Actual Questions 292 - 332

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

QUESTION NO: 328 A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC's IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC? A. 192.168.12.97 255.255.255.192 B. 192.168.12.97 255.255.255.224 C. 192.168.12.97 255.255.255.240 D. 192.168.12.97 255.255.255.248

A. 192.168.12.97 255.255.255.192

QUESTION NO: 310 A home user is unable to get to the Internet from a workstation that is connected to a wireless network. When reviewing the results of the ipconfig command, the user wants to verity the default gateway is correct. Which of the following devices should be the gateway? A. Cable modem B. SOHO router C. DNS server D. Layer 2 switch

A. Cable modem

QUESTION NO: 292 A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step? A. DHCP scope B. DHCP lease C. Default gateway D. DNS zone

A. DHCP scope

QUESTION NO: 297 After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of 169.254.112.137. Which of the following is MOST likely causing the issue? A. DHCP scope exhaustion B. Improper DNS setting C. Incorrect ACL setting D. Port-security violation

A. DHCP scope exhaustion

QUESTION NO: 321 Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion? A. Reviewing application logs B. Reviewing a baseline report C. Reviewing a vulnerability scan D. Reviewing SLA requirements

A. Reviewing application logs

QUESTION NO: 313 When configuring a new switch in a packet-switched network, which of the following helps protect against network loops? A. Spanning tree B. Flood guard C. BPDU guard D. DHCP snooping

A. Spanning tree

QUESTION NO: 311 A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss? A. Spectrum analyzer B. OTDR C. Packet sniffer D. Multimeter

A. Spectrum analyzer

QUESTION NO: 324 A technician arrives at a new building to find cabling has been run and terminated, but only the wall ports have been labeled. Which of the following tools should be utilized to BEST facilitate labeling the patch panel? A. Tone generator B. Cable tester C. Multimeter D. Loopback adapter

A. Tone generator

QUESTION NO: 296 A network technician is segmenting network traffic into various broadcast domains. Which of the following should the network technician utilize? A. VLAN B. STP C. ACL D. BPDU

A. VLAN

QUESTION NO: 305 A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot? A. tracert B. netstat C. arp D. dig

A. tracert

QUESTION NO: 307 Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Choose two.) A. 21 B. 22 C. 23 D. 25 E. 123 F. 443

B. 22 C. 23

QUESTION NO: 308 Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likely the cause? A. Duplex/speed mismatch B. ACL misconfiguration C. Bad port D. Crosstalk

B. ACL misconfiguration

QUESTION NO: 315 A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection? A. Partial mesh B. Ad hoc C. Ring D. Bus

B. Ad hoc

QUESTION NO: 318 According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Choose two.). A. Test solutions. B. Duplicate the problem C. Establish a theory of probable cause D. Question users E. Implement preventive measures. F. Document findings

B. Duplicate the problem D. Question users

QUESTION NO: 322 A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement? A. WPA-PSK B. EAP-TLS C. AES-CCMP D. WEP-TKIP

B. EAP-TLS

QUESTION NO: 294 A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone? A. CDMA B. GSM C. TDMA D. CSMA

B. GSM

QUESTION NO: 332 A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described? A. Logic bomb B. Social engineering C. Trojan horse D. Insider threat

B. Social engineering

QUESTION NO: 299 A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users' devices to the company network. To complete this step, which of the following should be used to secure the remote network location? A. Host-based firewalls B. WPA2/WPA C. Open access D. Port filtering

B. WPA2/WPA

QUESTION NO: 300 The length of an IPv6 address is: A. 32 bits B. 64 bits C. 128 bits D. 256 bits

C. 128 bits

QUESTION NO: 325 Which of the following policies prohibits a network administrator from using spare servers in the datacenter to mine bitcoins? A. NDA B. BYOD C. AUP D. MOU

C. AUP

QUESTION NO: 319 A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Which of the following are MOST likely the causes of this issue? (Choose two.). A. Damaged cables B. Crosstalk C. Bent pins D. TX/RX reverse E. VLAN mismatch F. Duplex mismatch

C. Bent pins E. VLAN mismatch

QUESTION NO: 316 An NGFW alerts that a web server in the DMZ is sending suspicious traffic. A network administrator finds that port 25 is open, and the traffic is originating from this port. The only purpose of this server is to deliver website traffic. Which of the following should the network administrator recommend to the systems administrator? A. Disable Telnet service on the server. B. Disable DHCP service on the server. C. Disable the SMTP service on the server D. Disable FTP service on the server.

C. Disable the SMTP service on the server

QUESTION NO: 294 A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone? A. CDMA B. GSM C. TDMA D. CSMA Answer: B Explanation: CompTIA N10-007 Exam "Pass Any Exam. Any Time." - www.actualtests.com 171 QUESTION NO: 295 A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches? A. Confirm the patch's MD5 hash prior to the upgrade. B. Schedule the switches to reboot after an appropriate amount of time. C. Download each switch's current configuration before the upgrade. D. Utilize FTP rather than TFTP to upload the patch.

C. Download each switch's current configuration before the upgrade.

QUESTION NO: 293 Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another? A. ATM B. Frame relay C. MPLS D. PPP

C. MPLS

QUESTION NO: 312 Which of the following should be configured to allow for IP-to-name resolutions? A. CNAME B. A C. PTR D. NS

C. PTR

QUESTION NO: 301 A network technician is troubleshooting a problem with a user's client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue? A. Reconfigure the user's VPN connection in the router to fix profile corruption. B. Inform the user that provisioning sometimes fails and the connection needs to be attempted again. C. Review the logs in the VPN client to check for any informational messages. D. Verify the system has the latest OS patches installed.

C. Review the logs in the VPN client to check for any informational messages.

QUESTION NO: 298 A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this? A. TLS B. Remote file access C. Split tunneling D. HTTPS

C. Split tunneling

QUESTION NO: 304 A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware? A. RDP B. SSH C. TFTP D. Telnet

C. TFTP

QUESTION NO: 317 Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use? A. Telnet B. LDAP C. TFTP D. Samba

C. TFTP

QUESTION NO: 320 While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL? A. permit tcp any any eq 20 B. permit udp any any eq 25 C. permit udp any any eq 53 D. permit udp any any eq 68 E. permit tcp any any eq 110 F. permit tcp any any eq 8080

C. permit udp any any eq 53

QUESTION NO: 327 A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server's local firewall? (Choose two.) A. 20 B. 21 C. 53 D. 67 E. 68 F. 389

D. 67 E. 68

QUESTION NO: 309 A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement? A. CNAME record in the users' dynamic DNS accounts B. Additional lease time for the laptop computers C. IP helper relay system for configuration hops D. DHCP reservation for the laptops' MACs

D. DHCP reservation for the laptops' MACs

QUESTION NO: 331 A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram? A. Rack location B. Room number C. Media type D. Hostname

D. Hostname

QUESTION NO: 302 Management requires remote access to network devices when the ISP is down. Which of the following devices would provide the BEST solution? A. Router B. Firewall C. Bridge D. Modem

D. Modem

QUESTION NO: 326 Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance? A. Clustering B. Load balancing C. Redundant circuits D. NIC teaming

D. NIC teaming

QUESTION NO: 306 Which of the following MUST be installed on an employee's computer if the remote access VPN implements an SSL VPN with PKI authentication? A. Shared secret B. HTTPS server C. Soft token D. Private certificate

D. Private certificate

QUESTION NO: 329 A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Choose two.) A. RJ45 B. DB-9 C. LC D. SFP E. GBIC F. SC

D. SFP E. GBIC

QUESTION NO: 330 Which of the following physical security devices is used to prevent unauthorized access into a datacenter? A. Motion detector B. Video camera C. Asset tracking D. Smart card reader

D. Smart card reader

QUESTION NO: 314 A company has just installed a new cloud VoIP solution; however, users occasionally report poor call quality or dead air being present. Which of the following describes the NEXT troubleshooting step the technician should take? A. The technician should check the internal diagnostics on all the phones to look for a common thread. B. The technician should reset all the phones and reprovision information from the provider C. The technician should use a packet tracer to see if the traffic is getting out of the network D. The technician should run ping tests on the Internet line to monitor for packet loss and latency

D. The technician should run ping tests on the Internet line to monitor for packet loss and latency

QUESTION NO: 323 A network administrator is installing a campus network of two routers, 24 switches, 76 APs, and 492 VoIP phone sets. Which of the following additional devices should the administrator install to help manage this network? A. VoIP PBX B. Content filter C. RADIUS server D. Wireless controller

D. Wireless controller


Kaugnay na mga set ng pag-aaral

Английский шаг за шагом - 2 - 2

View Set

WIC Information Everyone Should Know

View Set

(Ch 1-2) Principles of Microeconomics

View Set