comptia studying

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A security administrator is investigating a CAM table flooded by an attacker. In the packet capture, what protocol should the security administrator filter on to look at related traffic? ARP IP TCP HTTP

ARP

A penetration tester wants to perform a half-open scan using nmap. Which parameter should the pen tester use in the command? -sU -sV -sT -sS

-sS

A security technician is analyzing packets on an IPv6 network. Which of the following headers would indicate a multicast packet? (Select all that apply.) 011 1111 1111 ff fe80

1111 1111 and ff

A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following? IXP PSTN CPE IANA

CPE

A network consultant needs to create a documentation process that minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way. What is the name of this process? Wiring Diagram Rack Floor Plan Change Management

Change Management

An organization has secured its website with SSL/TLS (Secure Sockets Layer/Transport Layer Security). By default, what port will this encrypted traffic use? TCP port 80 TCP port 53 TCP port 443 UDP port 53

TCP port 443

A server is using its host key to establish a secure channel for clients to authenticate to the secure shell (SSH) server. Which of the following methods can establish the channel? (Select all that apply.) Username/password Public key authentication Terminal emulation Kerberos

Username/password, Public key authentication, and Kerberos

A security analyst is reviewing UDP traffic headers. Which of the following is NOT a field in a UDP traffic header? Sequence number Flags Window Checksum

Window

A network technician is trying to troubleshoot attenuation and measure accordingly. What unit of measurement expresses attenuation? dB SNR ms Mbps

dB

Which of the following are formats for 2G cellular communications? (Select all that apply.) GPRS/EDGE GSM CDMA HSPA+

GSM and CDMA

A server is running Microsoft SQL Server and is replicating the data to other Microsoft SQL servers on the network. The application service is using which principal port? TCP 1433 TCP 1521 TCP 3306 TCP 5432

TCP 1433

A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description? OSI Network Layer 3 Application layer Infrastructure Layer Control Layer

Application layer

A cable operator is laying out unshielded twisted pair (UTP) cabling in an environment. Which of the following is not a consideration for UTP? Twisted to reduce interference Best used outside Uses solid cabling Measured in AWG

Best used outside

A network technician needs to install a load balancer onto the network as the department has experienced issues with streaming media servers. What switches could the technician use to support this request? (Select all that apply.) Bridge Layer 4 Switch Layer 2 Switch Layer 7 Switch

Bridge and Layer 7 Switch

A network operator is reviewing a network topology where all nodes share the bandwidth of the media. What is this called? Star Client server Bus Ring

Bus

802.11 relies on a shared physical bus running at half-duplex. How does this standard manage contention? CSMA/CA ACK RTS CTS

CSMA/CA

What standards are most wireless LANs based on? 802.11 Wi-Fi 5 MU-MIMO Cellular radio

802.11

A security analyst is looking at traffic directed to 0.0.0.0/8. What is this used for if used correctly? Variety of special purposes Local network address not known DHCP lease Examples

DHCP lease

An administrator is configuring a wireless LAN (WLAN) extended service area. Which of the following will the administrator need to configure the same on each access point? (Select all that apply.) BSSID ESSID BSS Security information

ESSID and Security information

A networking administrator is trying to power off a Cisco switch, but it is not working. The administrator needs to be in which mode to perform this task? Global configuration User Autonegotiate Enable

Enable

A network administrator is setting up router advertisements through Neighbor Discovery protocol on an IPv6 network. Which of the following is NOT one of the main functions? Error messaging Address autoconfiguration Prefix discovery Local address resolution

Error messaging

An organization tasks a network consultant with comparing the costs and requirements for the various types of Carrier Ethernet. The consultant selects a carrier ethernet that uses digital subscriber line (DSL) variants such as single-pair high-speed DSL (SHDSL) and very high-speed DSL (VDSL) to overcome the usual distance limitations of copper Ethernet. What type of carrier ethernet was selected by the consultant? Ethernet over Copper Ethernet over Fiber E-line E-LAN

Ethernet over Copper

A security engineer is analyzing IPv6 packets. Which of the following header fields is for quality of service? Traffic class Payload length Hop limit Flow label

Flow label

ICANN is a non-profit organization that's dedicated to keeping the Internet secure. What does ICANN manage? (Select all that apply.) Country codes Generic TLDs FQDNs DNS

Generic TLDs and DNS

A client's browser has requested a web page. What protocol makes the request? HTTP TCP HTML POST

HTTP

An administrator received an alert regarding suspicious activity on the network. The system is logging the activity and the administrator must determine how to handle the situation. What kind of system most likely sent the alert? IDS IPS Firewall NAC

IDS

While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider's datacenter. Which cloud service model meets the network specialist's and businesses' needs? Infrastructure as a Service Software as a Service Public (or multitenant) Community

Infrastructure as a Service

When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer's physical NIC, a network consultant creates a virtual switch that creates a bridge that is usable only by VMs on the host and the host itself. What switch did the network engineer create? Internal Fibre Channel Private Community

Internal

An administrator is attempting to update a zone record on a name server but is unable to edit it. Why can't the administrator edit the record? It is a single zone namespace It is a single name server It is a secondary name server It is a primary server

It is a secondary name server

A network operator is troubleshooting connectivity issues and suspects the transceiver. What should the network operator perform? Check patch cord termination Loopback tool Change the patch cord Substitute known working hosts

Loopback tool

A network administrator is trying to figure out which switch will be rooted in a spanning tree protocol set up. Which of the following would determine the root? Highest ID BPDU DPs Lowest ID

Lowest ID

A network cabling operator is looking at different fiber optic connector form factors. Which of the following only works for multimode? ST SC MTRJ LC

MTRJ

An organization is converting from landline telephones to VoIP handsets. Some of the current landline locations do not have electrical outlets nearby. What can the organization use to power the replacement handsets in these cases? (Select all that apply.) PoE Batteries LAN port PBX

PoE and Batteries

An administrator is configuring a new network from the ground up. Which servers would the administrator configure as bastion hosts? (Select all that apply.) Proxy servers Active directory servers Web servers File servers

Proxy servers and Web servers

An organization is using video conferencing to conduct meetings between different locations. Which of the following protocols provides information that allows the network stacks to adjust the quality of service parameters? SIP SIP URI RTP RTCP

RTCP

An administrator configured a new mail server. Which record must the administrator update for the server to send mail from the domain? SPF SRV TXT MX

SPF

A security engineer is looking at Transmission Control Protocol (TCP) traffic headers. Which of the following allows the receiver to rebuild the message correctly? Urgent pointer Window Ack number Sequence number

Sequence number

An organization is using Lightweight Directory Access Protocol (LDAP) to update the directory database. The administrator insists that access to the directory is secure. What authentication methods will the administrator disable? (Select all that apply.) SASL Simple bind No authentication LDAPS

Simple bind and No authentication

An administrator has blocked access to port 23 to prevent users from using an unsecure terminal emulation software and protocol. What is the administrator blocking the use of? FTP SSH Telnet TFTP

Telnet

A network manager needs to create a document that shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC). What is the name of this document? Wiring Diagram Rack Floor Plan Change Management

Wiring Diagram

A network consultant considers using a wireless communications protocol mainly used in home automation but believes it could support the organization's mission. What is the name of this protocol? Z-Wave NB-IoT IoT LTE-M

Z-Wave

A Linux systems administrator wants to interface correctly with modern network configuration manager packages. Which of the following would be best to accomplish this? iproute2 net-tools ifconfig ipconfig

iproute2

What tools can a Windows administrator use to troubleshoot DNS issues? (Select all that apply.) nslookup dig hostname --fqdn ipconfig /all

nslookup and ipconfig /all

An administrator needs to access servers using a key pair. What command can the administrator use to create the key pair? ssh-keygen ssh-agent sshd ssh Host

ssh-keygen

A network technician does not have enough ports on a single switch and has to connect multiple switches. What should the technician research for interconnections between switches? MDI-X Uplink port Trunks Crossover cables

Trunks

A network administrator is setting up connection points for multiple devices to connect. Which of the following does NOT require any configuration? Bridge Switch Hub Router

Hub

A network administrator is setting up an Exterior Gateway Protocol (EGP). Which of the following protocols are part of the EGP class? RIP BGP EIGRP OSPF

BGP

A network analyst is looking at traffic from switches to other switches, which determines the shortest path. What is this called? Bus BPDU DPs Lowest ID

BPDU

A security company is working with a new customer and is describing different kinds of attacks they have discovered through research. What form of threat research does this represent? Behavioral threat research Reputational threat intelligence Threat data Threat assessment

Behavioral threat research

An administrator is evaluating the wireless coverage in a conference hall. There are enough access points to provide for 25 clients per access point, but many users are finding the wireless network to be unresponsive and timing out requests. What could be causing this issue? (Select all that apply.) CCI ACI Overcapacity Bandwidth saturation

CCI, ACI, and Bandwidth saturation

A network technician needs a cost-effective solution that can multiplex up to 16 wavelengths on an SFP/SFP+ interface. Which multiplexing technique should the network technician use? CWDM WDM BiDi DWDM

CWDM

A technician who lays cabling is researching how the manufacturer constructed fiber optic cabling. Which of the following reflects signals back into the waveguide as efficiently as possible so that the light signal travels along the waveguide by multiple internal reflections? Riser Core Buffer Cladding

Cladding

A security consultant needs to add a security system to the doors of a secured room. What system will the security consultant install that meets the requirement and protects against tampering? Circuit Closed-Circuit Motion Detector Biometric

Closed-Circuit

A cable operator needs to transition from one cable type to another. Which of the following would best help? MDI Repeater Hub Media converter

Media converter

A penetration tester has performed a quick service with Nmap enumeration and now wants to further enumerate the findings. Which parameter should the pen tester use in the command? -sU -sV -sT -sS

-sV

A network administrator is setting up Virtual Local Area Networks (VLANs) for various segments, such as voice and data. Which of the following is the default VLAN? 1 10 20 100

1

A network operator is testing the amount of loss suffered by all components along a fiber transmission path. What is this called? Attenuation Connectors Loss budget Splices

Loss budget

Which service maps ports and documents the mappings for new webserver connections and then substitutes the private IP address for a public IP address before sending the request to the public Internet? (Select all that apply.) Static NAT Dynamic NAT PAT NAPT

PAT and NAPT

A network engineer decides that the organization needs to purchase a device that "cleans" the power signal, provides protection against spikes, surges, and brownouts, and can integrate with an uninterruptible power supply (UPS). What is the name of this device? MTTF MTBF MTTR PDU

PDU

An organization hired a security firm to hack into its systems in order to determine what type of exploitable weaknesses the organization was vulnerable to. What kind of testing is this? Vulnerability scanning Penetration testing Threat hunting Zero-day

Penetration testing

A systems engineer is looking at running services on the company's Linux hosts and wants to include ports in the listening state in the output. Which netstat switch should the engineer use? -a -u -w -x

-a

A network contractor evaluates a protocol that allows multiple physical routers to serve as a single default gateway for a subnet. What is the name of this protocol? Virtual IP Hot Standby Router Multipathing Diverse Paths

Hot Standby Router

An organization needs to use shared mailboxes for managing customer inquiries. What mailbox access protocol should the clients utilize to retrieve the mail over secured connections? POP3S IMAP IMAPS MAPI

IMAPS

An organization is using IPv4 addresses. Which of the following records will resolve a hostname to the IP address? A AAAA CNAME Alias

A

A network administrator is looking at a network where network utilization approaches maximum capacity, and the CPU utilization of the switches jumps to 80 percent or more. What is this called? Switching loop BPDU Broadcast storm DP

Broadcast storm

Due to an increase in foot traffic from outside groups throughout the building, the organization asks the security office to employ equipment that will allow visual monitoring across the organization. What equipment would best be suited to manage this request? Circuit Cameras Motion Detection Asset Tag

Cameras

While looking for a cloud deployment model for business operations, the network specialist looks for a completely private model owned by the organization. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community

Private

While looking for a cloud deployment model for business operations, the network specialist looks for a model that offers pay-as-you-go financing. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community

Public (or multitenant)

A networking project manager needs switches that can connect together and operate as a group. Which of the following should the project manager use? Managed Modular Stackable Rack-mounted

Stackable

A security architect is looking over network topologies where each endpoint node connects to a central forwarding node. What is this called? Mesh Star Client server Point-to-point

Star

A network technician is setting up IPv6 global addressing. Which of the following is NOT part of an IPv6 unicast address? Starts with 011 Network ID Starts with fe80 Subnet

Starts with fe80

A security professional is working to identify all the ways a threat agent can breach security. What security concept does this represent? Vulnerability Availability Threat Risk

Threat

Wi-Fi 6 uses complex modulation and signal encoding. Why did Wi-Fi 6 reinstate operation in the 2.4 GHz band? To approximate 10G connection speeds To improve the amount of data sent per packet To support IoT To reduce latency

To support IoT

A network architect is researching VLAN IDs (VID) for each frame, to preserve them for the receiving switch to forward them correctly. The network architect should look at which standard? 802.1p 802.1q 802.1x 802.3

802.1q

While looking for a cloud deployment model for business operations, the network specialist looks for a model where several organizations share the costs of either a hosted private or fully private cloud. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community

Community

An administrator is configuring the TCP/IP settings in workstations and wants to use the solution with the least amount of overhead. What setting will the administrator select? UDP TCP IP DHCP

DHCP

A cyber security technician is requested to investigate a matter in which several customers have lodged complaints about computer issues after visiting the company site. Upon closer observation, the technician discovers that an unknown IP address replaced the valid IP address. What type of attack occurred in this incident? On-path attack DNS Poisoning Malware Distributed DoS (DDoS)

DNS Poisoning

An administrator updated an A (address) record, but it took the client computers approximately five minutes to recognize the change. What update can the administrator make on the resource record to allow changes to propagate through the network more quickly? Increase the TTL Decrease the TTL DNS cache on the servers DNS cache on the clients

Decrease the TTL

A cyber consultant is brought into a department to create security procedures and technologies designed to restrict network access at a device level. What are these procedures called? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening

Endpoint security

A help desk operator is trying to identify the vendor for a piece of equipment. What could the help desk operator check to determine the vendor? Last six digits of a MAC address OUI I/G bit of a MAC address FCS

OUI

A network consultant needs to develop a plan that sets out the procedures, tools, methods of communication, and guidelines when mitigating a problem. What is the name of this plan? Security Response Service Legal Agreement Incident Response Plan Disaster Recovery Plan

Incident Response Plan

A company calls a consultant to replace STP cabling and is looking at the varying types. Which of the following is the most difficult to install? S/FTP F/UTP Legacy STP ScTP

Legacy STP

During a routine investigation of the network, the cyber specialist identifies that an on-path attack has compromised the network. What is another name for this type of attack? MitM DDoS VLAN Hopping DNS Poisoning

MitM

A network administrator is determining untagged port logic for a frame addressed to a port in the same VLAN on the same switch. What would happen? Forwarded to trunk No tag is added Tag is stripped The packet is dropped

No tag is added

An organization tasked its network analyst with reviewing the system that monitors the building's locks, intruder alarms, and video surveillance cameras. What is the name of this system? PACS IoT ICS OT

PACS

A solutions architect is designing a cable management solution. Which of the following is the most common? Krone 110 block Patch panel 66 Block

Patch panel

A user has typed www.network.com into a web browser. The domain name server cannot resolve the name, so it is querying other name servers to try to find it. What kind of lookup is the domain name server performing? Iterative Recursive Start of authority Resource record

Recursive

A network engineer is looking at a local area network (LAN) which uses structured cabling and multiple switches and routers to provide connectivity. What type of LAN is this most likely? Residential SOHO Enterprise SME

SME

An administrator needs to perform maintenance on routers and switches and is authenticating to them over TCP port 49. What protocol is the administrator using? TACACS+ RADIUS EAP IEEE 802.1X Port-based NAC

TACACS+

An administrator responsible for implementing network coverage in a historical monument cannot install cabling in many areas of the building. What are some ways the administrator can take advantage of wireless distribution systems (WDS) to help? (Select all that apply.) To create a beacon To create a BSA To create an ESA To create a bridge

To create an ESA and To create a bridge

A company tasks a network technician with installing a VPN router onto one of the company's larger machines capable of aggregating high traffic volumes. What is the name of this router? VPN headend VPN Remote Access VPN Hub and Spoke VPN

VPN headend

A help desk operator is troubleshooting a site that is no longer responsive. Which of the following is the last step the operator should perform? Implement solution Determine cause Establish plan of action Verify functionality

Verify functionality

A security technician is analyzing IPv6 traffic and looking at incomplete addresses. Which of the following is a correct IPv6 address? 2001:db8:abc:def0::1234 2001:db8::abc::def0:1234 2001:db8::abc:def0::1234 2001::db8:abc:def0::1234

2001:db8:abc:def0::1234

A network architect is reviewing the architecture for a large company. Which of the following tiers is NOT part of the traditional three-tiered network hierarchy? Access Distribution Bus Core

Bus

An administrator can ping a server by IP address but cannot ping the server by its name. What are some areas the administrator should check to find out why the name isn't resolving to the IP address? (Select all that apply.) Check the local cache Check for a rogue DHCP server Check the HOSTS file Query DNS

Check the local cache, Check the HOSTS file, and Query DNS

An administrator received a Syslog alert, code 2. What level does this indicate the issue is? Notice Alert Error Critical

Critical

A systems administrator is looking into communications issues on a server. If the destination IPv4 address is on a different IP network or subnet, where will the host send the traffic? CAM SFD MTRJ Default gateway

Default gateway

A network engineer needs to decommission a server and wipe all custom configurations. What routine will the engineer use to wipe the server? Motion Detection Sanitization Asset Tags Factory Reset

Factory Reset

A network technician confirms that the server room has adequate environmental controls to mitigate the loss of availability through mechanical issues with equipment, such as overheating. What service provides environmental control in the room? UPS HVAC MTTR PDU

HVAC

What protocol can an administrator configure in a wireless mesh network (WMN) to allow the stations to perform path discovery and forwarding between peers? MBSS IBSS HWMP BSSID

HWMP

An administrator wants the ability to centrally configure and manage access points (APs). What are some solutions the administrator could use for this? (Select all that apply.) Hardware Software Fat AP Thin AP

Hardware and Software

A helpdesk technician is setting up a new IP configuration for an Ethernet adapter on a client using PowerShell. Which command should the technician use? Set-NetIPAddress New-NetIPAddress netsh interface ip set address "Ethernet" dhcp netsh interface ip set address "Ethernet" static 10.1.0.1 255.255.255.0 10.1.0.254

New-NetIPAddress

An administrator is configuring wireless coverage for a public library. What type of authentication should the administrator implement? Captive portal via HTTP Open authentication WPA3 Enterprise authentication

Open authentication

A Windows administrator needs to perform administrative tasks on servers at a different location and prefers to use a graphical user interface. What is the best tool for the administrator to use? Telnet SSH RDP NTP

RDP

A company tasks its network specialist with configuring a steel shelving system for patch panels, switches and routers, and server devices. What is the name of this system? Wiring Diagram Rack Floor Plan Change Management

Rack

An administrator is configuring a firewall at the Session layer of the OSI model. What kind of firewall is the administrator implementing? Router firewall Stateful inspection firewall Appliance firewall Packet filtering firewall

Stateful inspection firewall

A network administrator is installing Ethernet cabling connectors following the US government standard and not by which is a more popular choice. Which connection standard does the network administrator use? RJ11 T568B TIA 570 T568A

T568A

A network administrator is looking at packet captures from the network and trying to isolate email traffic. Which of the following should the network administrator include? (Select all that apply.) UDP 110 TCP 25 TCP 123 TCP 143

TCP 25 and TCP 143

An organization is designing a new data center. What types of environmental issues should the organization implement sensors for? (Select all that apply.) Temperature Thunderstorms Humidity Flooding

Temperature, Humidity, and Flooding

The IEEE 802.11 standards use two frequency bands. Which of the following statements regarding the frequency bands are true? (Select all that apply.) The 2.4 GHz band is ideal for providing the longest signal range The 5 GHz band is ideal for providing the longest signal range The 2.4 GHz band supports a high number of individual channels The 5 GHz band supports a high number of individual channels

The 2.4 GHz band is ideal for providing the longest signal range and The 5 GHz band supports a high number of individual channels

An organization purchased a new router with built-in firewall features. The administrator configured the new appliance and it worked as expected. However, after 90 days the firewall stopped working. What is the most likely cause? The license trial period ended There weren't enough ports on the device There weren't enough routes allowed in the routing table The routing protocols stopped working

The license trial period ended

An organization is using Dynamic Host Configuration Protocol (DHCP) to centrally manage IP addressing. All clients on the network are receiving IP address autoconfiguration except the clients on a new subnet. What is the most likely reason? The administrator reconfigured the DHCP server The DHCP server is offline There are no IP addresses available The router doesn't support BOOTP forwarding

The router doesn't support BOOTP forwarding

An administrator is configuring a DHCP server. What configurations must the administrator apply to the server? (Select all that apply.) The server must receive a dynamic IP address The administrator must configure the DHCPDISCOVER packet The server must receive a static IP address The administrator must configure a scope

The server must receive a static IP address and the administrator must configure a scope

A file server on the network is receiving synchronized time so that it can communicate properly, however it cannot provide synchronized time for other devices on the network. Why is this? The server supports only NTP The server is a stratum 1 server The server is a stratum 2 server The server supports only SNTP

The server supports only SNTP

An administrator is monitoring the performance metrics for a server and notices that the system memory utilization is very high. What does this indicate? There is a problem with network traffic There is low storage space The storage I/O is too slow The system needs an upgrade

The system needs an upgrade

A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process? One Two Three Four

Two

A network consultant is looking for a device that will serve as a temporary power source in the event of a blackout. What is the name of this device? UPS MTBF MTTR PDU

UPS

A network specialist wants to provision two load balancer appliances so that if one fails, the other can still handle client connections. What type of load balancer distribution method should the network specialist use? Virtual IP Clustering Multipathing Diverse Paths

Virtual IP

An administrator is implementing encryption on the wireless network. What standard should the administrator implement? TKIP WPA WEP WPA2

WPA2

An administrator is testing the signal strength in a concrete building and measures a 12 dB loss between the office where the access point is located and the office next door. What is the cause of the decibel loss? Absorption Refraction Reflection EMI

Absorption

An administrator is uploading configuration files to a web server using an FTP client. The client sent a PORT command to the server that contained the connection port number. Then the server opened the connection using that port number on the client and port 20 on the server. What type of FTP connection is the administrator using? FTP TFTP Active FTP Passive FTP

Active FTP

A wireless administrator is troubleshooting dead zones in a building. Although the administrator used a heat map to determine the optimum position for access points (APs), some areas that should have coverage have very low signal strength which is unusable to clients. What should the administrator check? (Select all that apply.) Throughput Antenna placement Antenna cable attenuation EIRP

Antenna placement, Antenna cable attenuation, and EIRP

Due to concerns of losing or misplacing equipment, the organization asks the network office to track all electrical equipment. What will the office use to track the organization's equipment? Circuit Cameras Asset Tags Motion Detection

Asset Tags

A client is attempting to renew its lease with the DHCP server so that it can keep the same IP addressing information. How much of the lease duration has lapsed? At least 50% At least 87.5% At least 0 At least 255

At least 50%

An organization has ten employees in the finance department that all use the accounting system for different purposes. An administrator is reviewing logs and has discovered that all of the finance employees are using the same login to access the accounting system. Which log was the administrator reviewing? System log Audit log Application log Traffic log

Audit log

Which of the following processes of an identity and access management (IAM) system proves that the user is who they say they are? Identification Authentication Authorization Accounting

Authentication

A security analyst is looking at traffic from older devices between ports 2,000 - 3,000. What is this traffic most likely? Well-known applications Dynamic use Client ports Sockets

Client ports

A network architect is reviewing a network where application services and resources are centrally provisioned, managed, and secured. What is this called? Client server Peer to peer Point to point SOHO

Client server

A network architect analyzes the software-designed networking model and reviews the layer that exposes an application programming interface (API) that can be automated by scripts that call functions in the layer above or below. What is the appropriate layer for this description? OSI Network Layer 3 Spine Leaf Control Layer

Control Layer

A cyber technician needs to draft a policy for the organization to mitigate the risk from route processor vulnerabilities. What is the name of this type of policy? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening

Control plane policing

An administrator is using DHCP and wants to retain centralized management of IP addressing but needs to ensure that specific devices that supply always-on functionality have static IP address assignments. What is the best solution? Configure static assignments on those devices Assign addresses from a specially configured exclusion range Create reservations Configure scopes

Create reservations

An organization has multiple subnets but is only using one DHCP server. How is this possible? (Select all that apply.) Stateless address autoconfiguration Default gateway DHCP relay UDP forwarding

DHCP relay and UDP forwarding

An administrator wants to ensure that nothing intercepts or modifies the communications between clients and the DNS servers. What can the administrator implement to prevent this from happening? (Select all that apply.) DNSSEC DNS over TLS DNS over HTTPS Internal DNS zones

DNS over TLS and DNS over HTTPS

An administrator is managing a network that has become increasingly congested over time. To manage the congestion, the administrator opted to implement a layer 3 bandwidth management solution on switches and wireless access points. What solution did the administrator implement? IEEE 802.1p DiffServ Traffic shaper Expedited forwarding

DiffServ

An organization tasks a network consultant with comparing costs for the business to acquire a technology that allows data to transfer over voice-grade telephone lines. What is this technology? FTTP Enterprise WAN T-Carrier Digital Subscriber Line

Digital Subscriber Line

A cyber security technician responds to a department experiencing degraded network bandwidth, and customers call the department saying they cannot visit the company website. What is likely causing the issue? On-path attack DNS Poisoning Malware Distributed DoS (DDoS)

Distributed DoS (DDoS)

A network engineer installs a new Virtual Private Network (VPN) set up dynamically according to traffic requirements and demand. What is the type of VPN installed? Dynamic Multipoint VPN Remote Access VPN Hub and Spoke VPN VPN headend

Dynamic Multipoint VPN

A network engineer is assigned to locate and acquire a data communications network controlled by a single organization. What is the name for this type of network? WAN T-Carrier Enterprise WAN Digital Subscriber Line

Enterprise WAN

When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer's physical NIC, a network engineer creates a virtual switch that binds to the host's NIC to allow the VM to communicate on the physical network. What switch did the network engineer create? SAN External Virtual NICS Hypervisor

External

A network technician is assigned to find the fastest solution, regarding bandwidth capabilities, closest to Local Area Network (LAN) speeds for an office building. What is the most expensive solution the network technician can consider? WAN FTTP T-Carrier FTTH

FTTP

During work, a network specialist uses an IP tunneling protocol to transfer SCSI data over an IP-based network. iSCSI can be used to link SANs but also is an alternative to which of the following? Virtual NICS Fibre Channel SAN Hypervisor

Fibre Channel

A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.) Hypervisor Fibre Channel iSCSI Fibre Channel over Ethernet

Fibre Channel and Fibre Channel over Ethernet

A network technician needs to strengthen the security of the company network by minimizing the amount of traffic required for the operation of the valid network services, and no additional access to be permitted. What is the technician placing into the network? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening

Firewall access control lists (ACLs)

A Windows user is trying to remote desktop into an application server, Although the user can ping the FQDN, they are unable to establish a connection. What is most likely the cause? The application server is down Firewall blocking TCP port 3389 The application server is on a different VLAN DNS misconfiguration

Firewall blocking TCP port 3389

A network manager is asked to create a document that provides a detailed diagram of the wiring and port locations for the building. What is the name of this document? Wiring Diagram Rack Floor Plan Change Management

Floor Plan

A security analyst wants to reconstruct the packet contents for a Transmission Control Protocol (TCP) session in Wireshark. Which function should the security analyst use? Statistics Conversations Follow TCP Stream Protocol Hierarchy

Follow TCP Stream

A help desk technician is trying to troubleshoot the end of a cable but is uncertain where the other end is. What could the technician use to help find the other end of the cable? Fox and Hound Multimeter Wire map tester Loopback tool

Fox and Hound

A small organization is securing their wireless network with Wi-Fi Protected Access 3 (WPA3) personal. What are some of the issues with this method of authentication? (Select all that apply.) Group authentication No accountability SAE PAKE

Group authentication and No accountability

A wireless administrator is receiving reports that users cannot connect to the wireless network in certain areas of the building. What can the administrator use to locate dead zones? Heat map Site survey DRS Beacon

Heat map

While looking for a cloud deployment model for business operations, the network specialist looks for a model that a third party hosts for the organization's exclusive use. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community

Hosted Private

A network architect creates a site-to-site VPN involving multiple remotes to a headquarters site by using static tunnels configured between the remote sites and the headquarters site. What is the name of this VPN configuration? VPN Remote Access VPN Hub and Spoke VPN VPN headend

Hub and Spoke VPN

An organization tasked its network consultant with reviewing the system that provides workflow and process automation mechanisms. What is the name of this system? PACS IoT ICS OT

ICS

An organization that issues public keys should obtain a digital certificate. What does the digital certificate contain? (Select all that apply.) Information on the certificate's guarantor Information about the subject Public key infrastructure The subject's public key

Information on the certificate's guarantor, Information about the subject, and the subject's public key

A network architect analyzes the software-designed networking model and reviews the layer that handles the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security. What is the appropriate layer for this description? OSI Network Layer 3 Datacenter Infrastructure Layer Leaf

Infrastructure Layer

A network specialist reviews the organization's cellular technology and discovers that the current contract uses a low-power system service but supports higher bandwidth up to 1Mbps. What baseband radio technology service is the organization using for cellular service? PACS NB-IoT IoT LTE-M

LTE-M

While evaluating load balancers, a network engineer needs to acquire a switch that can handle complex logic. Which switch would the engineer use for this requirement? Layer 4 Switch Layer 7 Switch Bridge Layer 2 Switch

Layer 7 Switch

A cyber architect is reviewing the topologies that support the east-west activity for the software-defined networking model. Which topology contains access switches. Spine Leaf Datacenter Control Layer

Leaf

A network engineer deploys a hardware appliance to distribute client requests across server nodes in a farm or pool. What is the name of this appliance? Load Balancer Virtual IP Hot Standby Router Multipathing

Load Balancer

An organization is using the Simple Network Management Protocol (SNMP) for remote management and monitoring of servers and network appliances and must deploy an agent to each device. Where are the statistics relating to the activity of each device kept? OID MIB Get Trap

MIB

A network specialist analyzes the key performance indicators associated with the component reliability regarding the expected lifetime of products. What reliability analysis is the network specialist conducting? MTTF MTBF MTTR PDU

MTBF

A network contractor reviews key performance indicators processes regarding the time taken to correct a fault and restore the system to full operation. What is the name of this process? MTTF MTBF MTTR PDU

MTTR

A cyber security technician speaks with a department that has voiced concern regarding tech issues. The technician discovered that the employee had received an email containing an attachment from an outside party. Curious about what the document contained, the employee clicked on the link. The next day, the employee noticed that some of the software was not working correctly, and some important documents were no longer accessible. What was likely the cause of this issue? On-path attack DNS Poisoning Malware DDoS

Malware

A security consultant needs to add a security system to an office space that triggers an alarm when someone occupies the room. What type of equipment would the security install? Motion Detection Security Camera Circuit Asset Tag

Motion Detection

A network specialist reviews the organization's cellular technology and discovers that the current contract uses a service that provides a low-power version of the Long Term Evolution (LTE) or 4g cellular standard and currently has a limited data rate between 20-100 kbps. What baseband radio technology service is the organization now using for cellular service? PACS NB-IoT IoT LTE-M

NB-IoT

An organization deployed components so that they could use NetFlow to measure network traffic statistics. Which of the deployed components needs a high bandwidth network link and substantial storage capacity? NetFlow exporter NetFlow collector NetFlow analyzer IPFIX

NetFlow collector

A user is attempting to access a government network, but the network will not allow the user's device to connect until the user updates the operating system. What kind of defense mechanism is this? Defense in depth Honeypot Separation of duties Network access control

Network access control

A systems administrator is trying to get a basic inventory of what is on the network. Which of the following is a tool which will allow the administrator to easily scan for IPs? PRTG IPAM DDI ManageEngine

PRTG

Network users are reporting issues with videos constantly buffering. What kinds of issues should the administrator test for? (Select all that apply.) Success/fail type events Packet loss Latency Jitter

Packet loss, Latency, and Jitter

A network technician is troubleshooting the free space between nodes, such as in a microwave radio. Which layer of the OSI model is the technician troubleshooting? Physical Data Link Transport Application

Physical

An organization contacts the cyber security team and requests a feature to provide secure wireless network access. Select the appropriate answers that support this request. (Select all that apply.) Preshared keys (PSKs) Captive Portal Geofencing VLAN

Preshared keys (PSKs), Captive Portal, and Geofencing

A network engineer is configuring a switch to make it only usable to the VM's. The engineer confirms that they cannot use the switch to communicate with the host. What type of switch is the engineer configuring? Internal External Private Hypervisor

Private

An organization has identified that they must be able to continually process customer payments and pay employee salaries to keep the business running even in the event of a service disruption as mission essential functions. What kind of assessment did the organization use to make these determinations? Risk assessment Posture assessment Process assessment Business impact analysis

Process assessment

What concept divides network functionality into the control plane, the data plane, and the management plane to allow fine-grained control over traffic parameters? QoS CoS RED RTT

QoS

A department head contacts a cyber consultant declaring that the team is locked out and cannot conduct any activity. While working on the system, the consultant notices a demand for money, or the department will never get their data back. What is this type of attack called? DRDoS DDoS Trojan Ransomware

Ransomware

A network administrator is looking at a switch where the network is not converged. What does this mean? Regular communications are not taking place Builds MAC address table Discovers topology of network Drops BPDU frames

Regular communications are not taking place

An organization tasks a network engineer with purchasing an access/gateway that extends the local network access over an intermediate public network so a remote computer can join the local network. What access/gateway will the engineer acquire? Site-to-Site VPN Remote Access VPN Hub and Spoke VPN VPN headend

Remote Access VPN

A network technician has set up a link where the cable length exceeds the distance limitation and may not achieve the required speed or be unreliable. What should the network technician use in this case? Media converter Repeater MDI Hub

Repeater

An administrator has plugged in a new security camera, but when accessing the camera's web management interface, the administrator encounters a self-signed certificate error. What should the administrator do? Add an exception for the certificate Have the service owner update the certificate Synchronize the time between the client and server Replace the default certificate

Replace the default certificate

A network technician is studying a network topology where each node wires to its neighbor in a closed loop. What is this called? Star Peer-to-peer Bus Ring

Ring

Which of the following are reasons why a client would unexpectedly disassociate from an access point? (Select all that apply.) Roaming MAC spoofing BYOD Interference

Roaming, MAC spoofing, and Interference

An organization hires a new Marketing department head from outside the company. The new employee is surprised to learn that they cannot assign permissions to the Marketing folders to employees that work in other areas of the company. What kind of access management is the organization using? Least privilege Role-based access Privileged access management Zero trust

Role-based access

An organization is working to secure email traffic. What are some methods the organization could use to do this? (Select all that apply.) SMTP STARTTLS SMTPS MX record

STARTTLS and SMTPS

An administrator is investigating issues with intermittent connection to the wireless network. The administrator verified the access point configurations are correct. What are some other areas the administrator should investigate? (Select all that apply.) Signal strength Cabling Interference Power

Signal strength and Interference

An employee logs into their computer when they arrive at work and, regardless of what network resources they access throughout the day, they do not have to log in to anything else. What type of authentication is this? Windows local sign-in Windows network sign-in Remote sign-in Single sign-on

Single sign-on

A cyber architect is reviewing the topologies that support the east-west activity for the software-defined networking model. Which topology comprises a backbone of top-tier switches? Spine Application layer Datacenter Infrastructure Layer

Spine

A mail administrator configured the DNS server to allow connections on TCP port 53. Why would the administrator make this kind of configuration? The network is using IPv6 The network is using IPv4 The network is using Windows The network is using Linux

The network is using IPv6

A library user connected their tablet to the library's open access point. Which of the following items will NOT secure the open connection and protect the user's communications? Using a VPN Using HTTPS Using a screen protector Enabling SSL/TLS

Using a screen protector

The amount of data traffic both sent and received or calculated as a percentage of the available bandwidth is known as which interface monitoring metric? Resets Speed Utilization Duplex

Utilization

A company tasks a network specialist to purchase an access solution that uses internet access infrastructure and a secure tunnel to connect private communications through the internet. What is this access solution? VPN Remote Access VPN Hub and Spoke VPN VPN headend

VPN

A wireless installer is networking a conference room with 9' ceilings. What is the best type of antenna for wireless devices? Vertical rod Yagi Parabolic/dish or grid Polarization

Vertical rod

An organization is converting from landline telephones to VoIP handsets, but still needs to use fax machines in many of the offices. What can the organization use to allow the fax machines to operate on the new VoIP system? VoIP gateway POTS PBX TDM PBX

VoIP gateway

A network engineer wants to establish data communications over a greater distance than a Local Area Network (LAN). What technology will the network engineer use to gain the desired distance? WAN T-Carrier Enterprise WAN Digital Subscriber Line

WAN

Which of the following remote print protocols allows secure connections to a print device and allows it to advertise service capabilities over the network, provide plug-and-play installation for Windows and iOS devices, and use bidirectional status messaging? Web Services for Devices (WSD)/AirPrint Printer sharing Port 9100 Internet Printing Protocol (IPP)

Web Services for Devices (WSD)/AirPrint

An administrator ran a command and determined that the FQDN of a client is forbes.sales.realty.com. What is the hostname of the client? com sales forbes realty

forbes

A network administrator wants to set up a switch with a voice or auxiliary Virtual Local Area Network (VLAN) to distinguish the PC and VoIP traffic without having to set up a trunk port. Which of the following commands should the administrator perform first? interface GigabitEthernet0/0 switchport mode access switchport access vlan 100 switchport voice vlan 101

interface GigabitEthernet0/0

A helpdesk operator is troubleshooting issues on a Windows client and wants to try to flush their dynamic IP address so that they can pull another one. Which command will help the helpdesk operator do this? ipconfig /flushdns ipconfig /all ipconfig /release ipconfig /renew

ipconfig /release

A cyber consultant needs to modify the company's access control lists to minimize network traffic. During configuration, the consultant can use a command-line utility provided by many Linux distributions that allow administrators to edit the rules enforced by the Linux kernel firewall. What is the command-line utility used? iptables ipconfig nmap tcpdump

iptables

A network administrator needs to break up a subnet into subnet masks containing 64 addresses. Which of the following subnet masks should the administrator use? 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.128

255.255.255.192

A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal? A 0 FF 10

A

A systems administrator is trying to troubleshoot frames moving over the network medium and wants to set up the most optimal solution. Which of the following should the sysadmin use? SPAN port Active tap Passive tap I/G

Active tap

A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? Addressing Encapsulation Network layer Presentation

Addressing and Encapsulation

A network technician is looking at prevention mechanisms for routing loops. Which of the following is NOT a mechanism for distance vector protocols? Maximum hop count Convergence Holddown timer Split horizon

Convergence

A project manager is preparing a team to set up cabling infrastructure in a new building. Which of the following tools should they order to be able to create patch cords? Block tool Crimper Punchdown tool Cable strippers

Crimper

A project manager is visiting a new building and connects to the network. The manager performs all connectivity tests by IP address but cannot ping by host name. What is most likely the problem? UPS issues DHCP DNS Duplicate MACs

DNS

A network technician is looking at the route configurations for the organization's environment. What is it called when the IP network or subnet for each active router interface gets automatically added to the routing table? Static route Directly connected routes Default route Local route

Directly connected routes

A helpdesk technician is trying to troubleshoot a client who is having issues with its network adapter. What should the technician try first? Driver Overheating Check fans for dust Check for a UPS

Driver

A security researcher is looking at traffic directed to 192.0.2.128. What is this used for if used correctly? Variety of special purposes Local network address not known DHCP lease Examples

Examples

A network architect is comparing RIP vs. EIGRP. What is a key difference between the two? Simple vs complex One is IGP and the other EGP Full vs incremental routing updates Only one is distance vector

Full vs incremental routing updates

A project manager is ordering equipment to set up fiber cabling in a new building. Which of the following tools will allow a more permanent join with lower insertion loss? Crimper Punchdown tool Block tool Fusion splicer

Fusion splicer

A systems administrator is setting up servers with standard network interface cards (NICs). Which of the following do most standard NICs support? (Select all that apply.) Gigabit Ethernet Fast Ethernet 10 GbE 40 GbE

Gigabit Ethernet and Fast Ethernet

A systems administrator attempts to allow one host on the Internet to send content to other hosts that have identified themselves as interested in receiving the originating host's content. What should the administrator use to accomplish this? Multicast Anycast Broadcast Unicast

Multicast

A network technician is trying to diagnose a network where something is consuming a lot of bandwidth and slowing down the network. Which of the following would point to this? IGMP snooping Multicast transmissions Host resolution issues Duplicate IPs

Multicast transmissions

A network architect is assessing network performance. Which of the following is part of the CSMA/CD protocol to identify collisions early? (Select all that apply.) CRC FCS Preamble SFD

Preamble

An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting? Application Session Data link Presentation

Presentation

A help desk technician is troubleshooting communications between a client and print server. They are trying to perform the step to identify symptoms and duplicate the problem. Which of the following does NOT fall under this step? Question the obvious Physical inspection Check system logs Use a test system

Question the obvious

A security architect is dividing a network into logically distinct zones for security and administrative control. Which of the following should the security architect use? CAMs VLANs Port security Flow control

VLANs

A security analyst is reviewing malicious packets and trying to understand the IPv4 header. What is the first field in an IPv4 header? Header Length Version Protocol Source address

Version

A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet? Zone: privateInternal IP range 192.168.51.0/24Zone: publicExternal IP 203.0.113.1 Zone: publicInternal IP range 149.167.1.0/24Zone: privateExternal IP 20.0.11.1 Zone: privateInternal IP range 182.168.19.0/24Zone: publicExternal IP 188.4.11.1 Zone: publicInternal IP range 192.168.6.0/24Zone: privateExternal IP 212.8.1.9

Zone: private Internal IP range 192.168.51.0/24Zone: publicExternal IP 203.0.113.1

A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to add an entry to the ARP cache? arp -a arp -d arp -g arp -s

arp -s

A network technician wants to upgrade the company's hub to avoid collisions. Which solution would help the technician accomplish this to the fullest extent? Router Switch Bridge Hub

Switch

Which physically-connected component of a SOHO router operates at layer 1 of the OSI model? Wireless Access Point RJ-45 ports WAN port Internal bridge

RJ-45 ports

A network engineer is setting up MTU sizes to follow most Ether products. What is the normal EtherTypes value (in bytes)? 1536 1500 1518 64

1536

A project manager is reviewing which type of cabling to use for an upcoming project. Which of the following is NOT a benefit of using fiber optic cabling? Bandwidth Cost Interference Attenuation

Cost

A new network engineer is deploying an architecture using Carrier Sense Multiple Access with Collision Detection (CSMA/CD). How does the CSMA/CD protocol work? Data, check network, transmit data, collision, retransmit Data, transmit, collision, wait, retransmit Data, check network, transmit data, collision, wait, retransmit Data, check network, transmit data, collision, wait

Data, check network, transmit data, collision, wait, retransmit

A network technician is looking over diagrams for special types of equipment rooms, that mark the point at which external cabling (located outside the plant) joins to internal cabling (located on the premises). What is this called? Backbone Horizontal cabling Telecommunications room Demarc

Demarc

A network technician is troubleshooting a connection from a client and decides to use the bottom to top troubleshooting methodology. Which step would the technician perform first? Determine subsystem Determine if hardware or software related Isolate subsystem variables Test theory

Determine if hardware or software related

A network technician is laying out coax cables and needs to order more termination connectors. What should the technician order? F-type SFP+ DAC QSFP+ DAC RJ-11

F-type

A storage administrator notices that packets from their storage devices are often fragmented. Which of the following would be the cause of this? Flow label Static route MTU Hop count

MTU

A project manager is putting together supplies for a project using fiber optic cabling. The manager is looking at the cabling core ferrule, which has the tightest connection and best return loss performance. Which of the following should the project manager use? APC UPC PC LC

APC

A network technician wants to upgrade the company's hub to isolate collision domains from each other. Which solution would help the technician to accomplish this but NOT create separate broadcast domains on each port? Bridge Switch Router Hub

Bridge

A network administrator wants to send to multiple address hosts at the same time. Which of the following would accomplish this task? (Select all that apply.) Broadcast ff:ff:ff:ff:ff:ff Unicast 255.255.240.0

Broadcast and ff:ff:ff:ff:ff:ff

A network architect is planning a new setup for a new company that has yet to build buildings. Which of the following would the architect set up for a /16 network? Multicast Class A Class B Class C

Class B

A network technician is setting up a connection between switches, but is not establishing a connection. Which of the following would be the most likely cause for it not to work? Dual MDI-X ports Uplink port Crossover cables Autonegotiation

Dual MDI-X ports

A help desk operator is troubleshooting a site that is no longer responsive. Which of the following is the first step the operator should perform? Determine cause Establish plan of action Document findings Establish a theory of probable cause

Establish a theory of probable cause

A help desk technician is helping to troubleshoot connectivity issues. Users report that they are receiving a blinking amber light. This is indicative of what type of issue? Port disabled Disconnect at other end Fault detected Connected but no traffic

Fault detected

A helpdesk operator is troubleshooting communications between devices in the same location, but one is having issues communicating with the others. Which of the following will have issues? Host A: IP: 192.168.1.10, Mask: 255.255.255.0 Host B: IP: 192.168.1.11, Mask: 255.255.255.0 Host C: IP: 192.168.1.21, Mask: 255.255.0.0 Host D: IP: 192.168.0.10, Mask: 255.255.255.0

Host D: IP: 192.168.0.10, Mask: 255.255.255.0

A network technician is looking at various protocols which support subnetting and supernetting. Which of the following protocols does NOT support subnetting and supernetting? RIPv2 EIGRP OSPF IGRP

IGRP

A solutions architect is determining where to use fiber and copper cabling to efficiently and cost-effectively deploy an infrastructure. Which of the following would most likely best suit using the copper cabling? Video editing workstations IOT SANs Replacing Metro Ethernet

IOT

A systems administrator needs to combine multiple 1 Gbps connections to be able to support 2 Gbps connections. What should the administrator set up? CAM table NIC teaming Port security configuration Auto-MDI/MDIX

NIC teaming

A network technician is attempting to prevent poorly addressed packets from permanently circulating the network. Which of the following will decrement when it passes through switches? Neither hop count or TTL Hop count TTL Flow label

Neither hop count or TTL

A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting? Data link Transport Network Session

Network

A network architect is researching distance vector protocols for use in the environment. Which of the following should the architect look into? (Select all that apply.) RIP OSPF BGP EIGRP

RIP and EIGRP

A systems manager is preplanning for the event that critical servers will fail. Which of the following would be the most likely plan of action? Repair Ignore Replace Destroy

Replace

A network administrator is setting up cabling between buildings and needs to transmit the maximum distance possible. Which type of cabling would be most suitable? MMF SMF Twisted pair Coaxial

SMF

A systems administrator is looking at technology in the organization's environment and finds Fast Link Pulse. What does this technology do? Does not support autonegotiation Supports up to 10 Mbps Typically deployed on new networks Sends link integrity test signals

Sends link integrity test signals

A network administrator is troubleshooting the whole path between two Windows nodes with a view to isolating the node or link that is causing the problem. Which command should they use? route traceroute tracert ip route show

tracert

A client is trying to connect to a network. The client can get an IP address but does not have internet access and decides to see if they are issued an APIPA address. Which of the following would fall under the APIPA range? 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 169.254.0.0 through 169.254.255.255

169.254.0.0 through 169.254.255.255

A network administrator is working for a large company on a subnet that requires an 8 bit mask. Which of the following would that be? 255.255.0.0 255.255.255.0 255.255.255.255. 255.0.0.0.

255.0.0.0.

A security technician is looking at binary and trying to convert it to an IP address. The first field is 00110011. What does this translate to in decimal? 198 100 51 1

51

A network technician is researching standards for the physical and data link layer. Which standard, developed to implement the functions of the physical and data link layers of the OSI model, is the most important? 802.3 802.1D 802.11 802.1X

802.3

A security engineer is looking at IPv6 packets and observes packets for a default route. Which of the following represent a default route? Starts with 011 Starts with 1111 1111 ::/0 Starts with fe80

::/0

A network technician is looking at the interfaces on an edge router. The technician comes across a customer's router. What is this side of the interface called? CE PE SOHO WAN

CE

A network architect is looking at the topology and metrics used to build and update a routing information base. Most routing information bases get classified as which of the following? (Select all that apply.) Convergence Prefix discovery Distance vector Link state

Distance vector and Link state

A consultant is visiting a new project and forgot to take the manual configurations off the computer from the last project. The client receives issues due to a disabled IP. What does the client most likely have? Duplicate MACs Duplicate IPs Incorrect subnet mask Interface status issues

Duplicate IPs

A server administrator needs to allow a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What should the server administrator set up? Jumbo frames Port mirroring Flow control Port aggregation

Flow control

A helpdesk technician is reviewing the network layout in various areas. What is the purpose of subnetting? Layer 2 tracking Layer 3 segments Port security Flow control

Layer 3 segments

A security engineer implements port security on a hardware firewall. Which OSI model layer identifies the application ports to configure? Layer 1 Layer 2 Layer 3 Layer 4

Layer 4

A helpdesk operator is troubleshooting communication issues for devices in different broadcast domains. What do the devices need to pass through to talk to each other? Switch Hub Router Modem

Router

A network operator is trying to troubleshoot kinks and imperfections in cabling that could affect performance. What should the network operator use to test the cabling? dB SNR ms TDR

TDR

A network technician is setting up Cat 7 cabling in the organization's environment. The technician can terminate the cabling with what type of connector? (Select all that apply.) RJ45 TERA GG45 Horizontal connectors

TERA and GG45

A network administrator is looking through routing tables to troubleshoot issues. Which of the following is NOT an entry in the routing table? Destination Interface Gateway Traffic class

Traffic class

A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken? Network Transport Session Application

Transport

A company is upgrading its current network infrastructure to Gigabit Ethernet. Which of the following about Gigabit Internet is true? (Select all that apply.) Works over Cat 5e+ Max distance of 100 m for UTP cabling between node/switch port or between two ports Supports rates up to 1000 Mbps Specified as 100BASE-T

Works over Cat 5e+, Max distance of 100 m for UTP cabling between node/switch port or between two ports, Supports rates up to 1000 Mbps

A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to flush the ARP cache? arp -a arp -d arp -g arp -s

arp -d

A Windows server administrator wants to view the routing table of end systems. Which command should the administrator use? ip route show route add 192.168.3.0 mask 255.255.255.0 192.168.5.1 metric 2 ip route w.x.y.z route print

route print


Kaugnay na mga set ng pag-aaral

Chapter 2: Research in Psychology (55-108)

View Set

Primerica chapter 1 practice exam

View Set

Exam 2, Part 2: Fixed Prosthodontics, RPD & Digital Dentistry

View Set

Developmental Dysplasia of the Hip (DDH) Practice Questions

View Set