CompTia Network+ 10-007
A consultant is helping a company design a wireless LAN implementation. Network requirements include internal access points for network host connections and external wireless connections between buildings. The consultant needs to help the company choose appropriate antennas. What does the dBi rating of an antenna represent?
A higher dBi antenna has more gain and a narrower field pattern than a lower dBi antenna.
A company needs to support a secure link for remote users to a web-aware application that is deployed on a server in the perimeter network. The Technical Services department recommends using an SSL VPN to minimize the configuration changes needed in network firewalls. The solution will use certificate-based authentication.
A server-side certificate only.
The network team has been tasket with a new project. They need to identify the best set of devices to be purchased. Match the networking device with the BEST use case. To answer, drag the most appropriate device to each description.
An in-line solution to block a network attack immediately: (IPS) An edge device that can classify traffic and apply security policies: (NGFW) A dedicated device that can authenticate and authorize VPN users: (RADIUS Server)
An alert indicates the loss of connectivity with a router. The log shows the following line: EGP: Sending 19 bytes keepalive to 11.17.2.1 (External AS 1471) Failed, Neighbor down. TCP/179 Which routing protocol should be investigated?
BGP
Which type of attack is primarily used to compromise user passwords?
Brute force
A company is replacing a portion of its wired LAN with a wireless LAN configured for Wi-Fi Protected Access II (WPA2). The company needs to use the most secure encryption protocol for WPA2. Which protocol should the company implement?
CCMP-AES
What is a secure multipoint IP hub-and-spoke WAN configuration that supports direct communication between spokes?
DMVPN
A company wants to deploy a web server in a new DMZ. Which device should the company use to configure a new network zone and Layer 7 filtering policies?
FIrewall
Which of the following is an example of valid multifactor authentication factors?
Facial recognition and PIN
A company collect network traffic data from multiple subnets. Detailed analysis indicates that packets are being dropped by one of the routers. Technicians suspect this is due to misconfigured firewall ACLs. Where should technicians look for more detailed information?
Firewall logs
A company recently implemented a bring your own device (BYOD) policy and is adding security controls over personal devices. The company wants to ensure that some managed aps and most company data will be unavailable when a device leaves the corporate campus. What should the company use to implement this?
Geofencing
Which metric is used to determine routers when using RIP?
Hop count
A network consultant determines that company can improve its performance by implementing jumbo frames. The network is configured with 10/100/1000 switches, and all hosts are configured with Gigabit Ethernet network adapters. The network is wired with Cat 5e UTP cable. What must the company do to support jumbo frames?
Increase the MTU to 9000.
What is the role of an MIB when implementing SNMP for network management?
It is collection of manageable device definitions that identifies device property information.
Spare parts and other pieces of equipment are kept in a locked cage. There are internal security devices that set off alarms when triggered. People authorized to enter the area need to be able to remotely disable and enable the alarms form outside the cage as needed. What should the company use?
Key fob
A company wants to connect devices so that there are many redundant interconnections. Which topology should the company use?
Mesh
The Technical Services team prepares a drawing to document all network devices with their IP addresses, device names, and connection information. Which type of documentation does this represent?
Physical network diagram
The nslookup command fails and shows the error in the exhibit. What should the support team create to fix the problem?
Reverse lookup zone
Technicians want to test a series of patches before applying them on multiple servers. The test server is moved to a private LAN. Technicians need a way to quickly return the test server to its state immediately before the patches are installed incase there are any problems. What should technicians do first to prepare for the test?
Run a full backup of the test server.
Which service does an ASP provide to subscribers?
SAAS
A network engineer wants to create an uplink between two switches using a fiber optic cable. Which two standards could the engineer use to connect the cable to a switch? Choose two.
SFP+ GBIC
A company expands its corporate campus and builds new facilities for its warehouse and additional offices. The company needs to run a high-bandwidth link between the buildings. The buildings are approximately 4km (about 2.5 miles) apart. What kind of cable should the company use?
Single-mode fiber
Which mechanism is used by TCP to set up and synchronize a new TCP/IP connection?
Three-way handshake
A network engineer has installed three gigabit switches. The switches will provide access to NAS devices for end users. What should the engineer configure to avoid a bottleneck in the network with big file transfers?
Trunks with port aggregation
What should a company use to create a point-to-point bridge between two APs?
Unidirectional antennas
A security audit highlights some security concerns in a newly deployed SDN process. One of the scripts uses the verify md5 command to check the image integrity, and uploads it to a server using FTP. What should the company do o address the security concerns?
Use SHA512 for the integrity and FTPS for uploads.
A network administrator would change the ID on a switch's native VLAN to mitigate what type of attack?
VLAN hopping
Which device uses the LWAPP and CAPWAP protocols for communication?
WLC
Which type of vulnerability would NOT be reported by a vulnerability scan?
Zero day
A company contracts with a cloud provider. The cloud provider is responsible for virtualized hardware, storage, and network support. The company is responsible for installing, licensing, and maintaining the operating system and server applications. Which type of service does this describe?
laaS
Match the WAN technology with its characteristics. To answer, select the appropriate technologies from the drop-down menus.
-A virtual private network that can route traffic around link failures and uses PE and CE routers: (MPLS) -A fast connection via copper phone lines and fiber optic cables offering speeds of 100 Mbps: (VDSL) -A connection between a PBX system and the Internet for voice traffic: (SIP Trunk) - A SONET fiber optic technology that offers data rates of up to 155.52 Mbit/s: (OC3) -An ISDN standard that consists of 24 digital channels: (PRI)
Which two items would be specified as part of an SLA? (Choose two.)
-Availability and uptime -Help desk response time
A junior network engineer receives a new router to configure. Which two configuration tasks should the engineer perform BEFORE he copies a standard configuration template onto the router? (Choose two.)
-Change the default username and password -Update the firmware
A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update? (Choose two.)
-Physical network diagram -Logical network diagram
Match each statement with the appropriate switch port protection. To answer, select the appropriate switch port protection from the drop-down menus.
-To protection enforces the placement of root bridges in the network to provide a consistent network environment.(Root guard) -This protection helps ensure a predictable active network topology by denying ports that should not participate in STP from receiving TCNs.(BPDU guard) This protection monitors traffic and packet types and reacts to block DoS and DDoS attempts.(Flood guard)
At what point in a troubleshooting methodology is it appropriate to escalate a problem? (Choose two.)
-if the technician is unable to confirm and theory and unable to establish a new theory. -If no appropriate solution is available
Based on SANS Institute recommendations, in what order should incident response phases carried out? To answer, arrange the phases in the correct order.
1. Preparation 2. Identification 3. Containment 4. Investigation 5. Eradication 6. Recovery 7. Lessons learned
Headquarters requests a new IP subnet. The solution must meet the following requirements: *IPv4 class A address type *Private IP address *At least 15 usable IP addresses within the range Whic subnet would meet the requirements?
10.10.10.128/27
A company is preparing to deploy a wireless LAN (WLAN in a newly constructed office space. The network design specifies the minimum channel bandwidth requirement as 80 Mhz. Which standard should the access points support?
802.11ac
A recent security audit reveals that users from all locations have full remote access to network devices. Which solution should be implemented to address that problem?
ACL
A company has ordered the cable shown in the exhibit. Which of the following WAN technologies would MOST likely be deployed?
ADSL
A company wants to create a site-to-site VPN. Maximum security is required. Which set of protocols should the company use?
AES for encryption and SHA512 for hashing
A network administrator has been tasked with deploying a new wireless LAN controller. Which protocol is recommended for integrity checking and encryption?
AES-based CCMP
A policy includes the following statement: "Employees are not allowed to use company equipment to copy or distribute copyrighted material without the written permission of the holder of the copyright." Which policy would this statement be part of?
AUP
Network devices with their role in 802.1x port-based authentication.
Access point: Authenticator Tablet: Supplicant RADIUS server: Authentication server Switch: Authenticator Laptop: Supplicant
Identify which statements describe exploits and vulnerabilities. To answer, select the appropriate threat category from the drop-down lists next to each statement.
An application has an open maintenance hook that provides access to configuration settings: (Vulnerability) A database server's operating system is missing several security patches: (Vulnerability) Deceptive calls are used to gather critical information about network servers. (Exploit) User login accounts have administrative rights to client computers.(Vulnerability) A data breach exposes personal information about customers. (Exploit)
Which policy sets guidelines for allowing employees to use their own personal devices for work-related tasks?
BYOD
Which media access method is used 801.11 RTS/CTS network configurations and is NOT able to detect collisions during transmissions?
CSMA/CA
A restaurant offers public Wi-Fi access to the internet for its customers. A customer is prompted with a web page that requires the customer to agree to abide by use policies while connected. What is this an example of?
Captive portal
A company is wiring a new office space to support 1000BaseT Ethernet. The network design calls for UTP cable. The majority of the cable will be routed through a suspended ceiling. Which cable should the company use?
Cat 5e plenum
A recent network audit has highlighted the security issues on the access point shown in the exhibit. What should the company do?
Change the authentication method to WPA-AES
A company's WLAN is configured with one access point (AP) named AP1. AP1 has an SSID of AP1, is configured to use channel 1, and is configured for WPA2-PSK. The company deploys a second AP named AP2 and with an SSID of AP2. The AP is configured to use channel 6 and is configured for WPA2-PSK. It is also configured with a unique IP address range. The remaining configuration settings are left at the defaults. Technical Services discovers that someone has been hacking into AP2 and changing configuration settings. After the settings are corrected, they are changed again in a few days. How should they implement device hardening to prevent this from occurring?
Change the default administrator's password on AP2.
A file server deployed on the company perimeter network is used to store reference materials and templates for forms. All of the files are stored on the same disk partition. Files are downloaded from the server using FTP. The company needs to be able to determine whether a file is changed while stored on the server. What should the company do?
Create a hash for each file.
A company encounters problems with inappropriate disclosure of company information including forwarding of sensitive emails and transfer of files to offsite locations. The company determines that the actions were inadvertent rather than malicious acts. The company implements of an employee training program to raise awareness about data security. Technical Services is asked to put controls in place to help prevent these disclosures from occurring in the future. What should Technical Services use?
DLP
A company is deploying a web farm to host a publicly available website. The company network is configured as shown in the exhibit. The company wants to make the website available but limit the exposure of the internal network to the Internet. The solution needs to support secure access to the website. What should the company implement?
DMZ
A NIDS reports several attempts to download files from an external IP address. The Technical Services department determines that the source is a website that is made to look like a site from which network users download reference materials and blank PDF forms. Users enter the correct URL for the website but are being sent to a different IP address. Which type of attack is this?
DNS poisoning
What is the purpose of on-boarding and off-boarding procedures?
Defining activities when an employee joins or leaves an organization.
A company has some remote offices with intermittent WAN connections. Administrators need to be able to connect to and manage network routers even when the WAN connection is unavailable or when the router is minimally operable. Technical personnel are directed to suggest a technology to support an out-of-bounds management plan. What should the technical personnel recommend?
Dial-in modem
A server on the internal network is determined to be at risk for potential attack. The Technical Services team is directed to harden the server to minimize this risk. The network supports wired and wireless access. The server is connected through a wired connection. The computer is backed up to a network location once a week, over the weekend. The computer is rebooted after the backup. Which two actions should hardening include? (Choose two.)
Disable unused ports
What type of attack is designed to flood a server with traffic, either crashing the server or making it unavailable?
DoS
While discussing a configuration issue with a switch manufacturer's technical support team, the in-house support team learns of a switch vulnerability. The vulnerability was fixed with a recent update. The support team needs to mitigate the vulnerability and avoid a potential attack with minimum rish to the network, downtime, an cost. What should in-house support do?
Download and install the most recent firmware update.
A company is designing a wireless LAN deployment. To help secure the network, the company wants to use an authentication protocol option that requires a client certificate on each wireless client. Which authentication protocol option should the company use?
EAP_TLS
A technician configures an access point as shown in the exhibit. He creates a list of MAC address to allow on the network using MAC filtering. The technician realizes that despite this configuration, any device can still connect. What should the technician do?
Enable MAC filtering globally
PC1 fails to receive an IP address in the network shown in the exhibit. What should be configured to fix the problem?
IP helper address on Router 1
A company wants to configure a site-to-site VPN link between two offices. Users in each office should have access to resources in the other office, including shared folders and network services. What type of VPN should the company use?
IPSec VPN
Which type of backup takes the least time and uses the least amount of disk space?
Incremental
Spare parts and other pieces of equipment are kept in a locked cage. There are internal security devices that set off alarms when triggered. People authorized to enter the area need to be able to remotely disable and enable the alarms from outside the cage as needed. What should the company use?
Key fob
Which protocol is an open, vendor-neutral standard protocol for accessing and maintaining directory services?
LDAP
A medium-sized company is moving into a new office space. The office is being prewired with Cat 6 cabling. Employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible. What should Technical Services use to ensure this?
Labeling
A company wants to connect a remote office using a satellite internet service. What should be the main concern for this deployment?
Latency
Which layer of the OSI model are web browsers and email clients implemented at?
Layer 7
What are smart cards used for in computer networking?
Logon and authentication
A company has offices on several floors of a building. All connections to external public lines come in through a central area and are routed to distribution points on each floor. The distribution points on each floor connect to the internal network. Where is the cabling and equipment for the central area documented in detail?
MDF documentation
A company is developing its business continuity and disaster recovery plans. The company needs to determine the reliability of a critical network device. Continuity plans will depend on how frequent the device is likely to fail. Which value should be used to determine this?
MTBF
A company needs to tighten its network security. This includes restricting access based on operating system and version, current patch versions, and antimalware updates. Devices failing to meet access requirements should be quarantined, user access restricted, and automated remediation initiated. What should the company implement?
NAC
A team with members from two companies is designing a new product. All members of the team sign a legally binding document that details what they may and may not discuss outside the project team. What is this an example of?
NDA
The network technical team needs to configure two network connections working in a parallel between a server and a switch to improve available bandwidth. The switch is already configured to support the communication. What should the team configure on the server?
NIC teaming
Which layer of the OSI model do routers operate at?
Network
The network support team needs to determine whether data is being encryped when it is sent over the network. What process should the team use?
Packet analysis
Against which type of attack is end user training most effective?
Phishing
Which two attack types are examples of social engineering attacks? (Choose two.)
Phishing Tailgating
A company needs to improve security in its offices. Employees should have to prove their identity when entering the building, and visitors should be detained in the lobby until an escort can be arranged. Which two aspects of physical should the company use? (Choose two.)
Photo ID badge Security guard
In-house technicians plan to emulate a penetration attempt. They want to see if they can learn what services are running on network servers. What should they use?
Port scanning
A company deploys a new wireless network. The company secures access using WPA2-Personal. What is required for a client to connect to an access point?
Pre-shared key
A small company subscribes to a popular productivity application suite. All employees access the applications through a web browser interface. Employees store their data locally on their own computers. Which cloud delivery model does this describe?
Public
A company wants to deploy an 802.1x standalone wireless access point. Which authentication protocol should be used?
RADIUS
What should a company use an authentication and authorization server for WPA2-Enterprise?
RADIUS
A company wants to support multiple client computers running an application installed on a computer that runs Widows Server 2016. The clients should be able to take advantage of the memory and processor resources on the server. Each client will have a unique data set. Which technology should the company use?
RDP
A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data. Which type of attack does this scenario describe?
Ransomware
Which device should a company use to configure a new area within OSPF?
Router
A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include: *Users authenticate with a user ID and password. * All communication between the server and client is encrypted. Open ports on the perimeter firewall are kept a minimum. * No certificate is required at the server or client. What should the company select as a solution?
SFTP
A company must implement additional monitoring and analysis to meet compliance requirements relating to work done for new customers. The company needs a solution that can collect log, event, and other security information from a variety of sources and correlate and analyze the data to identify threats. It should provide for long-term storage of the data collected and be able to identify trending threats. What type of device solution should the company use?
SIEM
Which DNS resource record type is uded to identify and locate web servers in a network?
SRV
A technician needs to execute command-line management commands on a Linux server located in a remote office. The technician should be required to log on at the server. All communications should be encrypted. What should the technician use?
SSH
A network team has deployed a new SIP trunk. What will MOST likely be used by end users in this network?
Softphone
A company has several employees who work from home at least part of the time. A data analysis application is used extensively in the company office, but employees are not authorized to copy the application and use it from their homes. What type of policy does this demonstrate?
Software licensing
An ISP has installed a DWDM device at a new location. What would be the MOST likely reason for that?
Solve the fiber exhaust problem.
A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company. What should the company use to help ensure this?
Standard operating procedures
A company needs a leased line connection supporting the transmission speed of 30 Mbps. Which service should the company choose?
T3
A company wants to implement an authentication and authorization solution for network devices that also directly supports device management. What should the company use?
TACACS+
Which statement BEST describes a warm backup recovery site?
The site has computer equipment, network hardware, and data communication installed and configured, but it does not have recent backups of corporate data.
A company is installing a large rack-mounted infrastructure to support a web server farm. High-availability is a critical concern for the company. You need to recommend a solution that will ensure continued availability without interruption if AC line power is lost. Which type of technology does the company need to ensure this?
UPS
A company needs to deploy network devices that support configuration of multiple VLANS and the ability to route traffic between the VLANs. Which type of device should the company use?
UTM appliance
A company wants to open a new office. A wireless site survey reveals that there are 12 access points in the area immediately around the office and that they use channels 1,6, and 11. What should the company do to address the interference problem?
Use the 5 GHz band.
Most of a company's network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes as mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company's main office. The administrators being trained log on and work locally from a Linux server. The trainer will connect to the Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer. Which remote connection technology should the trainers use?
VNC
A company needs to have a reliable record of everyone who enters or leaves a locked secure area of the building. What should the company use?
Video surveillance
A small company leases additional office space next to its current space. The new space will have a mix of wired and wireless devices. The company arranges with a local community college to have students in the electronics program to get work experience by running the cabling. The company's Technical Services team will provide detailed guidelines for how to install that cable. Which documentation should the Technical Services team produce?
Work instructions
The host shown in the exhibit is unable to communicate with other network hosts. This is a recent problem. Each subnet has a subnet mask of 255.255.255.0. The technical team needs to determine whether the TCP/IP protocol stack loaded and whether the computer's NIC is working. Which command should they run?
pijng 127.0.0.1
A network technician wants to deploy a new virtual firewall. The firewall has to support three interfaces: G0/0, G0/1, and G0/2. What should the technician configure at the VM level for these interfaces?
vNIC
What is the purpose of each protocol? To answer, choose the appropriate protocol to each description. A protocol may be used once, more than once, or not at all.
-Providing rules for establishing connections and sending data between applications and is connection-oriented = (TCP) -Used for communication error reporting and troubleshooting with diagnostic utilities = (ICMP) -Providing standard rules and definitions for host addressing, routing, and data packet structure = (IP) -Used when acknowledgement and reliable delivery of data not required and is connectionless = (UDP)
A branch office ha been allocated the subnet of 192.168.1.64/26. Which three IP addresses can be used for user devices at this location? (Choose three).
192.168.1.111 192.168.1.65 192.168.1.98
A technician is setting up a SOHO with devices located in different rooms. The configuration needs to support multiple simultaneous data streams to maximum throughput. Which two standards support this configuration? (Choose two.)
802.11ac 802.11n
A company wants to interconnect several offices. The solution has to be secure, scalable, and should not require any changes to the existing agreements with ISPs. Which solution would meet the company's objectives?
DMVPN
What is the purpose of on boarding and off boarding procedures?
Defining activities when an employee joins or leaves an organization.
A systems administrator cannot ping a file server running Windows Server. Users can access files on the server without any problems. What should the administrator check?
Local firewall rules
A company subscribes to connect all of this offices to the local MAN. The MAN uses a single-mode fiber backbone. The company needs to connect its offices to the backbone. Each office has a wired router with a firewall, a 10/100/1000 switch, and is wired with UTP cable. Each office also has a wireless access point connected to the switch. Which device should the company use to connect to the MAN?
Media converter
A consultant is setting up a SOHO for a customer. The customer's local cable TV provider will be the network ISP. Which device should be used to connect to the cable signal?
Modem
A company needs to deploy network devices that support configuration of multiple VLANs and the ability to route traffic between the VLANs. Which type of device should the company use?
Multilayer switch
The project team has received a list of requirements for a new solution that would allow the company to store files in a local area network. The proposal has to meet the following requirements: * Be cost effective and easy to deploy * Provide redundancy to file storage * Offer at least 3 TB of space What should the project team implement to meet these requirements?
NAS
A sales manager wants to provide a mobile device to all remote employees. The devices have to support low power and short-range peer-to-peer file transfers and payments using passive sources. Which technology should the manager consider?
NFC
Which Internet of Things technology is designed to facilitate touch less payments using passive embedded chips and smart devices?
NFC
Which protocol provides time synchronization service over the global Internet?
NTP
A company is configuring an internall network with routed subnets based on the following class B address range: 172.30.8.0/21 The company wants to set up the following subnets: Network A- 600 hosts Network B- 100 hosts Network C- 56 hosts Network D- 40 hosts The company wants to keep the unused addresses in each subnet to a minimum. Which network address ranges should the company use?
Network A: 172.30.8.0/22 Network B: 172.30.12.0/25 Network C: 172.30.12.128/26 Network D: 172.30.12.192/26 (Example on page 39 in photos.)
1) A collection of connected LANs over a large geographic area, enabling devices in different locations to communicate 2) Interconnection of devices near each other, such as in office, organized around an individual, and often using Bluetooth connections. 3) Connected LANs over a relatively small geographic area, such as connecting all of a company's buildings in the same location. 4) High-speed data network giving several LAN servers access to consolidated block-level storage, using either FC or iSCSI based-networks.
Network Type: 1) WAN 2) PAN 3) CAN 4) SAN
A consultant is helping set up an office in a remote rural area. The office needs a high bandwidth WAN link with the main office, which is located several hundred miles away. Which type of transmission medium should the consultant recommend?
Satellite
A company needs to use physical security devices to secure a server room. The following requirements must be met: *Entrance to the storage area should be limited to select employees only. *It should be possible to track any equipment removed from the room. *It should be possible to configure an alarm to sound if anyone is in the room after normal business hours. What should the company do? To answer drag the appropriate physical security device to each location. A physical security device may be used once, more than once or not at all.
See screenshots* (page 9)
A network engineer prepares a network diagram for a small company. The design should support routing in hardware, wireless access, and edge protection with advanced stateful packet inspection (SPI). What should the engineer install? To answer, drag the appropriate devices to each location. A device may be used once, more than once, or not at all.
See snapshots
One of a company's office areas is shown in the exhibit. The shaded area shows where devices can get a reliable connection with the access point (AP). Devices in the unshaded area are either unable to connect to the AP or have a weak connection. The company plans to deploy a wireless range extender. Where should the company deploy the wireless range extender? Click to indicate the BEST location for the device.
See snapshots * (Location B)
A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company. What should the company use to help ensure this?
Standard operating procedures.
Match the network requirements with the network devices that are needed to meet the requirement. Drag the appropriate device to each requirement. A device may be used once, more than once, or not at all.
-A company needs a device to help centralize authentication, mitigate radio interference, and provide load balancing, and improve bandwidtch usage: (Wireless controller) -A company needs to evenly distribute traffic between web servers deployed in its perimeter network: (Load balancer) -A company needs to add a layer of protection between internal network hosts and external websites. (Proxy server)
A company wants to deploy a new WLAN topology without running new electrical wiring. The solution has to support the 5Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power for a connected device. Which two components should be used? (Choose two.)
-A switch supporting the 802.3at standard. -An access point supporting the 802.11ac Wave 2 standard.
A company wants to deploy a new WLAN topology without running new eletrical wiring. The solution has to support the 5Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power for a connected device. Which two components should be used? (Two Answers)
-An access point supporting the 802.11ac Wave 2 standard. -a switch supporting the 802.3at standard
A company opens a new call center with 35 agents. The network team is tasked with providing them with LAN and WAN access. The solution must meet the following requirements: *Provide fast and reliable connections *Limit access to some local network resources * Filter access to the Internet Which three options should the network team implement? (Choose three.)
-Firewall ACL -VLAN on a switch -Proxy group
A network engineer wants to create an uplink between two switches using a fiber optic cable. Which two standards could the engineer use to connect the cable to a switch? (choose two).
-GBIC -SFP+
What are two main differences between a hub and a switch? (Choose two)
-Hub do not understand Mac Addresses, while switches maintain a CAM address table. -Hubs work at Layer 1, while switches work at Layer 2.
Match protocols and their default ports to their descriptions. To answer, select the appropriate protocol and default port from the drop-down lists next to each description.
-Protocol providing shared access to files, printers, and serial ports: Protocol= SMB Port= 445 -Supports secure communication with websites to protect data privacy and integrity: Protocol= HTTPS Port= 443 -Provides for audio-visual communication sessions and widely used in videoconferencing: Protocol= H.323 Port= 1720 -Provides for secure login and remote execution of commands: Protocol=SSH Port= 22 -Used to monitor and manage network devices: Protocol=SNMP Port= 161
A network engineer wants to configure a new standalone access point for a small company. The solution should support the 2.4 Ghz and 5Ghz bands, use a secure encryption standard, and provide filtering based on hardware addresses. What should the engineer configure? To answer drag the appropriate configuration options to each location. An option may be used once, more than once, or not at all.
) Operation mode: Access Point Mode ) IEEE Wireless Networking Standard: 802.11n ). Filtering: MAC Filter ) Security protocol: AES
The project team purchases an 8-port Layer 2 switch, a router, and an 8-port network hub. The router has two WAN interfaces: F0/0 and F0/1. A network engineer connects the switch to port F0/0 and the hub to port F0/1 on the router. How many collision and broadcast domains are available in this network? (Choose two.)
-2 broadcast domains -9 collision domains
A company is setting up the wireless LAN(WLAN) shown in the answer area. The company must determine which antennas to use. The risk intercepting the signal between the buildings must be minimized. Full coverage must be provided inside of each building. Which antennas should the company use? To answer, drag the appropriate antenna type to each access point. An antenna type may be used once, more than once, or not at all.
-Wireless bridge A (14 dBi right-facing) -Wireless bridge B (14 dBi left-facing) -Access point 1 (5 dBi omnidirectional) - Access point 2 (5 dBi omnidirectional)
Match the topology types with their descriptions. To answer, select the appropriate topology type for each description from the drop-down menus. 1)Provides temporary connections for wireless devices. No dedicated wireless access point is required. 2) All network nodes are attached to a central device, for example network switch or hub. 3) Enables communication between devices near a person in a space of small coverage.
1) Ad-hoc 2) Star 3) PAN
Which mechanism is used to elect a root bridge in the network?
BPDU
What is the logical topology of a network wired with multilayer switches?
Bus
A consultant is setting up a SOHO for a customer. The customer has requested a DOCSIS Internet connection. What type of service connection should the consultant configure?
Cable
A computer hosts three virtual machines that are used as virtual servers and an internal virtual switch. The Technical Services department needs to configure the virtual servers to give them access to a physical server deployed on the company LAN but not directly expose the servers to the physical network. What should they do?
Configure a virtual firewall on the host.
A company has a Dynamic Host Configuration Protocol (DHCP) server with all of the subnet addresses specified as an IP address scope. The company deploys a new physical server as a database server in the 192.168.4.0/24 subnet. Applications that use the database server require the server to always have the same IP address. Company policy forbids the use of static addressing. What should the company do to set addressing for the database server?
Configure an IP address reservation
The support team has been tasked with creating an alias name for a newly deployed server. What should the team do? To answer, complete the statement by choosing the correct answers from the drop-down menus.
Connect to: DNS server Configure: CNAME record
Match network protocols and services to the OSI model layer in which they are implemented. To answer, drag the appropriate OSI layer to each protocol or service. An OSI layer may be used once, more than once, or not at all.
DHCP: Application SMTP: Application ICMP: Network TCP: Transport DNS: Application FTP: Application
A company's network is shown in the exhibit. The DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses from the DHCP server. Clients in the 192.168.2.0 subnet are able to lease addresses. What should the company do?
Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets.
Compare characteristics of NAS and SAN storage technologies. To answer, choose the approriate storage type from the drop-down menus.
Emulates directly attached storage for servers accessing storage : SAN Maintains its own file system, and data access is through remote file system I/O: NAS Structured as a dedicated network consisting of multiple storage devices: SAN Preferred solution when extreme high-speed data transfer is required: SAN
A technician configures an access point as shown in the exhibit. He creates a list of MAC addresses to allow on the network using MAC filtering. The technician realizes that despite this configuration, any device can still connect. What should the technician do?
Enable Mac filtering globally.
A company has its own comms rooms and an on-premises data center containing all its servers and network devices. A network engineer wants to add some cloud on-demand solutions to the existing infrastructure. Which cloud model should the company use?
Hybrid
Which mechanism monitors and manages virtual machine instances?
Hypervisor
A company deploys a host as shown in the exhibit. The host needs to be configured with a static address. What values should be used to configure the host? To answer, drag the appropriate value to each configuration parameter. A value may be used once, more than once, or not at all.
IP Address: 192.168.4.57 Subnet Mask: 255.255.255.192 Default Gateway: 192.168.4.1
PC1 and PC2 are connected to a managed switcy. PC1 uses port F0/5, which is in VLAN 7, and PC2 uses port F0/11, which is in VLAN 12. What is the minimum required configuration by a technician on PC1 and PC2 to exchange data?
IP address, subnet mask, and default gateway.
A company has configured some services and applications using a PAAS platform. The network team wants to create a secure connection from an onsite router to the new platform. Which of the following would be the BEST protocol to implement?
IPsec
Which network device uses ASICs to handle the packet switching for inter-VLAN communication?
L3 switch
Identify packet-switched and circuit-switched networks. To answer, select the appropriate network type from the drop-down lists next to each network implementation.
PSTN: Circuit-switched Public Internet: Packet-switched Internal IP network: Packet-switched ISDN: Circuit-switched CSD/HSCSD: Circuit-switched
A company is developing a several web application. The company does not have the hardware resources to support the development and does not want to incur the expense of additional hardware. The company wants to use its own development application and data, but it wants hardware, operating system and storage management to be the responsibility of a third-party provider. Which type of service does this describe?
PaaS
A company expands its corporate campus. All new buildings are configured to support wireless LANs. The company wants to use WPA2-Enterprise to ensure wireless security and provide for centralized control of authentication and authorization. What type of network device is needed to provide centralized authentication and authorization?
RADIUS server
A company replaces its video surveillance cameras with PoE IP video cameras. The network is wired with Cat 5e UTP cable. What type of connector is used to connect the cameras to the network?
RJ-45
A network engineer has to order network cables to connect two floors in a new building. The project team has specified the following requirements: * Project the cables from external interference * Offer up to 1000 Mbps * Be compatible with existing UTP pass-through patch panels * Keep the cost to a minimum Which cables should the network engineer order?
RJ45 Cat 6 STP cable
A company opens new warehouse space on its company campus. Network wiring for the warehouse is routed through a 110 punch block and patch panel. Wiring out to devices uses Cat 5e UTP cable. Several devices in the warehouse experience communication problems. After extensive testing, the problem is determined to be crosstalk.
Replace the failing cables the Cat 6 cables.
A company has deployed a new access point. A network administrator wants to monitor proactively the number of connected clients and available resources using a secure protoocol. What layer 7 network protocol should be used?
SNMP
A company needs a leased line connection supporting the transmission speed of 30 Mbps. Which service should h company choose?
T3
A company has deployed a new Microsoft Windows server behind a firewall. A systems administrator has been experiencing problems querying and modifying items in Active Directory from a remote location using an LDAP-based application. Which protocol should be allowed through the firewall?
TCP port 636
A company is setting up a routed network with three subnets. All routers are BOOTP enabled. The company wants to use dynamic IPv4 address assignments for all client computers and manage the process from one central location. What should the company do? To answer complete the statement by choosing the correct answers from the menu.
Type of server to deploy: DHCP Router ports to open: 67 and 68
A company is setting up a routed network with three subnets. All routers are BOOTP enabled. The company wants to use dynamic IPv4 address assignments for all client computers and manage the process from one central location. What should the company do? To answer, complete the statement by choosing the correct answers from the drop-down menus.
Type of server to deploy: DHCP Routers ports to open: 67 and 68
A network team prepares a presentation to members of the board. Match the use cases with the most appropriate network devices. To answer, drag the appropriate device type to each use case.
Utilize a database of URLs to ensure compliance: (Content filter) Authenticate users and log their activity: (AAA server) Provide a means to work from home securely: (VPN concentrator) Offer better traffic allocation and distribution: (Load balancer)
For redundancy purposes, a network engineer installs a new router and enables a load balancing protocol. What type of address should he assign as a default gateway to end devices?
Virtual IP
A network administrator has captured the following messages on the firewall: 10.10.10.10:64391 > 188.12.1.1:80 188.12.1.1:80 > 10.10.10.10:64391 10.10.10.10:64392 > 83.122.1.1:80 Which application has most likely generated that traffic?
Web browser
A service technician tests and confirms a theory for the probable cause of a problem. What should the technician do next?
create a plan of action
A company network is wired with 10/100/1000 multilayer switches and Cat 6 UTP cable. The company wants to implement a SAN using the existing infrastructure. Which connection type should the company use?
iSCSl