the syslog server and the firewall.
A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company's network hardware. The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect. The following settings are common to all network configurations.

Which of the following actions would MOST likely reduce this issue? (Choose two.)

 
Change the default gateway to 10.0.0.1.
Change the DNS server to 10.1.10.1.
Change the DHCP scope end to 10.1.10.250.
Disable AP isolation.
Reduce the DHCP lease time to four hours.
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
iPerf
NetFlow analyzer
Internet speed test
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this BEST represent?
SSO
Zero Trust
VPN
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
Changing the server's IP address
Implementing an ACL
Installing a rule on the firewall connected to the web server
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceroute from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings?
Asymmetric routing
An incorrect gateway
A routing loop
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure?
DNS failure
DHCP scope exhaustion
Incorrect VLAN
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
Network access control
Least privilege
Separation of duties
A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will the technician MOST likely use to accomplish this task?
A bridge
A repeater
A media converter
After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes. Which of the following would be BEST to use for these notifications?
Traps
NetFlow
Syslog
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
Traffic shaping
Syslog
QoS
SNMP
At which of the following OSI model layers does an IMAP client run?
Layer 2
Layer 4
Layer 6
Layer 7
Which of the following would be the MOST cost-effective recovery solution for a company's lower-priority applications?
Warm site
Cloud site
Cold site
Which of the following network devices can perform routing between VLANs?
Layer 2 switch
Load balancer
Layer 3 switch
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified in the SLA. Which of the following would BEST help measure the throughput?
iPerf
Ping
NetFlow
A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
Perform a site survey.
Review the AP placement.
Monitor channel utilization.
Which of the following is the primary function of the core layer of the three-tiered model?
Routing
Bridging
Switching
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
Channel to the highest frequency within the band
AES encryption
TKIP encryption protocol
To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the following can be configured to fulfill this requirement?
QoS traffic classification
Port mirroring
Flow control
Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic?
EIGRP
OSPF
BGP
A technician is consolidating a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
Seamless roaming
WPA
MU-MIMO
Which of the following is used to provide disaster recovery capabilities to spin up all critical devices using internet resources?
Hot site
Cold site
Cloud site
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
Botnet
ARP spoofing
DDoS
Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring?
Jitter
Bandwidth
Latency
An international company is transferring its IT assets, including a number of WAPs, from the United States to an office in Europe for deployment. Which of the following considerations should the company research before implementing the wireless hardware?
Regulatory impacts
CDMA configuration
802.11 standards
A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network?
Disable unneeded switchports in the area.
Lower the radio strength to reduce Wi-Fi coverage in the waiting area.
Enable MAC filtering to block unknown hardware addresses.
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information. Which of the following actions should the network technician take to prevent data loss?
Disable the user account.
Lock the phone.
Execute remote wipe.
A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue?
Verifying if an encryption protocol mismatch exists.
Verifying if a captive portal is active for the WLAN.
Verifying EIRP power settings on the access point.
Which of the following topologies requires the MOST connections when designing a network?
Mesh
Star
Bus
A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the following is MOST likely the cause of the issue?
Port tagging
Port aggregation
Port security
A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected?
Isolating the guest network
Securing SNMP
MAC filtering
An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF?
Electrical
Humidity
Smoke
A network administrator is reviewing the network device logs on a syslog server. The messages are normal, but the time stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?
Change the time on the syslog server.
Change the NTP settings on the network device.
Adjust the timeout settings on the syslog server.
Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)
They used the wrong type of fiber transceiver.
Incorrect TX/RX polarity exists on the link.
The connection has duplexing configuration issues.
Halogen light fixtures are causing interference.
One of the technicians installed a loopback adapter.
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
EIGRP
MPLS
BGP
A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests?
10.10.10.10
127.0.0.1
192.168.0.1
An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?
Open Shortest Path First
Port mirroring
Spanning Tree Protocol
During a risk assessment, which of the following should be considered when planning to mitigate high CPU utilization of a firewall?
Recovery time objective
NIC teaming
Load balancing
A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100% capacity for a long duration. Which of the following performance metrics is MOST likely to be impacted with sustained link saturation?
Speed
Latency
Bandwidth
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
Scalable networking
Elastic computing
Hybrid deployment
A technician discovered that some information on the local database server was changed during a file transfer to a remote server. Which of the following should concern the technician the MOST?
Integrity
Confidentiality
On-path attack
During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report. Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client?
Humidity
Temperature
Electrical
After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information?
Security information and event management
SNMP OID values
NetFlow data export
Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs?
Virtual desktop
Full tunnel
Split tunnel
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
Out-of-band access
Split-tunnel connections
Virtual network computing
An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment?
SNMP traps
Interface statistics
Uptime
Which of the following can be used to decrease latency during periods of high utilization of a firewall?
NIC teaming
HA pair
VRRP
A network administrator needs to configure a server to use the most accurate NTP reference available. Which of the following NTP devices should the administrator select?
Stratum 1
Stratum 2
Stratum 3
Stratum 4
Which of the following devices is used to configure and centrally manage access points installed at different locations?
Load balancer
Wireless controller
Proxy server
A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer?
Port duplex settings
Port aggregation
ARP settings
VLAN tags
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
Jumbo frames
Flow control
Port mirroring
Which of the following connector types would be used to connect to the demarcation point and provide network access to a cable modem?
RJ11
RJ45
F-type
Which of the following provides guidance to an employee about restricting non-business access to the company's videoconferencing solution?
Acceptable use policy
Data loss prevention
Remote access policy
Which of the following would MOST likely utilize PoE?
A printer
A camera
A hub
A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate?
Preventing broadcast messages leaving the client network
Blocking ports 67/68 on the client network
Configuring DHCP snooping on the switch
Which of the following can have multiple VLAN interfaces?
Hub
Layer 3 switch
Bridge
A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?
FTP
SFTP
TFTP
SMTP
A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?
MAC table
Neighbor Discovery Protocol
ARP table
Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
2
19
4
100
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation, coordination, and termination of the call?
Session
Physical
Transport
A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?
Immediately shut down the vulnerable application server.
Install a network access control agent on the server.
Deploy a new server to host the application.
Check for the existence of a known exploit in order to assess the risk.
A company is utilizing multifactor authentication for data center access. Which of the following is the MOST effective security mechanism against physical intrusions due to stolen credentials?
Access control vestibule
Biometrics security hardware
Motion detection cameras
A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?
Run the traceroute command on the server
Run iperf on the technician's desktop.
Run the show interface command on the switch.
An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?
Leased line
Satellite
Fiber
A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?
Single-mode
Coaxial
Cat 6a
A network engineer developed a plan of action to resolve an ongoing issue. Which of the following steps should the engineer take NEXT?
Verify full system functionality and implement preventative measures.
Document findings, actions, outcomes, and lessons learned.
Implement the solution to resolve the problem.
Which of the following documents would be used to define uptime commitments from a provider, along with details on measurement and enforcement?
NDA
SLA
MOU
Switch 3 was recently added to an existing stack to extend connectivity to various parts of the network. After the update, new employees were not able to print to the main networked copiers from their workstations. Following are the port configurations for the switch stack in question. Which of the following should be configured to resolve the issue? (Choose two.)
Enable the printer ports on Switch 3.
Reconfigure the duplex settings on the printer ports on Switch 3.
Reconfigure the VLAN on all printer ports to VLAN 20.
Reconfigure the VLAN on the printer ports on Switch 3.
Enable all ports that are shut down on the stack.
A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files. Which of the following DHCP services can be used to accomplish this task?
Scope options
Exclusion ranges
Lease time
An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?
Access control lists
Firewalls
Private VLANs
A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers?
Coaxial over Ethernet
Fibre Channel
Internet Small Computer Systems Interface
A customer wants to log in to a vendor's server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server?
Secure Sockets Layer
Site-to-site VPN
Remote desktop gateway
A user calls the IT department to report being unable to log in after locking the computer. The user resets the password, but later in the day the user is again unable to log in after locking the computer. Which of the following attacks against the user is MOST likely taking place?
Deauthentication
Phishing
Brute-force
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection. Which of the following settings should provide better network stability?
Client association timeout
RSSI roaming threshold
RF attenuation ratio
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot when a network is experiencing a number of CRC errors?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Which of the following uses the link-state routing algorithm and operates within a single autonomous system?
EIGRP
OSPF
RIP
A network administrator is designing a wireless network. The administrator must ensure a rented office space has a sufficient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?
Channel utilization
Polarization
Antenna type
An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern's work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?
PoE and UTP incompatibility
Electromagnetic interference
Wrong cable pinout
Several users with older devices are reporting intermittent connectivity while in an outdoor patio area. After some research, the network administrator determines that an outdoor WAP might help with the issue. However, the company does not want the signal to bleed into the building and cause interference. Which of the following should the network administrator perform to BEST resolve the issue?
Disable the SSID broadcast on the WAP in the patio area.
Install a WAP and enable 5GHz only within the patio area.
Install a directional WAP in the direction of the patio.
Which of the following is most likely to have the HIGHEST latency while being the most accessible?
Satellite
DSL
Cable
Which of the following is used to elect an STP root?
A bridge protocol data unit
A bridge ID
Interface port priority
Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
netstat -a
ifconfig
ipconfig /all
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user’s computer and verifies that pings fail to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?
netstat
ipconfig
traceroute
An employee reports to a network administrator that internet access is not working. Which of the following should the administrator do FIRST?
Establish a theory of probable cause.
Identify symptoms.
Determine if anything has changed.
0
{"name":"Network+ Certification Exam Pt.3", "url":"https://www.quiz-maker.com/Q5UDNP00X","txt":"Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model?, A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?, Which of the following would be used to expedite MX record updates to authoritative NSs?","img":"https://www.quiz-maker.com/3012/CDN/97-4783411/screen-shot-2024-01-18-at-6-46-57-pm.png?sz=1200-00000000001000003281"}
Make your own Survey
- it's free to start.