comptia studying
A security administrator is investigating a CAM table flooded by an attacker. In the packet capture, what protocol should the security administrator filter on to look at related traffic? ARP IP TCP HTTP
ARP
A penetration tester wants to perform a half-open scan using nmap. Which parameter should the pen tester use in the command? -sU -sV -sT -sS
-sS
A security technician is analyzing packets on an IPv6 network. Which of the following headers would indicate a multicast packet? (Select all that apply.) 011 1111 1111 ff fe80
1111 1111 and ff
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following? IXP PSTN CPE IANA
CPE
A network consultant needs to create a documentation process that minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way. What is the name of this process? Wiring Diagram Rack Floor Plan Change Management
Change Management
An organization has secured its website with SSL/TLS (Secure Sockets Layer/Transport Layer Security). By default, what port will this encrypted traffic use? TCP port 80 TCP port 53 TCP port 443 UDP port 53
TCP port 443
A server is using its host key to establish a secure channel for clients to authenticate to the secure shell (SSH) server. Which of the following methods can establish the channel? (Select all that apply.) Username/password Public key authentication Terminal emulation Kerberos
Username/password, Public key authentication, and Kerberos
A security analyst is reviewing UDP traffic headers. Which of the following is NOT a field in a UDP traffic header? Sequence number Flags Window Checksum
Window
A network technician is trying to troubleshoot attenuation and measure accordingly. What unit of measurement expresses attenuation? dB SNR ms Mbps
dB
Which of the following are formats for 2G cellular communications? (Select all that apply.) GPRS/EDGE GSM CDMA HSPA+
GSM and CDMA
A server is running Microsoft SQL Server and is replicating the data to other Microsoft SQL servers on the network. The application service is using which principal port? TCP 1433 TCP 1521 TCP 3306 TCP 5432
TCP 1433
A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description? OSI Network Layer 3 Application layer Infrastructure Layer Control Layer
Application layer
A cable operator is laying out unshielded twisted pair (UTP) cabling in an environment. Which of the following is not a consideration for UTP? Twisted to reduce interference Best used outside Uses solid cabling Measured in AWG
Best used outside
A network technician needs to install a load balancer onto the network as the department has experienced issues with streaming media servers. What switches could the technician use to support this request? (Select all that apply.) Bridge Layer 4 Switch Layer 2 Switch Layer 7 Switch
Bridge and Layer 7 Switch
A network operator is reviewing a network topology where all nodes share the bandwidth of the media. What is this called? Star Client server Bus Ring
Bus
802.11 relies on a shared physical bus running at half-duplex. How does this standard manage contention? CSMA/CA ACK RTS CTS
CSMA/CA
What standards are most wireless LANs based on? 802.11 Wi-Fi 5 MU-MIMO Cellular radio
802.11
A security analyst is looking at traffic directed to 0.0.0.0/8. What is this used for if used correctly? Variety of special purposes Local network address not known DHCP lease Examples
DHCP lease
An administrator is configuring a wireless LAN (WLAN) extended service area. Which of the following will the administrator need to configure the same on each access point? (Select all that apply.) BSSID ESSID BSS Security information
ESSID and Security information
A networking administrator is trying to power off a Cisco switch, but it is not working. The administrator needs to be in which mode to perform this task? Global configuration User Autonegotiate Enable
Enable
A network administrator is setting up router advertisements through Neighbor Discovery protocol on an IPv6 network. Which of the following is NOT one of the main functions? Error messaging Address autoconfiguration Prefix discovery Local address resolution
Error messaging
An organization tasks a network consultant with comparing the costs and requirements for the various types of Carrier Ethernet. The consultant selects a carrier ethernet that uses digital subscriber line (DSL) variants such as single-pair high-speed DSL (SHDSL) and very high-speed DSL (VDSL) to overcome the usual distance limitations of copper Ethernet. What type of carrier ethernet was selected by the consultant? Ethernet over Copper Ethernet over Fiber E-line E-LAN
Ethernet over Copper
A security engineer is analyzing IPv6 packets. Which of the following header fields is for quality of service? Traffic class Payload length Hop limit Flow label
Flow label
ICANN is a non-profit organization that's dedicated to keeping the Internet secure. What does ICANN manage? (Select all that apply.) Country codes Generic TLDs FQDNs DNS
Generic TLDs and DNS
A client's browser has requested a web page. What protocol makes the request? HTTP TCP HTML POST
HTTP
An administrator received an alert regarding suspicious activity on the network. The system is logging the activity and the administrator must determine how to handle the situation. What kind of system most likely sent the alert? IDS IPS Firewall NAC
IDS
While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider's datacenter. Which cloud service model meets the network specialist's and businesses' needs? Infrastructure as a Service Software as a Service Public (or multitenant) Community
Infrastructure as a Service
When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer's physical NIC, a network consultant creates a virtual switch that creates a bridge that is usable only by VMs on the host and the host itself. What switch did the network engineer create? Internal Fibre Channel Private Community
Internal
An administrator is attempting to update a zone record on a name server but is unable to edit it. Why can't the administrator edit the record? It is a single zone namespace It is a single name server It is a secondary name server It is a primary server
It is a secondary name server
A network operator is troubleshooting connectivity issues and suspects the transceiver. What should the network operator perform? Check patch cord termination Loopback tool Change the patch cord Substitute known working hosts
Loopback tool
A network administrator is trying to figure out which switch will be rooted in a spanning tree protocol set up. Which of the following would determine the root? Highest ID BPDU DPs Lowest ID
Lowest ID
A network cabling operator is looking at different fiber optic connector form factors. Which of the following only works for multimode? ST SC MTRJ LC
MTRJ
An organization is converting from landline telephones to VoIP handsets. Some of the current landline locations do not have electrical outlets nearby. What can the organization use to power the replacement handsets in these cases? (Select all that apply.) PoE Batteries LAN port PBX
PoE and Batteries
An administrator is configuring a new network from the ground up. Which servers would the administrator configure as bastion hosts? (Select all that apply.) Proxy servers Active directory servers Web servers File servers
Proxy servers and Web servers
An organization is using video conferencing to conduct meetings between different locations. Which of the following protocols provides information that allows the network stacks to adjust the quality of service parameters? SIP SIP URI RTP RTCP
RTCP
An administrator configured a new mail server. Which record must the administrator update for the server to send mail from the domain? SPF SRV TXT MX
SPF
A security engineer is looking at Transmission Control Protocol (TCP) traffic headers. Which of the following allows the receiver to rebuild the message correctly? Urgent pointer Window Ack number Sequence number
Sequence number
An organization is using Lightweight Directory Access Protocol (LDAP) to update the directory database. The administrator insists that access to the directory is secure. What authentication methods will the administrator disable? (Select all that apply.) SASL Simple bind No authentication LDAPS
Simple bind and No authentication
An administrator has blocked access to port 23 to prevent users from using an unsecure terminal emulation software and protocol. What is the administrator blocking the use of? FTP SSH Telnet TFTP
Telnet
A network manager needs to create a document that shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC). What is the name of this document? Wiring Diagram Rack Floor Plan Change Management
Wiring Diagram
A network consultant considers using a wireless communications protocol mainly used in home automation but believes it could support the organization's mission. What is the name of this protocol? Z-Wave NB-IoT IoT LTE-M
Z-Wave
A Linux systems administrator wants to interface correctly with modern network configuration manager packages. Which of the following would be best to accomplish this? iproute2 net-tools ifconfig ipconfig
iproute2
What tools can a Windows administrator use to troubleshoot DNS issues? (Select all that apply.) nslookup dig hostname --fqdn ipconfig /all
nslookup and ipconfig /all
An administrator needs to access servers using a key pair. What command can the administrator use to create the key pair? ssh-keygen ssh-agent sshd ssh Host
ssh-keygen
A network technician does not have enough ports on a single switch and has to connect multiple switches. What should the technician research for interconnections between switches? MDI-X Uplink port Trunks Crossover cables
Trunks
A network administrator is setting up connection points for multiple devices to connect. Which of the following does NOT require any configuration? Bridge Switch Hub Router
Hub
A network administrator is setting up an Exterior Gateway Protocol (EGP). Which of the following protocols are part of the EGP class? RIP BGP EIGRP OSPF
BGP
A network analyst is looking at traffic from switches to other switches, which determines the shortest path. What is this called? Bus BPDU DPs Lowest ID
BPDU
A security company is working with a new customer and is describing different kinds of attacks they have discovered through research. What form of threat research does this represent? Behavioral threat research Reputational threat intelligence Threat data Threat assessment
Behavioral threat research
An administrator is evaluating the wireless coverage in a conference hall. There are enough access points to provide for 25 clients per access point, but many users are finding the wireless network to be unresponsive and timing out requests. What could be causing this issue? (Select all that apply.) CCI ACI Overcapacity Bandwidth saturation
CCI, ACI, and Bandwidth saturation
A network technician needs a cost-effective solution that can multiplex up to 16 wavelengths on an SFP/SFP+ interface. Which multiplexing technique should the network technician use? CWDM WDM BiDi DWDM
CWDM
A technician who lays cabling is researching how the manufacturer constructed fiber optic cabling. Which of the following reflects signals back into the waveguide as efficiently as possible so that the light signal travels along the waveguide by multiple internal reflections? Riser Core Buffer Cladding
Cladding
A security consultant needs to add a security system to the doors of a secured room. What system will the security consultant install that meets the requirement and protects against tampering? Circuit Closed-Circuit Motion Detector Biometric
Closed-Circuit
A cable operator needs to transition from one cable type to another. Which of the following would best help? MDI Repeater Hub Media converter
Media converter
A penetration tester has performed a quick service with Nmap enumeration and now wants to further enumerate the findings. Which parameter should the pen tester use in the command? -sU -sV -sT -sS
-sV
A network administrator is setting up Virtual Local Area Networks (VLANs) for various segments, such as voice and data. Which of the following is the default VLAN? 1 10 20 100
1
A network operator is testing the amount of loss suffered by all components along a fiber transmission path. What is this called? Attenuation Connectors Loss budget Splices
Loss budget
Which service maps ports and documents the mappings for new webserver connections and then substitutes the private IP address for a public IP address before sending the request to the public Internet? (Select all that apply.) Static NAT Dynamic NAT PAT NAPT
PAT and NAPT
A network engineer decides that the organization needs to purchase a device that "cleans" the power signal, provides protection against spikes, surges, and brownouts, and can integrate with an uninterruptible power supply (UPS). What is the name of this device? MTTF MTBF MTTR PDU
PDU
An organization hired a security firm to hack into its systems in order to determine what type of exploitable weaknesses the organization was vulnerable to. What kind of testing is this? Vulnerability scanning Penetration testing Threat hunting Zero-day
Penetration testing
A systems engineer is looking at running services on the company's Linux hosts and wants to include ports in the listening state in the output. Which netstat switch should the engineer use? -a -u -w -x
-a
A network contractor evaluates a protocol that allows multiple physical routers to serve as a single default gateway for a subnet. What is the name of this protocol? Virtual IP Hot Standby Router Multipathing Diverse Paths
Hot Standby Router
An organization needs to use shared mailboxes for managing customer inquiries. What mailbox access protocol should the clients utilize to retrieve the mail over secured connections? POP3S IMAP IMAPS MAPI
IMAPS
An organization is using IPv4 addresses. Which of the following records will resolve a hostname to the IP address? A AAAA CNAME Alias
A
A network administrator is looking at a network where network utilization approaches maximum capacity, and the CPU utilization of the switches jumps to 80 percent or more. What is this called? Switching loop BPDU Broadcast storm DP
Broadcast storm
Due to an increase in foot traffic from outside groups throughout the building, the organization asks the security office to employ equipment that will allow visual monitoring across the organization. What equipment would best be suited to manage this request? Circuit Cameras Motion Detection Asset Tag
Cameras
While looking for a cloud deployment model for business operations, the network specialist looks for a completely private model owned by the organization. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community
Private
While looking for a cloud deployment model for business operations, the network specialist looks for a model that offers pay-as-you-go financing. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community
Public (or multitenant)
A networking project manager needs switches that can connect together and operate as a group. Which of the following should the project manager use? Managed Modular Stackable Rack-mounted
Stackable
A security architect is looking over network topologies where each endpoint node connects to a central forwarding node. What is this called? Mesh Star Client server Point-to-point
Star
A network technician is setting up IPv6 global addressing. Which of the following is NOT part of an IPv6 unicast address? Starts with 011 Network ID Starts with fe80 Subnet
Starts with fe80
A security professional is working to identify all the ways a threat agent can breach security. What security concept does this represent? Vulnerability Availability Threat Risk
Threat
Wi-Fi 6 uses complex modulation and signal encoding. Why did Wi-Fi 6 reinstate operation in the 2.4 GHz band? To approximate 10G connection speeds To improve the amount of data sent per packet To support IoT To reduce latency
To support IoT
A network architect is researching VLAN IDs (VID) for each frame, to preserve them for the receiving switch to forward them correctly. The network architect should look at which standard? 802.1p 802.1q 802.1x 802.3
802.1q
While looking for a cloud deployment model for business operations, the network specialist looks for a model where several organizations share the costs of either a hosted private or fully private cloud. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community
Community
An administrator is configuring the TCP/IP settings in workstations and wants to use the solution with the least amount of overhead. What setting will the administrator select? UDP TCP IP DHCP
DHCP
A cyber security technician is requested to investigate a matter in which several customers have lodged complaints about computer issues after visiting the company site. Upon closer observation, the technician discovers that an unknown IP address replaced the valid IP address. What type of attack occurred in this incident? On-path attack DNS Poisoning Malware Distributed DoS (DDoS)
DNS Poisoning
An administrator updated an A (address) record, but it took the client computers approximately five minutes to recognize the change. What update can the administrator make on the resource record to allow changes to propagate through the network more quickly? Increase the TTL Decrease the TTL DNS cache on the servers DNS cache on the clients
Decrease the TTL
A cyber consultant is brought into a department to create security procedures and technologies designed to restrict network access at a device level. What are these procedures called? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening
Endpoint security
A help desk operator is trying to identify the vendor for a piece of equipment. What could the help desk operator check to determine the vendor? Last six digits of a MAC address OUI I/G bit of a MAC address FCS
OUI
A network consultant needs to develop a plan that sets out the procedures, tools, methods of communication, and guidelines when mitigating a problem. What is the name of this plan? Security Response Service Legal Agreement Incident Response Plan Disaster Recovery Plan
Incident Response Plan
A company calls a consultant to replace STP cabling and is looking at the varying types. Which of the following is the most difficult to install? S/FTP F/UTP Legacy STP ScTP
Legacy STP
During a routine investigation of the network, the cyber specialist identifies that an on-path attack has compromised the network. What is another name for this type of attack? MitM DDoS VLAN Hopping DNS Poisoning
MitM
A network administrator is determining untagged port logic for a frame addressed to a port in the same VLAN on the same switch. What would happen? Forwarded to trunk No tag is added Tag is stripped The packet is dropped
No tag is added
An organization tasked its network analyst with reviewing the system that monitors the building's locks, intruder alarms, and video surveillance cameras. What is the name of this system? PACS IoT ICS OT
PACS
A solutions architect is designing a cable management solution. Which of the following is the most common? Krone 110 block Patch panel 66 Block
Patch panel
A user has typed www.network.com into a web browser. The domain name server cannot resolve the name, so it is querying other name servers to try to find it. What kind of lookup is the domain name server performing? Iterative Recursive Start of authority Resource record
Recursive
A network engineer is looking at a local area network (LAN) which uses structured cabling and multiple switches and routers to provide connectivity. What type of LAN is this most likely? Residential SOHO Enterprise SME
SME
An administrator needs to perform maintenance on routers and switches and is authenticating to them over TCP port 49. What protocol is the administrator using? TACACS+ RADIUS EAP IEEE 802.1X Port-based NAC
TACACS+
An administrator responsible for implementing network coverage in a historical monument cannot install cabling in many areas of the building. What are some ways the administrator can take advantage of wireless distribution systems (WDS) to help? (Select all that apply.) To create a beacon To create a BSA To create an ESA To create a bridge
To create an ESA and To create a bridge
A company tasks a network technician with installing a VPN router onto one of the company's larger machines capable of aggregating high traffic volumes. What is the name of this router? VPN headend VPN Remote Access VPN Hub and Spoke VPN
VPN headend
A help desk operator is troubleshooting a site that is no longer responsive. Which of the following is the last step the operator should perform? Implement solution Determine cause Establish plan of action Verify functionality
Verify functionality
A security technician is analyzing IPv6 traffic and looking at incomplete addresses. Which of the following is a correct IPv6 address? 2001:db8:abc:def0::1234 2001:db8::abc::def0:1234 2001:db8::abc:def0::1234 2001::db8:abc:def0::1234
2001:db8:abc:def0::1234
A network architect is reviewing the architecture for a large company. Which of the following tiers is NOT part of the traditional three-tiered network hierarchy? Access Distribution Bus Core
Bus
An administrator can ping a server by IP address but cannot ping the server by its name. What are some areas the administrator should check to find out why the name isn't resolving to the IP address? (Select all that apply.) Check the local cache Check for a rogue DHCP server Check the HOSTS file Query DNS
Check the local cache, Check the HOSTS file, and Query DNS
An administrator received a Syslog alert, code 2. What level does this indicate the issue is? Notice Alert Error Critical
Critical
A systems administrator is looking into communications issues on a server. If the destination IPv4 address is on a different IP network or subnet, where will the host send the traffic? CAM SFD MTRJ Default gateway
Default gateway
A network engineer needs to decommission a server and wipe all custom configurations. What routine will the engineer use to wipe the server? Motion Detection Sanitization Asset Tags Factory Reset
Factory Reset
A network technician confirms that the server room has adequate environmental controls to mitigate the loss of availability through mechanical issues with equipment, such as overheating. What service provides environmental control in the room? UPS HVAC MTTR PDU
HVAC
What protocol can an administrator configure in a wireless mesh network (WMN) to allow the stations to perform path discovery and forwarding between peers? MBSS IBSS HWMP BSSID
HWMP
An administrator wants the ability to centrally configure and manage access points (APs). What are some solutions the administrator could use for this? (Select all that apply.) Hardware Software Fat AP Thin AP
Hardware and Software
A helpdesk technician is setting up a new IP configuration for an Ethernet adapter on a client using PowerShell. Which command should the technician use? Set-NetIPAddress New-NetIPAddress netsh interface ip set address "Ethernet" dhcp netsh interface ip set address "Ethernet" static 10.1.0.1 255.255.255.0 10.1.0.254
New-NetIPAddress
An administrator is configuring wireless coverage for a public library. What type of authentication should the administrator implement? Captive portal via HTTP Open authentication WPA3 Enterprise authentication
Open authentication
A Windows administrator needs to perform administrative tasks on servers at a different location and prefers to use a graphical user interface. What is the best tool for the administrator to use? Telnet SSH RDP NTP
RDP
A company tasks its network specialist with configuring a steel shelving system for patch panels, switches and routers, and server devices. What is the name of this system? Wiring Diagram Rack Floor Plan Change Management
Rack
An administrator is configuring a firewall at the Session layer of the OSI model. What kind of firewall is the administrator implementing? Router firewall Stateful inspection firewall Appliance firewall Packet filtering firewall
Stateful inspection firewall
A network administrator is installing Ethernet cabling connectors following the US government standard and not by which is a more popular choice. Which connection standard does the network administrator use? RJ11 T568B TIA 570 T568A
T568A
A network administrator is looking at packet captures from the network and trying to isolate email traffic. Which of the following should the network administrator include? (Select all that apply.) UDP 110 TCP 25 TCP 123 TCP 143
TCP 25 and TCP 143
An organization is designing a new data center. What types of environmental issues should the organization implement sensors for? (Select all that apply.) Temperature Thunderstorms Humidity Flooding
Temperature, Humidity, and Flooding
The IEEE 802.11 standards use two frequency bands. Which of the following statements regarding the frequency bands are true? (Select all that apply.) The 2.4 GHz band is ideal for providing the longest signal range The 5 GHz band is ideal for providing the longest signal range The 2.4 GHz band supports a high number of individual channels The 5 GHz band supports a high number of individual channels
The 2.4 GHz band is ideal for providing the longest signal range and The 5 GHz band supports a high number of individual channels
An organization purchased a new router with built-in firewall features. The administrator configured the new appliance and it worked as expected. However, after 90 days the firewall stopped working. What is the most likely cause? The license trial period ended There weren't enough ports on the device There weren't enough routes allowed in the routing table The routing protocols stopped working
The license trial period ended
An organization is using Dynamic Host Configuration Protocol (DHCP) to centrally manage IP addressing. All clients on the network are receiving IP address autoconfiguration except the clients on a new subnet. What is the most likely reason? The administrator reconfigured the DHCP server The DHCP server is offline There are no IP addresses available The router doesn't support BOOTP forwarding
The router doesn't support BOOTP forwarding
An administrator is configuring a DHCP server. What configurations must the administrator apply to the server? (Select all that apply.) The server must receive a dynamic IP address The administrator must configure the DHCPDISCOVER packet The server must receive a static IP address The administrator must configure a scope
The server must receive a static IP address and the administrator must configure a scope
A file server on the network is receiving synchronized time so that it can communicate properly, however it cannot provide synchronized time for other devices on the network. Why is this? The server supports only NTP The server is a stratum 1 server The server is a stratum 2 server The server supports only SNTP
The server supports only SNTP
An administrator is monitoring the performance metrics for a server and notices that the system memory utilization is very high. What does this indicate? There is a problem with network traffic There is low storage space The storage I/O is too slow The system needs an upgrade
The system needs an upgrade
A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process? One Two Three Four
Two
A network consultant is looking for a device that will serve as a temporary power source in the event of a blackout. What is the name of this device? UPS MTBF MTTR PDU
UPS
A network specialist wants to provision two load balancer appliances so that if one fails, the other can still handle client connections. What type of load balancer distribution method should the network specialist use? Virtual IP Clustering Multipathing Diverse Paths
Virtual IP
An administrator is implementing encryption on the wireless network. What standard should the administrator implement? TKIP WPA WEP WPA2
WPA2
An administrator is testing the signal strength in a concrete building and measures a 12 dB loss between the office where the access point is located and the office next door. What is the cause of the decibel loss? Absorption Refraction Reflection EMI
Absorption
An administrator is uploading configuration files to a web server using an FTP client. The client sent a PORT command to the server that contained the connection port number. Then the server opened the connection using that port number on the client and port 20 on the server. What type of FTP connection is the administrator using? FTP TFTP Active FTP Passive FTP
Active FTP
A wireless administrator is troubleshooting dead zones in a building. Although the administrator used a heat map to determine the optimum position for access points (APs), some areas that should have coverage have very low signal strength which is unusable to clients. What should the administrator check? (Select all that apply.) Throughput Antenna placement Antenna cable attenuation EIRP
Antenna placement, Antenna cable attenuation, and EIRP
Due to concerns of losing or misplacing equipment, the organization asks the network office to track all electrical equipment. What will the office use to track the organization's equipment? Circuit Cameras Asset Tags Motion Detection
Asset Tags
A client is attempting to renew its lease with the DHCP server so that it can keep the same IP addressing information. How much of the lease duration has lapsed? At least 50% At least 87.5% At least 0 At least 255
At least 50%
An organization has ten employees in the finance department that all use the accounting system for different purposes. An administrator is reviewing logs and has discovered that all of the finance employees are using the same login to access the accounting system. Which log was the administrator reviewing? System log Audit log Application log Traffic log
Audit log
Which of the following processes of an identity and access management (IAM) system proves that the user is who they say they are? Identification Authentication Authorization Accounting
Authentication
A security analyst is looking at traffic from older devices between ports 2,000 - 3,000. What is this traffic most likely? Well-known applications Dynamic use Client ports Sockets
Client ports
A network architect is reviewing a network where application services and resources are centrally provisioned, managed, and secured. What is this called? Client server Peer to peer Point to point SOHO
Client server
A network architect analyzes the software-designed networking model and reviews the layer that exposes an application programming interface (API) that can be automated by scripts that call functions in the layer above or below. What is the appropriate layer for this description? OSI Network Layer 3 Spine Leaf Control Layer
Control Layer
A cyber technician needs to draft a policy for the organization to mitigate the risk from route processor vulnerabilities. What is the name of this type of policy? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening
Control plane policing
An administrator is using DHCP and wants to retain centralized management of IP addressing but needs to ensure that specific devices that supply always-on functionality have static IP address assignments. What is the best solution? Configure static assignments on those devices Assign addresses from a specially configured exclusion range Create reservations Configure scopes
Create reservations
An organization has multiple subnets but is only using one DHCP server. How is this possible? (Select all that apply.) Stateless address autoconfiguration Default gateway DHCP relay UDP forwarding
DHCP relay and UDP forwarding
An administrator wants to ensure that nothing intercepts or modifies the communications between clients and the DNS servers. What can the administrator implement to prevent this from happening? (Select all that apply.) DNSSEC DNS over TLS DNS over HTTPS Internal DNS zones
DNS over TLS and DNS over HTTPS
An administrator is managing a network that has become increasingly congested over time. To manage the congestion, the administrator opted to implement a layer 3 bandwidth management solution on switches and wireless access points. What solution did the administrator implement? IEEE 802.1p DiffServ Traffic shaper Expedited forwarding
DiffServ
An organization tasks a network consultant with comparing costs for the business to acquire a technology that allows data to transfer over voice-grade telephone lines. What is this technology? FTTP Enterprise WAN T-Carrier Digital Subscriber Line
Digital Subscriber Line
A cyber security technician responds to a department experiencing degraded network bandwidth, and customers call the department saying they cannot visit the company website. What is likely causing the issue? On-path attack DNS Poisoning Malware Distributed DoS (DDoS)
Distributed DoS (DDoS)
A network engineer installs a new Virtual Private Network (VPN) set up dynamically according to traffic requirements and demand. What is the type of VPN installed? Dynamic Multipoint VPN Remote Access VPN Hub and Spoke VPN VPN headend
Dynamic Multipoint VPN
A network engineer is assigned to locate and acquire a data communications network controlled by a single organization. What is the name for this type of network? WAN T-Carrier Enterprise WAN Digital Subscriber Line
Enterprise WAN
When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer's physical NIC, a network engineer creates a virtual switch that binds to the host's NIC to allow the VM to communicate on the physical network. What switch did the network engineer create? SAN External Virtual NICS Hypervisor
External
A network technician is assigned to find the fastest solution, regarding bandwidth capabilities, closest to Local Area Network (LAN) speeds for an office building. What is the most expensive solution the network technician can consider? WAN FTTP T-Carrier FTTH
FTTP
During work, a network specialist uses an IP tunneling protocol to transfer SCSI data over an IP-based network. iSCSI can be used to link SANs but also is an alternative to which of the following? Virtual NICS Fibre Channel SAN Hypervisor
Fibre Channel
A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.) Hypervisor Fibre Channel iSCSI Fibre Channel over Ethernet
Fibre Channel and Fibre Channel over Ethernet
A network technician needs to strengthen the security of the company network by minimizing the amount of traffic required for the operation of the valid network services, and no additional access to be permitted. What is the technician placing into the network? Firewall access control lists (ACLs) Control plane policing Endpoint security Hardening
Firewall access control lists (ACLs)
A Windows user is trying to remote desktop into an application server, Although the user can ping the FQDN, they are unable to establish a connection. What is most likely the cause? The application server is down Firewall blocking TCP port 3389 The application server is on a different VLAN DNS misconfiguration
Firewall blocking TCP port 3389
A network manager is asked to create a document that provides a detailed diagram of the wiring and port locations for the building. What is the name of this document? Wiring Diagram Rack Floor Plan Change Management
Floor Plan
A security analyst wants to reconstruct the packet contents for a Transmission Control Protocol (TCP) session in Wireshark. Which function should the security analyst use? Statistics Conversations Follow TCP Stream Protocol Hierarchy
Follow TCP Stream
A help desk technician is trying to troubleshoot the end of a cable but is uncertain where the other end is. What could the technician use to help find the other end of the cable? Fox and Hound Multimeter Wire map tester Loopback tool
Fox and Hound
A small organization is securing their wireless network with Wi-Fi Protected Access 3 (WPA3) personal. What are some of the issues with this method of authentication? (Select all that apply.) Group authentication No accountability SAE PAKE
Group authentication and No accountability
A wireless administrator is receiving reports that users cannot connect to the wireless network in certain areas of the building. What can the administrator use to locate dead zones? Heat map Site survey DRS Beacon
Heat map
While looking for a cloud deployment model for business operations, the network specialist looks for a model that a third party hosts for the organization's exclusive use. Which cloud deployment model meets the network specialist's and businesses' needs? Public (or multitenant) Hosted Private Private Community
Hosted Private
A network architect creates a site-to-site VPN involving multiple remotes to a headquarters site by using static tunnels configured between the remote sites and the headquarters site. What is the name of this VPN configuration? VPN Remote Access VPN Hub and Spoke VPN VPN headend
Hub and Spoke VPN
An organization tasked its network consultant with reviewing the system that provides workflow and process automation mechanisms. What is the name of this system? PACS IoT ICS OT
ICS
An organization that issues public keys should obtain a digital certificate. What does the digital certificate contain? (Select all that apply.) Information on the certificate's guarantor Information about the subject Public key infrastructure The subject's public key
Information on the certificate's guarantor, Information about the subject, and the subject's public key
A network architect analyzes the software-designed networking model and reviews the layer that handles the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security. What is the appropriate layer for this description? OSI Network Layer 3 Datacenter Infrastructure Layer Leaf
Infrastructure Layer
A network specialist reviews the organization's cellular technology and discovers that the current contract uses a low-power system service but supports higher bandwidth up to 1Mbps. What baseband radio technology service is the organization using for cellular service? PACS NB-IoT IoT LTE-M
LTE-M
While evaluating load balancers, a network engineer needs to acquire a switch that can handle complex logic. Which switch would the engineer use for this requirement? Layer 4 Switch Layer 7 Switch Bridge Layer 2 Switch
Layer 7 Switch
A cyber architect is reviewing the topologies that support the east-west activity for the software-defined networking model. Which topology contains access switches. Spine Leaf Datacenter Control Layer
Leaf
A network engineer deploys a hardware appliance to distribute client requests across server nodes in a farm or pool. What is the name of this appliance? Load Balancer Virtual IP Hot Standby Router Multipathing
Load Balancer
An organization is using the Simple Network Management Protocol (SNMP) for remote management and monitoring of servers and network appliances and must deploy an agent to each device. Where are the statistics relating to the activity of each device kept? OID MIB Get Trap
MIB
A network specialist analyzes the key performance indicators associated with the component reliability regarding the expected lifetime of products. What reliability analysis is the network specialist conducting? MTTF MTBF MTTR PDU
MTBF
A network contractor reviews key performance indicators processes regarding the time taken to correct a fault and restore the system to full operation. What is the name of this process? MTTF MTBF MTTR PDU
MTTR
A cyber security technician speaks with a department that has voiced concern regarding tech issues. The technician discovered that the employee had received an email containing an attachment from an outside party. Curious about what the document contained, the employee clicked on the link. The next day, the employee noticed that some of the software was not working correctly, and some important documents were no longer accessible. What was likely the cause of this issue? On-path attack DNS Poisoning Malware DDoS
Malware
A security consultant needs to add a security system to an office space that triggers an alarm when someone occupies the room. What type of equipment would the security install? Motion Detection Security Camera Circuit Asset Tag
Motion Detection
A network specialist reviews the organization's cellular technology and discovers that the current contract uses a service that provides a low-power version of the Long Term Evolution (LTE) or 4g cellular standard and currently has a limited data rate between 20-100 kbps. What baseband radio technology service is the organization now using for cellular service? PACS NB-IoT IoT LTE-M
NB-IoT
An organization deployed components so that they could use NetFlow to measure network traffic statistics. Which of the deployed components needs a high bandwidth network link and substantial storage capacity? NetFlow exporter NetFlow collector NetFlow analyzer IPFIX
NetFlow collector
A user is attempting to access a government network, but the network will not allow the user's device to connect until the user updates the operating system. What kind of defense mechanism is this? Defense in depth Honeypot Separation of duties Network access control
Network access control
A systems administrator is trying to get a basic inventory of what is on the network. Which of the following is a tool which will allow the administrator to easily scan for IPs? PRTG IPAM DDI ManageEngine
PRTG
Network users are reporting issues with videos constantly buffering. What kinds of issues should the administrator test for? (Select all that apply.) Success/fail type events Packet loss Latency Jitter
Packet loss, Latency, and Jitter
A network technician is troubleshooting the free space between nodes, such as in a microwave radio. Which layer of the OSI model is the technician troubleshooting? Physical Data Link Transport Application
Physical
An organization contacts the cyber security team and requests a feature to provide secure wireless network access. Select the appropriate answers that support this request. (Select all that apply.) Preshared keys (PSKs) Captive Portal Geofencing VLAN
Preshared keys (PSKs), Captive Portal, and Geofencing
A network engineer is configuring a switch to make it only usable to the VM's. The engineer confirms that they cannot use the switch to communicate with the host. What type of switch is the engineer configuring? Internal External Private Hypervisor
Private
An organization has identified that they must be able to continually process customer payments and pay employee salaries to keep the business running even in the event of a service disruption as mission essential functions. What kind of assessment did the organization use to make these determinations? Risk assessment Posture assessment Process assessment Business impact analysis
Process assessment
What concept divides network functionality into the control plane, the data plane, and the management plane to allow fine-grained control over traffic parameters? QoS CoS RED RTT
QoS
A department head contacts a cyber consultant declaring that the team is locked out and cannot conduct any activity. While working on the system, the consultant notices a demand for money, or the department will never get their data back. What is this type of attack called? DRDoS DDoS Trojan Ransomware
Ransomware
A network administrator is looking at a switch where the network is not converged. What does this mean? Regular communications are not taking place Builds MAC address table Discovers topology of network Drops BPDU frames
Regular communications are not taking place
An organization tasks a network engineer with purchasing an access/gateway that extends the local network access over an intermediate public network so a remote computer can join the local network. What access/gateway will the engineer acquire? Site-to-Site VPN Remote Access VPN Hub and Spoke VPN VPN headend
Remote Access VPN
A network technician has set up a link where the cable length exceeds the distance limitation and may not achieve the required speed or be unreliable. What should the network technician use in this case? Media converter Repeater MDI Hub
Repeater
An administrator has plugged in a new security camera, but when accessing the camera's web management interface, the administrator encounters a self-signed certificate error. What should the administrator do? Add an exception for the certificate Have the service owner update the certificate Synchronize the time between the client and server Replace the default certificate
Replace the default certificate
A network technician is studying a network topology where each node wires to its neighbor in a closed loop. What is this called? Star Peer-to-peer Bus Ring
Ring
Which of the following are reasons why a client would unexpectedly disassociate from an access point? (Select all that apply.) Roaming MAC spoofing BYOD Interference
Roaming, MAC spoofing, and Interference
An organization hires a new Marketing department head from outside the company. The new employee is surprised to learn that they cannot assign permissions to the Marketing folders to employees that work in other areas of the company. What kind of access management is the organization using? Least privilege Role-based access Privileged access management Zero trust
Role-based access
An organization is working to secure email traffic. What are some methods the organization could use to do this? (Select all that apply.) SMTP STARTTLS SMTPS MX record
STARTTLS and SMTPS
An administrator is investigating issues with intermittent connection to the wireless network. The administrator verified the access point configurations are correct. What are some other areas the administrator should investigate? (Select all that apply.) Signal strength Cabling Interference Power
Signal strength and Interference
An employee logs into their computer when they arrive at work and, regardless of what network resources they access throughout the day, they do not have to log in to anything else. What type of authentication is this? Windows local sign-in Windows network sign-in Remote sign-in Single sign-on
Single sign-on
A cyber architect is reviewing the topologies that support the east-west activity for the software-defined networking model. Which topology comprises a backbone of top-tier switches? Spine Application layer Datacenter Infrastructure Layer
Spine
A mail administrator configured the DNS server to allow connections on TCP port 53. Why would the administrator make this kind of configuration? The network is using IPv6 The network is using IPv4 The network is using Windows The network is using Linux
The network is using IPv6
A library user connected their tablet to the library's open access point. Which of the following items will NOT secure the open connection and protect the user's communications? Using a VPN Using HTTPS Using a screen protector Enabling SSL/TLS
Using a screen protector
The amount of data traffic both sent and received or calculated as a percentage of the available bandwidth is known as which interface monitoring metric? Resets Speed Utilization Duplex
Utilization
A company tasks a network specialist to purchase an access solution that uses internet access infrastructure and a secure tunnel to connect private communications through the internet. What is this access solution? VPN Remote Access VPN Hub and Spoke VPN VPN headend
VPN
A wireless installer is networking a conference room with 9' ceilings. What is the best type of antenna for wireless devices? Vertical rod Yagi Parabolic/dish or grid Polarization
Vertical rod
An organization is converting from landline telephones to VoIP handsets, but still needs to use fax machines in many of the offices. What can the organization use to allow the fax machines to operate on the new VoIP system? VoIP gateway POTS PBX TDM PBX
VoIP gateway
A network engineer wants to establish data communications over a greater distance than a Local Area Network (LAN). What technology will the network engineer use to gain the desired distance? WAN T-Carrier Enterprise WAN Digital Subscriber Line
WAN
Which of the following remote print protocols allows secure connections to a print device and allows it to advertise service capabilities over the network, provide plug-and-play installation for Windows and iOS devices, and use bidirectional status messaging? Web Services for Devices (WSD)/AirPrint Printer sharing Port 9100 Internet Printing Protocol (IPP)
Web Services for Devices (WSD)/AirPrint
An administrator ran a command and determined that the FQDN of a client is forbes.sales.realty.com. What is the hostname of the client? com sales forbes realty
forbes
A network administrator wants to set up a switch with a voice or auxiliary Virtual Local Area Network (VLAN) to distinguish the PC and VoIP traffic without having to set up a trunk port. Which of the following commands should the administrator perform first? interface GigabitEthernet0/0 switchport mode access switchport access vlan 100 switchport voice vlan 101
interface GigabitEthernet0/0
A helpdesk operator is troubleshooting issues on a Windows client and wants to try to flush their dynamic IP address so that they can pull another one. Which command will help the helpdesk operator do this? ipconfig /flushdns ipconfig /all ipconfig /release ipconfig /renew
ipconfig /release
A cyber consultant needs to modify the company's access control lists to minimize network traffic. During configuration, the consultant can use a command-line utility provided by many Linux distributions that allow administrators to edit the rules enforced by the Linux kernel firewall. What is the command-line utility used? iptables ipconfig nmap tcpdump
iptables
A network administrator needs to break up a subnet into subnet masks containing 64 addresses. Which of the following subnet masks should the administrator use? 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.128
255.255.255.192
A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal? A 0 FF 10
A
A systems administrator is trying to troubleshoot frames moving over the network medium and wants to set up the most optimal solution. Which of the following should the sysadmin use? SPAN port Active tap Passive tap I/G
Active tap
A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? Addressing Encapsulation Network layer Presentation
Addressing and Encapsulation
A network technician is looking at prevention mechanisms for routing loops. Which of the following is NOT a mechanism for distance vector protocols? Maximum hop count Convergence Holddown timer Split horizon
Convergence
A project manager is preparing a team to set up cabling infrastructure in a new building. Which of the following tools should they order to be able to create patch cords? Block tool Crimper Punchdown tool Cable strippers
Crimper
A project manager is visiting a new building and connects to the network. The manager performs all connectivity tests by IP address but cannot ping by host name. What is most likely the problem? UPS issues DHCP DNS Duplicate MACs
DNS
A network technician is looking at the route configurations for the organization's environment. What is it called when the IP network or subnet for each active router interface gets automatically added to the routing table? Static route Directly connected routes Default route Local route
Directly connected routes
A helpdesk technician is trying to troubleshoot a client who is having issues with its network adapter. What should the technician try first? Driver Overheating Check fans for dust Check for a UPS
Driver
A security researcher is looking at traffic directed to 192.0.2.128. What is this used for if used correctly? Variety of special purposes Local network address not known DHCP lease Examples
Examples
A network architect is comparing RIP vs. EIGRP. What is a key difference between the two? Simple vs complex One is IGP and the other EGP Full vs incremental routing updates Only one is distance vector
Full vs incremental routing updates
A project manager is ordering equipment to set up fiber cabling in a new building. Which of the following tools will allow a more permanent join with lower insertion loss? Crimper Punchdown tool Block tool Fusion splicer
Fusion splicer
A systems administrator is setting up servers with standard network interface cards (NICs). Which of the following do most standard NICs support? (Select all that apply.) Gigabit Ethernet Fast Ethernet 10 GbE 40 GbE
Gigabit Ethernet and Fast Ethernet
A systems administrator attempts to allow one host on the Internet to send content to other hosts that have identified themselves as interested in receiving the originating host's content. What should the administrator use to accomplish this? Multicast Anycast Broadcast Unicast
Multicast
A network technician is trying to diagnose a network where something is consuming a lot of bandwidth and slowing down the network. Which of the following would point to this? IGMP snooping Multicast transmissions Host resolution issues Duplicate IPs
Multicast transmissions
A network architect is assessing network performance. Which of the following is part of the CSMA/CD protocol to identify collisions early? (Select all that apply.) CRC FCS Preamble SFD
Preamble
An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting? Application Session Data link Presentation
Presentation
A help desk technician is troubleshooting communications between a client and print server. They are trying to perform the step to identify symptoms and duplicate the problem. Which of the following does NOT fall under this step? Question the obvious Physical inspection Check system logs Use a test system
Question the obvious
A security architect is dividing a network into logically distinct zones for security and administrative control. Which of the following should the security architect use? CAMs VLANs Port security Flow control
VLANs
A security analyst is reviewing malicious packets and trying to understand the IPv4 header. What is the first field in an IPv4 header? Header Length Version Protocol Source address
Version
A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet? Zone: privateInternal IP range 192.168.51.0/24Zone: publicExternal IP 203.0.113.1 Zone: publicInternal IP range 149.167.1.0/24Zone: privateExternal IP 20.0.11.1 Zone: privateInternal IP range 182.168.19.0/24Zone: publicExternal IP 188.4.11.1 Zone: publicInternal IP range 192.168.6.0/24Zone: privateExternal IP 212.8.1.9
Zone: private Internal IP range 192.168.51.0/24Zone: publicExternal IP 203.0.113.1
A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to add an entry to the ARP cache? arp -a arp -d arp -g arp -s
arp -s
A network technician wants to upgrade the company's hub to avoid collisions. Which solution would help the technician accomplish this to the fullest extent? Router Switch Bridge Hub
Switch
Which physically-connected component of a SOHO router operates at layer 1 of the OSI model? Wireless Access Point RJ-45 ports WAN port Internal bridge
RJ-45 ports
A network engineer is setting up MTU sizes to follow most Ether products. What is the normal EtherTypes value (in bytes)? 1536 1500 1518 64
1536
A project manager is reviewing which type of cabling to use for an upcoming project. Which of the following is NOT a benefit of using fiber optic cabling? Bandwidth Cost Interference Attenuation
Cost
A new network engineer is deploying an architecture using Carrier Sense Multiple Access with Collision Detection (CSMA/CD). How does the CSMA/CD protocol work? Data, check network, transmit data, collision, retransmit Data, transmit, collision, wait, retransmit Data, check network, transmit data, collision, wait, retransmit Data, check network, transmit data, collision, wait
Data, check network, transmit data, collision, wait, retransmit
A network technician is looking over diagrams for special types of equipment rooms, that mark the point at which external cabling (located outside the plant) joins to internal cabling (located on the premises). What is this called? Backbone Horizontal cabling Telecommunications room Demarc
Demarc
A network technician is troubleshooting a connection from a client and decides to use the bottom to top troubleshooting methodology. Which step would the technician perform first? Determine subsystem Determine if hardware or software related Isolate subsystem variables Test theory
Determine if hardware or software related
A network technician is laying out coax cables and needs to order more termination connectors. What should the technician order? F-type SFP+ DAC QSFP+ DAC RJ-11
F-type
A storage administrator notices that packets from their storage devices are often fragmented. Which of the following would be the cause of this? Flow label Static route MTU Hop count
MTU
A project manager is putting together supplies for a project using fiber optic cabling. The manager is looking at the cabling core ferrule, which has the tightest connection and best return loss performance. Which of the following should the project manager use? APC UPC PC LC
APC
A network technician wants to upgrade the company's hub to isolate collision domains from each other. Which solution would help the technician to accomplish this but NOT create separate broadcast domains on each port? Bridge Switch Router Hub
Bridge
A network administrator wants to send to multiple address hosts at the same time. Which of the following would accomplish this task? (Select all that apply.) Broadcast ff:ff:ff:ff:ff:ff Unicast 255.255.240.0
Broadcast and ff:ff:ff:ff:ff:ff
A network architect is planning a new setup for a new company that has yet to build buildings. Which of the following would the architect set up for a /16 network? Multicast Class A Class B Class C
Class B
A network technician is setting up a connection between switches, but is not establishing a connection. Which of the following would be the most likely cause for it not to work? Dual MDI-X ports Uplink port Crossover cables Autonegotiation
Dual MDI-X ports
A help desk operator is troubleshooting a site that is no longer responsive. Which of the following is the first step the operator should perform? Determine cause Establish plan of action Document findings Establish a theory of probable cause
Establish a theory of probable cause
A help desk technician is helping to troubleshoot connectivity issues. Users report that they are receiving a blinking amber light. This is indicative of what type of issue? Port disabled Disconnect at other end Fault detected Connected but no traffic
Fault detected
A helpdesk operator is troubleshooting communications between devices in the same location, but one is having issues communicating with the others. Which of the following will have issues? Host A: IP: 192.168.1.10, Mask: 255.255.255.0 Host B: IP: 192.168.1.11, Mask: 255.255.255.0 Host C: IP: 192.168.1.21, Mask: 255.255.0.0 Host D: IP: 192.168.0.10, Mask: 255.255.255.0
Host D: IP: 192.168.0.10, Mask: 255.255.255.0
A network technician is looking at various protocols which support subnetting and supernetting. Which of the following protocols does NOT support subnetting and supernetting? RIPv2 EIGRP OSPF IGRP
IGRP
A solutions architect is determining where to use fiber and copper cabling to efficiently and cost-effectively deploy an infrastructure. Which of the following would most likely best suit using the copper cabling? Video editing workstations IOT SANs Replacing Metro Ethernet
IOT
A systems administrator needs to combine multiple 1 Gbps connections to be able to support 2 Gbps connections. What should the administrator set up? CAM table NIC teaming Port security configuration Auto-MDI/MDIX
NIC teaming
A network technician is attempting to prevent poorly addressed packets from permanently circulating the network. Which of the following will decrement when it passes through switches? Neither hop count or TTL Hop count TTL Flow label
Neither hop count or TTL
A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting? Data link Transport Network Session
Network
A network architect is researching distance vector protocols for use in the environment. Which of the following should the architect look into? (Select all that apply.) RIP OSPF BGP EIGRP
RIP and EIGRP
A systems manager is preplanning for the event that critical servers will fail. Which of the following would be the most likely plan of action? Repair Ignore Replace Destroy
Replace
A network administrator is setting up cabling between buildings and needs to transmit the maximum distance possible. Which type of cabling would be most suitable? MMF SMF Twisted pair Coaxial
SMF
A systems administrator is looking at technology in the organization's environment and finds Fast Link Pulse. What does this technology do? Does not support autonegotiation Supports up to 10 Mbps Typically deployed on new networks Sends link integrity test signals
Sends link integrity test signals
A network administrator is troubleshooting the whole path between two Windows nodes with a view to isolating the node or link that is causing the problem. Which command should they use? route traceroute tracert ip route show
tracert
A client is trying to connect to a network. The client can get an IP address but does not have internet access and decides to see if they are issued an APIPA address. Which of the following would fall under the APIPA range? 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 169.254.0.0 through 169.254.255.255
169.254.0.0 through 169.254.255.255
A network administrator is working for a large company on a subnet that requires an 8 bit mask. Which of the following would that be? 255.255.0.0 255.255.255.0 255.255.255.255. 255.0.0.0.
255.0.0.0.
A security technician is looking at binary and trying to convert it to an IP address. The first field is 00110011. What does this translate to in decimal? 198 100 51 1
51
A network technician is researching standards for the physical and data link layer. Which standard, developed to implement the functions of the physical and data link layers of the OSI model, is the most important? 802.3 802.1D 802.11 802.1X
802.3
A security engineer is looking at IPv6 packets and observes packets for a default route. Which of the following represent a default route? Starts with 011 Starts with 1111 1111 ::/0 Starts with fe80
::/0
A network technician is looking at the interfaces on an edge router. The technician comes across a customer's router. What is this side of the interface called? CE PE SOHO WAN
CE
A network architect is looking at the topology and metrics used to build and update a routing information base. Most routing information bases get classified as which of the following? (Select all that apply.) Convergence Prefix discovery Distance vector Link state
Distance vector and Link state
A consultant is visiting a new project and forgot to take the manual configurations off the computer from the last project. The client receives issues due to a disabled IP. What does the client most likely have? Duplicate MACs Duplicate IPs Incorrect subnet mask Interface status issues
Duplicate IPs
A server administrator needs to allow a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What should the server administrator set up? Jumbo frames Port mirroring Flow control Port aggregation
Flow control
A helpdesk technician is reviewing the network layout in various areas. What is the purpose of subnetting? Layer 2 tracking Layer 3 segments Port security Flow control
Layer 3 segments
A security engineer implements port security on a hardware firewall. Which OSI model layer identifies the application ports to configure? Layer 1 Layer 2 Layer 3 Layer 4
Layer 4
A helpdesk operator is troubleshooting communication issues for devices in different broadcast domains. What do the devices need to pass through to talk to each other? Switch Hub Router Modem
Router
A network operator is trying to troubleshoot kinks and imperfections in cabling that could affect performance. What should the network operator use to test the cabling? dB SNR ms TDR
TDR
A network technician is setting up Cat 7 cabling in the organization's environment. The technician can terminate the cabling with what type of connector? (Select all that apply.) RJ45 TERA GG45 Horizontal connectors
TERA and GG45
A network administrator is looking through routing tables to troubleshoot issues. Which of the following is NOT an entry in the routing table? Destination Interface Gateway Traffic class
Traffic class
A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken? Network Transport Session Application
Transport
A company is upgrading its current network infrastructure to Gigabit Ethernet. Which of the following about Gigabit Internet is true? (Select all that apply.) Works over Cat 5e+ Max distance of 100 m for UTP cabling between node/switch port or between two ports Supports rates up to 1000 Mbps Specified as 100BASE-T
Works over Cat 5e+, Max distance of 100 m for UTP cabling between node/switch port or between two ports, Supports rates up to 1000 Mbps
A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to flush the ARP cache? arp -a arp -d arp -g arp -s
arp -d
A Windows server administrator wants to view the routing table of end systems. Which command should the administrator use? ip route show route add 192.168.3.0 mask 255.255.255.0 192.168.5.1 metric 2 ip route w.x.y.z route print
route print