Comptia Network+ (N10-009) General Questions, Set 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are troubleshooting a cable modem for a home user's network. The connection speeds are much lower than you expected. You suspect the coaxial cable between the wall jack and the cable modem is faulty. Based on your research, a coaxial cable used in data networks should have a resistance of 50 ohms. Which of the following tools should you use to measure the resistance of the coaxial cable? Multimeter Cable tester Cable certifier Spectrum analyzer

Multimeter OBJ 5.5: A multimeter is a measuring instrument that can measure the voltage, resistance, and amperage of a cable or conduit. To test this cable, you should set the multimeter to resistance and connect one of the multimeter's leads to each end of the coaxial cable to determine the resistance as measured in ohms. A cable tester is used to verify the electrical connections in a twisted pair or coaxial cable. A cable certifier is used to test the continuity of a cable and verify that a cable meets its specifications such as the bandwidth, frequency, and length. A spectrum analyzer is used to measure the magnitude of an input signal's frequency. For support or reporting issues, include Question ID: 63fe0fa93b7322449ddc34fc in your ticket. Thank you. Domain 5 - Network Troubleshooting

After a recent breach, the security technician decides to aggregate and analyze its security logs. Which system should be used? SNMP SIEM Syslog Event log

SIEM OBJ 3.2: Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated. SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM). A SIEM can consolidate syslog, SNMP, and event log data into a single repository. For support or reporting issues, include Question ID: 63fe0f433b7322449ddc3006 in your ticket. Thank you. Domain 3 - Network Operations

Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage? RPO MTBF MTTR RTO

RPO Overall explanation OBJ 3.3 - The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan's maximum allowable threshold or tolerance. The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity. The mean time to repair (MTTR) measures the average time it takes to repair a network device when it breaks. The mean time between failures (MTBF) measures the average time between when failures occur on a device. For support or reporting issues, include Question ID: 63fe0f3b3b7322449ddc2fa2 in your ticket. Thank you. Domain 3 - Network Operations

A technician is troubleshooting a workstation connectivity issue. The technician believes a static ARP may be causing the problem. What should the technician do NEXT according to the network troubleshooting methodology? Identify a suitable time to resolve the connectivity issue Document the findings and provide a plan of action Remove the ARP entry on the user's workstation Duplicate the issue in a lab by adding a static ARP entry

Remove the ARP entry on the user's workstation OBJ 5.1: Based on the network troubleshooting methodology, you should try to test your theory to determine the cause once you have established a theory of probable cause. In this scenario, the technician has a theory that the static ARP entry is the cause of the problem. Since this issue has already caused the workstation not to communicate, the best way to test your theory would be to remove the static ARP entry and see if the issue is resolved. If this doesn't fix the issue, you would need to develop a new hypothesis to test. The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, outcomes, and lessons learned. For support or reporting issues, include Question ID: 63fe0f9a3b7322449ddc3446 in your ticket. Thank you. Domain 5 - Network Troubleshooting

An attacker uses the nslookup interactive mode to locate information on a Domain Name Service (DNS). What command should they type to display the DNS records associate with the email servers? request type=email set type=mx set type=email request type=email

set type=mx OBJ 3.4: The "set type=mx" tells nslookup only to query the mx (or mail exchange) records from a DNS server and display them to the screen. There is no "request type=" command within nslookup, so both of those options are incorrect. There is also no email type within DNS, already making that a wrong answer. For support or reporting issues, include Question ID: 63fe0ed03b7322449ddc2a66 in your ticket. Thank you. Domain 3 - Network Operations

Which of the following ethernet standards is used with a multimode fiber optic cable? 10GBase-T 100Base-TX 10GBase-LR 10GBase-SR

10GBase-SR OBJ 1.5: 10GBase-SR is a 10 Gigabit Ethernet LAN standard for use with multimode fiber optic cables using short-wavelength signaling. 100Base-TX and 10GBase-T are ethernet standards that use copper wiring. 10GBase-LR is a standard for 10 Gigabit Ethernet over single-mode fiber optic cabling. For the exam, remember the memory aid, "S is not single," which means that if the naming convention contains Base-S as part of its name then it uses a multimode fiber cable. For support or reporting issues, include Question ID: 63fe0edb3b7322449ddc2af2 in your ticket. Thank you. Domain 1 - Networking Concepts

What is the broadcast address associated with the host located at 189.76.60.164/26? 189.76.60.128 189.76.60.191 189.76.60.192 189.76.60.129

189.76.60.191 OBJ 1.7: In classless subnets using variable length subnet mask (VLSM), the broadcast address is the last IP address associated within an assigned range. In this example, the CIDR notation is /26, so each subnet will contain 64 IP addresses. Since the IP address provided is 189.76.60.164, the broadcast address will be 189.76.60.191. For support or reporting issues, include Question ID: 63fe0ed73b7322449ddc2ac5 in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following levels would a critical condition generate? 2 0 4 6

2 OBJ 3.1 - The severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system's primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications. For support or reporting issues, include Question ID: 63fe0f373b7322449ddc2f75 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Leon is configuring a wireless router in a mid-sized office. He wants to ensure that the network provides a good balance between range and speed for the office devices, which are a mix of older and newer models in an older building. Which frequency band should Leon choose for the wireless router? Band Steering 2.4GHz 6GHz 5GHz

2.4GHz OBJ 2.3 - The 2.4GHz band offers a wider coverage area and better penetration through obstacles, making it suitable for a mix of device ages and ensuring connectivity throughout the office. The 6GHz band, while offering higher speeds and less congestion, requires devices that support Wi-Fi 6E, which may not be compatible with older devices. The 5GHz band provides faster speeds but at the cost of shorter range and less wall penetration compared to 2.4GHz. Band steering is a technology that automatically moves devices between bands based on conditions and is not a frequency band itself. For support or reporting issues, include Question ID: 65f23345400b73a3764791bb in your ticket. Thank you. Domain 2 - Network Implementation

Which of the following ports should be allowed to enable access to certain VoIP applications? 139 3306 110 5060

5060 OBJ 1.4: Session Initiation Protocol (SIP) uses ports 5060 and 5061, and is a signaling protocol for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications. Post Office Protocol version 3 (POP3) uses port 110 and is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. MySQL uses ports 3306 and is an open-source relational database management system that is fully compatible with the structured query language (SQL). For support or reporting issues, include Question ID: 63fe0ee53b7322449ddc2b6e in your ticket. Thank you. Domain 1 - Networking Concepts

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches up to 11 Mbps speeds? 802.11b 802.11ac 802.11a 802.11g 802.11n

802.11b OBJ 1.5: The wireless 802.11b standard supports the use of the 2.4 GHz frequency band and can reach speeds of up to 11 Mbps. Even though 802.11a was a faster standard, the 802.11b standard gained more widespread adoption due to the low cost of manufacturing the radios for use in the 2.4 GHz frequency band. For support or reporting issues, include Question ID: 63fe0efe3b7322449ddc2caf in your ticket. Thank you. Domain 1 - Networking Concepts

Mark is responsible for improving the DNS infrastructure of a large educational institution. His goal is to enhance the resolution process for the various departmental websites hosted under the institution's main domain. This would streamline access to these websites for students and faculty by ensuring their domain names are resolved quickly to the correct IP addresses. Given this objective, which type of DNS zone is most appropriate for Mark to focus on implementing or optimizing? An external zone, specifically designed to manage DNS records for internet-facing services. A stub zone, to hold a copy of the name server records for a parent zone. A forward lookup zone, to associate departmental website names with their IP addresses. A caching-only zone, to temporarily store DNS query results for faster retrieval.

A forward lookup zone, to associate departmental website names with their IP addresses. OBJ 3.4 - A forward lookup zone is most appropriate for Mark to focus on implementing or optimizing, as it is designed to associate domain names (such as those of the departmental websites) with their corresponding IP addresses. This type of zone is crucial for ensuring that DNS queries for the institution's websites are resolved efficiently, facilitating quick and reliable access for users. An external zone could be involved in managing DNS records for internet-facing services, but the scenario specifically focuses on internal domain name resolution for departmental websites, making the forward lookup zone more relevant A caching-only zone does not directly facilitate the association of domain names with IP addresses but rather temporarily stores DNS query results to speed up subsequent queries for the same domains. A stub zone contains only minimal information about the authoritative name servers of a zone, primarily used to streamline DNS query processing. For support or reporting issues, include Question ID: 65f2f5bf2bdae866be263570 in your ticket. Thank you. Domain 3 - Network Operations

Barrie has been tasked with auditing the security of his company's network to ensure no unauthorized services are running on any of the servers. He decides to use nmap to scan a server in his network with the IP address 10.50.30.2. Barrie executes the command 'nmap -p 22,80,443 10.50.30.2' to specifically check the status of potential services that are running. Based on this scenario, what is the expected output of Barrie's command? An error message indicating that nmap cannot scan multiple ports simultaneously. A list showing the status of ports 22, 80, and 443 on the server. The version and revision numbers of the services that are running on ports 22, 80, and 443. A report showing all devices connected to the services along with their MAC addresses.

A list showing the status of ports 22, 80, and 443 on the server. OBJ 5.5 - This particular command would display a list showing the status (open/closed/filtered) of ports 22 (SSH), 80 (HTTP), and 443 (HTTPS) on the server. The command provided by Barrie does not include the -sV option, which is required for version detection. The nmap -p command with specific ports and an IP address scans for the status of the specified ports on a given server, not all devices on the network or their MAC addresses. Nmap can scan multiple ports simultaneously when specified, so it would not return an error for scanning ports 22, 80, and 443 together. For support or reporting issues, include Question ID: 65f2eaf4104edb14e21e9b9d in your ticket. Thank you. Domain 5 - Network Troubleshooting

During routine monitoring, a network administrator notices that a switch port has become error-disabled. What is the most likely cause of this status? A transceiver signal strength mismatch A security violation, such as exceeding the allowed number of MAC addresses A power budget exceeded due to PoE devices A mismatched cable type, such as using STP instead of UTP

A security violation, such as exceeding the allowed number of MAC addresses OBJ 5.2 - A security violation, such as exceeding the allowed number of MAC addresses, is a common reason for a port to transition to an error-disabled state. This occurs as part of a switch's port security features, which are designed to prevent attacks like MAC flooding by disabling the port when the configured limit is surpassed. Exceeding the PoE power budget due to connected devices typically results in those devices failing to power on, but it does not disable the port itself. Using a mismatched cable type, such as STP instead of UTP, can lead to degraded performance or connectivity issues but does not cause a port to enter an error-disabled state. Similarly, a transceiver signal strength mismatch can create problems with link quality or intermittent network disruptions, yet it does not trigger the error-disabled status. These distinctions highlight that a security violation is the most likely cause of this specific port behavior. For support or reporting issues, include Question ID: 65dcca564797dd06872c77dd in your ticket. Thank you. Domain 5 - Network Troubleshooting

Clara is a network administrator troubleshooting a connectivity issue within her network. She suspects that there might be an IP address conflict or an issue with how IP addresses are associated with MAC addresses on the network. To help diagnose the problem further, she opens a terminal and types in the command 'show arp'. What helpful details would she expect to see for output after pressing enter? The routing table with all known routes and their metrics Statistics on packets processed by the network interfaces A list of active TCP connections and their state. A table displaying the IP-to-MAC address mappings on the network

A table displaying the IP-to-MAC address mappings on the network OBJ 5.5 - The 'show arp' command displays the ARP table, which contains the IP-to-MAC address mappings for devices on the network. This is crucial for diagnosing IP address conflicts and ensuring that the network correctly associates IP addresses with the right hardware addresses. Statistics on packets processed by the network interfaces, describes the kind of information you might see from commands like 'netstat -i' or 'ifconfig', which provide statistics on packets processed by network interfaces. A list of active TCP connections and their state, describes the output of a command like 'netstat', which shows network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. The routing table with all known routes and their metrics describes the output of the 'show ip route' command, which displays the routing table, including all known routes and their details. For support or reporting issues, include Question ID: 65ed0c2d85f368aa706fb443 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following best describes a subinterface in network routing? An interface specifically designed for routing traffic between different autonomous systems on the internet. A physical interface used for connecting multiple devices within a local network. An interface used for connecting different types of networks together, such as Ethernet and Wi-Fi. A virtual interface created on a physical interface to allow the router to communicate with multiple subnetworks.

A virtual interface created on a physical interface to allow the router to communicate with multiple subnetworks. OBJ 2.1 - "A virtual interface created on a physical interface to allow the router to communicate with multiple subnetworks using VLANs or other segmentation methods", correctly identifies a subinterface as a virtual interface created on a physical interface. Subinterfaces are used to allow a router to communicate with multiple subnetworks using VLANs (Virtual Local Area Networks) or other segmentation methods, effectively dividing the physical interface into multiple logical interfaces. "A physical interface used for connecting multiple devices within a local network", describes a regular physical interface used for connecting devices within a local network. "An interface used for connecting different types of networks together", does not specifically relate to subinterfaces and their purpose. "An interface specifically designed for routing traffic between different autonomous systems on the internet", also does not specifically relate to subinterfaces and their purpose. For support or reporting issues, include Question ID: 65e904df0a57c4bf80d0890e in your ticket. Thank you. Domain 2 - Network Implementation

In a bustling office environment, employees rely heavily on the company's Wi-Fi network to access resources, collaborate, and communicate. However, lately, users have been encountering difficulties connecting their devices to the network. Despite being within range of the Wi-Fi access points, devices struggle to obtain IP addresses and often fail to connect to the network altogether. The IT department is tasked with resolving these connectivity issues promptly. Which of the following is the MOST likely cause of the reported network issues? Outdated firmware on Wi-Fi access points Address Pool Exhaustion Interference from nearby electronic devices Configuration errors in DHCP settings

Address Pool Exhaustion OBJ 5.3: Address Pool Exhaustion occurs when all available IP addresses are assigned, preventing new devices from connecting. Interference may disrupt connectivity but doesn't address the inability to obtain IP addresses. DHCP configuration errors could cause problems, but Address Pool Exhaustion directly relates to the reported issue. Outdated firmware could cause issues but doesn't explain the inability to connect due to IP address unavailability. For support or reporting issues, include Question ID: 65dcc238f2612a2e1490569d in your ticket. Thank you. Domain 5 - Network Troubleshooting

When routers have multiple routes to the same destination, which term describes the parameter used to select the best route based on its reliability and trustworthiness? MTU OSPF Administrative Distance TTL

Administrative Distance OBJ 2.1 - Administrative distance refers to the trustworthiness of a routing source, with lower values indicating higher trust (0-255); it's used by routers to select the best route when multiple routes exist. MTU (Maximum Transmission Unit) refers to the largest packet size that can be transmitted over a network. TTL (Time to Live) specifies the maximum number of hops or routers a packet can traverse before being discarded. OSPF (Open Shortest Path First) is a routing protocol used to calculate the shortest path to a destination based on cost metrics. For support or reporting issues, include Question ID: 65dfdfdd8fbae81c4d39078d in your ticket. Thank you. Domain 2 - Network Implementation

During a routine security audit, Andrew discovers that an external party has managed to insert fraudulent DNS records into their network, directing users to malicious sites. To mitigate this risk and ensure the integrity of DNS resolutions within their network, Andrew plans to configure their DNS infrastructure in a way that ensures all internal DNS queries for their domain are resolved with trusted, verified records. For external DNS queries, however, he wants the ability to rely on cached records to reduce load times. Which DNS server configuration should Andrew focus on enhancing to achieve trusted DNS resolutions for their domain? Authoritative DNS Server Caching-Only DNS Server Non-Authoritative DNS Server Forwarding DNS Server

Authoritative DNS Server OBJ 3.4 - Enhancing the Authoritative DNS Server configuration is essential for Andrew to achieve trusted DNS resolutions for their domain. Authoritative DNS servers provide the definitive records for the domains they are responsible for, ensuring that all internal DNS queries are resolved with trusted, verified records. This approach directly addresses the concern of ensuring the integrity of DNS resolutions within their network. Non-Authoritative DNS Servers provide resolutions based on cached information from authoritative sources. While they reduce load times for external queries, they do not ensure the integrity of DNS resolutions for Andrew's own domain. Forwarding DNS Servers forward queries to other DNS servers and do not directly resolve queries with their own authoritative records. Caching-Only DNS Servers rely on cached records from other DNS servers and do not store their own authoritative records, which would not meet Andrew's requirement for trusted, verified records for their domain. For support or reporting issues, include Question ID: 65f2f7b52bdae866be263584 in your ticket. Thank you. Domain 3 - Network Operations

In a large-scale network infrastructure, Dean works as a network administrator. His company is a multinational corporation that connects its various branch offices and data centers to ensure seamless communication and data exchange. Recently, network administrators have been tasked with implementing a protocol that facilitates routing between different autonomous systems while maintaining optimal paths for data transmission. Of the following, which protocol should he implement as it is most suited for this task? ICMP DHCP BGP OSPF

BGP OBJ 2.1: BGP (Border Gateway Protocol) is specifically designed for inter-domain routing between different autonomous systems, making it ideal for connecting branch offices and data centers in a multinational corporation. ICMP (Internet Control Message Protocol) is primarily used for diagnostic purposes and error messaging, not for routing between autonomous systems. OSPF (Open Shortest Path First) is an interior gateway protocol used within a single autonomous system, not for routing between different autonomous systems. DHCP (Dynamic Host Configuration Protocol) is used for dynamically assigning IP addresses to devices on a network and does not perform routing functions like BGP. For support or reporting issues, include Question ID: 65df9e1e200a4fd73e230dd2 in your ticket. Thank you. Domain 2 - Network Implementation

Ben is experiencing slow Wi-Fi performance in his multi-story house, especially on devices located far from the router. He's considering upgrading his router. Which feature should Ben look for in a new router to improve Wi-Fi performance across different floors and distances? 6GHz Capability Band Steering 2.4GHz Capability 5GHz Capability

Band Steering OBJ 2.3 - Band steering automatically directs devices to the most appropriate frequency band (2.4GHz or 5GHz) based on the device's location and network conditions, improving overall Wi-Fi performance throughout the house. The 6GHz band provides the fastest speeds and least congestion but may not support all existing devices and has similar range limitations as 5GHz. The 5GHz band offers faster speeds but has limited range, which might not reach far or through obstacles efficiently. The 2.4GHz band offers better range but may not alone improve performance if devices are capable of faster speeds on the 5GHz band. For support or reporting issues, include Question ID: 65f234aa03e9a317b6c04a83 in your ticket. Thank you. Domain 2 - Network Implementation

Stanley, the Chief Information Officer, has been tasked by the board to implement a solution that will optimize the performance of their wireless network that will intelligently direct devices to connect to the less congested frequency band. This strategy aims to balance the load between the 2.4 GHz and 5 GHz bands, ensuring efficient use of available bandwidth. What feature should he have the IT department deploy to achieve this goal? Beamforming Quality of Service Band steering Channel bonding

Band steering OBJ 2.3 - Band steering directs devices to connect to the less congested frequency band, optimizing the performance of the wireless network by balancing the load between the 2.4 GHz and 5 GHz bands. Channel bonding combines multiple channels to increase bandwidth but does not direct devices to connect to specific frequency bands. Beamforming focuses wireless signals in specific directions to improve signal strength but does not manage frequency band selection. QoS prioritizes certain types of traffic over others but does not specifically manage the distribution of devices across frequency bands. For support or reporting issues, include Question ID: 65dfa3d6b6560dbaad25f6dc in your ticket. Thank you. Domain 2 - Network Implementation

Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions? Throughput Jitter Bandwidth Latency

Bandwidth OBJ 3.2: Bandwidth is the maximum rate of data transfer across a given network. Now, bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions. Throughput is an actual measure of how much data is successfully transferred from the source to a destination. Therefore, we often measure throughput, instead of bandwidth, to monitor our network performance. Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back. Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients. For support or reporting issues, include Question ID: 63fe0f2d3b7322449ddc2efd in your ticket. Thank you. Domain 3 - Network Operations

You have just finished installing a small network consisting of a router, a firewall, and a single computer. The computer is connected to the firewall and the firewall is connected to the router. What type of physical network topology have you created in this scenario? Mesh Ring Bus Star

Bus OBJ 1.6: As described, this network would resemble a physical bus network topology because the router connects directly to the firewall, and the firewall connects directly to the computer. This would form a single line (or bus) from one device to the next. A bus topology uses a single cable that connects all the included nodes and the main cable acts as a backbone for the entire network. A ring topology connects every device to exactly two other neighboring devices to form a circle. Messages in a ring topology travel in one direction and usually rely on a token to control the flow of information. A star topology connects all of the other nodes to a central node, usually a switch or a hub. A star topology is the most popular network topology in use on local area networks. A mesh topology connects every node directly to every other node. This creates a highly efficient and redundant network, but it is expensive to build and maintain. For support or reporting issues, include Question ID: 63fe0eaf3b7322449ddc28d0 in your ticket. Thank you. Domain 1 - Networking Concepts

The accounting department has been relocated to a new area of the building, which is more than 70 meters away from the closest IDF. To comply with an SLA that requires that 10Gb speeds be provided, what type of media should be installed? 802.11ac CAT 5e CAT 6a 802.11n

CAT 6a OBJ 1.5: Cat6a is the only one listed that can meet 10 Gbps. CAT5e and 802.11 ac support speeds up to 1 Gbps. 802.11n supports speeds of up to 600 Mbps. For support or reporting issues, include Question ID: 63fe0e943b7322449ddc2780 in your ticket. Thank you. Domain 1 - Networking Concepts

Susan is an administrator who is assigned to upgrade the conference rooms with high-definition video conferencing systems. These systems require stable, high-speed network connections for optimal performance. She needs to select the best cable type to meet these requirements. Which of the following cable types should she AVOID using for connecting high-definition video conferencing systems? Cat7 Cat6 Cat5 Cat6a

Cat5 OBJ 5.2 - Cat5 is the least suitable choice for high-definition video conferencing systems due to its limited bandwidth capabilities, which may not support the high-speed network connections required for optimal performance. Cat6a, Cat7, and Cat6 are all designed to support higher speeds and bandwidth, making them more suitable for this application. While Cat5 might technically support up to 100 Mbps, it is outdated compared to the others and may not deliver the reliability or speed needed for high-definition video. For support or reporting issues, include Question ID: 65eceecc69aa1dbaceda0d67 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Tanya is tasked with diagnosing a problem in a newly established fiber optic link between two buildings. Despite using compatible fiber cables and ensuring no physical damage, the connection fails to establish. What should be her FIRST step in troubleshooting this issue? Check if the wavelength specifications of the transceivers on both ends match. Verify the accuracy of the IP address configuration on both connecting devices. Replace the fiber optic cables with a higher grade to ensure compatibility. Redesign the network topology to reduce the distance between the buildings

Check if the wavelength specifications of the transceivers on both ends match. OBJ 5.2 - The mismatch in wavelength specifications between transceivers at either end of a fiber optic link can prevent the connection from being established. Ensuring compatibility in terms of speed, type (single-mode/multimode), and wavelength is critical for successful communication. Redesigning the network topology to reduce distance is unnecessary if the initial setup meets the operational range of the deployed fiber and transceivers. Replacing the fiber optic cables without identifying the root cause, such as a transceiver mismatch, may not resolve the issue. Verifying the IP address configuration is crucial for network communication but would not affect the physical layer's ability to establish a connection. For support or reporting issues, include Question ID: 65ed10e8468dd6d2e8c8d1a9 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following layers is NOT used in a three-tiered datacenter network architecture? Control layer Access/edge layer Core layer Distribution/aggregation layer

Control layer OBJ 1.8 - The control layer is used in software-defined networking (SDN), not the three-tiered datacenter network architecture. The Core Layer is considered the backbone of our network and is used to merge geographically separated networks back into one logical and cohesive unit. In general, you will have at least two routers at the core level, operating in a redundant configuration. The distribution or aggregation layer is located under the core layer and it provides boundary definition by implementing access lists and filters to define the policies for the network at large. The access or edge layer is located beneath the distribution or aggregation layer and is used to connect all the endpoint devices like computers, laptops, servers, printers, wireless access points, and others. For support or reporting issues, include Question ID: 63fe0edc3b7322449ddc2afc in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following technologies is not commonly used by a captive portal to perform user redirection? HTTP redirect DNS redirect ICMP redirect DHCP redirect

DHCP redirect OBJ 4.3 - In general, captive portals are implemented by using an HTTP redirect, an ICMP redirect, or a DNS redirect. A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a wireless network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other information prior to allowing access to the network and its resources. For support or reporting issues, include Question ID: 63fe0f853b7322449ddc3340 in your ticket. Thank you. Domain 4 - Network Security

Dawn, a network administrator, starts receiving reports from users that they are redirected to fraudulent websites when they try to access certain popular web services. After some initial troubleshooting, she suspects that the issue is not with the users' computers but rather with how domain names are being linked within the company's network. What type of attack is Dawn most likely dealing with in this situation? SQL Injection DDoS Attack ARP Spoofing DNS Poisoning

DNS Poisoning OBJ 4.2 - DNS Poisoning, also known as DNS cache poisoning, involves corrupting the DNS cache with fraudulent IP addresses. When users attempt to access certain websites, they are instead redirected to malicious sites, which is consistent with the issues reported by Dawn's users. A DDoS Attack would typically result in services being unavailable rather than redirecting users. ARP Spoofing affects the linkage between IP addresses and MAC addresses within a local network, not DNS resolution. SQL Injection is a type of attack that targets databases through web applications, unrelated to DNS resolution issues. For support or reporting issues, include Question ID: 65ed1a555635bcd84cacce15 in your ticket. Thank you. Domain 4 - Network Security

You are creating a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and be lightweight as it will be mounted outside the building. Which type of antenna should you install? Directional patch antenna Omni-directional whip antenna Omni-directional patch antenna Directional whip antenna

Directional patch antenna OBJ 2.3: A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern. Patch antennas can be directional or omnidirectional, but a directional antenna should be used for a connection between two buildings within line of sight of each other. A Yagi or directional antenna could also be used, but if the distance is smaller than about 300 feet between the buildings, a patch antenna would be sufficient. A Yagi would be utilized for longer distances instead, but these do weigh more and have a larger footprint. A whip antenna is a vertical omnidirectional antenna that is usually utilized in indoor environments. A whip antenna is omnidirectional and cannot be used for directional use cases. For support or reporting issues, include Question ID: 63fe0f1b3b7322449ddc2e1b in your ticket. Thank you. Domain 2 - Network Implementation

Which of the following is a connectionless protocol? ICMP TCP SSL SSH

ICMP OBJ 1.4: A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples of connectionless protocols. TCP, SSH, and SSL are all examples of connection-oriented protocols. For support or reporting issues, include Question ID: 63fe0e983b7322449ddc27a9 in your ticket. Thank you. Domain 1 - Networking Concepts

The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue? Distributed DoS Evil twin Session hijacking ARP spoofing

Distributed DoS OBJ 4.2: A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network. Session hijacking, also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. An evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the end-user's knowledge. For support or reporting issues, include Question ID: 63fe0f7e3b7322449ddc32e1 in your ticket. Thank you. Domain 4 - Network Security

A company is planning to enhance the security of its DNS infrastructure. The IT department has been tasked with implementing a solution that ensures the integrity and authenticity of DNS data to protect against cache poisoning and on-path attacks. Which of the following solutions should the IT department implement to meet these requirements? DNS over TLS (DoT) Stateless Address Autoconfiguration (SLAAC) DNS over HTTPS (DoH) Domain Name System Security Extensions (DNSSEC)

Domain Name System Security Extensions (DNSSEC) OBJ 3.4 - Domain Name System Security Extensions (DNSSEC) is specifically designed to protect the integrity and authenticity of DNS data. DNSSEC adds a layer of security to the DNS lookup and response process by allowing DNS responses to be verified with public key cryptography. This helps prevent attacks such as DNS cache poisoning and on-path attacks by ensuring that the DNS data has not been tampered with. While DNS over HTTPS (DoH) and DNS over TLS (DoT) both encrypt DNS queries and responses, providing confidentiality and some protection against eavesdropping and on-path attacks, they do not directly ensure the integrity and authenticity of DNS data in the same way DNSSEC does. Stateless Address Autoconfiguration (SLAAC) is a method for automatic IP address assignment in IPv6 networks and is unrelated to DNS security. For support or reporting issues, include Question ID: 65f32f9a0473232bbf4f308c in your ticket. Thank you. Domain 3 - Network Operations

Which dynamic routing protocol is known for using the Diffusing Update Algorithm (DUAL) to ensure loop-free and reliable routing within a network? RIP EIGRP BGP OSPF

EIGRP OBJ 2.1 - EIGRP uses the Diffusing Update Algorithm (DUAL) to achieve rapid convergence and ensure that routing is loop-free and reliable. DUAL allows EIGRP to quickly adapt to topological changes while maintaining a loop-free routing environment. OSPF (Open Shortest Path First) calculates the shortest path using the Dijkstra algorithm, not DUAL. RIP (Routing Information Protocol) uses hop count as its metric and does not employ DUAL for routing decisions. BGP (Border Gateway Protocol) uses path attributes for route selection and does not utilize the DUAL algorithm. For support or reporting issues, include Question ID: 65f8e86337dd7116c2d8e109 in your ticket. Thank you. Domain 2 - Network Implementation

While connecting to a public Wi-Fi network at a coffee shop, you unknowingly connect to a rogue access point set up by an attacker to intercept your data. What is this scenario an example of? Evil twin Packet sniffing Bluejacking Phishing

Evil twin OBJ 4.2: An evil twin attack involves setting up a rogue Wi-Fi access point with a name similar to a legitimate one to trick users into connecting and intercepting their data. Bluejacking involves sending unsolicited messages over Bluetooth, not creating rogue Wi-Fi access points. Packet sniffing is the practice of intercepting and analyzing network traffic, but it doesn't involve creating fake Wi-Fi networks. Phishing involves tricking individuals into divulging sensitive information through deceptive emails or websites, not creating fake Wi-Fi networks. For support or reporting issues, include Question ID: 65d3639edddcb172803f0545 in your ticket. Thank you. Domain 4 - Network Security

You have been asked to install a media converter that connects a newly installed multimode cable to the existing Cat 5e infrastructure. Which type of media converter should you use? Fiber to ethernet Fiber to coaxial Ethernet to coaxial Multimode to single-mode

Fiber to ethernet OBJ 1.5: A media converter is a Layer 1 device that changes one type of physical network connection to another. In this case, we are converting multimode (fiber) cable to Cat 5e (ethernet) cable. For support or reporting issues, include Question ID: 63fe0eaa3b7322449ddc2892 in your ticket. Thank you. Domain 1 - Networking Concepts

In a redundant network design, which protocol enables multiple routers to share a virtual IP address, providing seamless failover in case of an active router failure? OSPF ARP ICMP HSRP

HSRP OBJ 2.1: Hot Standby Router Protocol (HSRP) allows multiple routers to work together, providing a virtual IP address to ensure continuous connectivity even if the active router fails. OSPF is a link-state routing protocol, not a First Hop Redundancy Protocol (FHRP) for virtual IP address management. ARP (Address Resolution Protocol) is essential for mapping IP addresses to MAC addresses but is not an FHRP. ICMP (Internet Control Message Protocol) is used for error reporting and diagnostics and is not related to FHRP functionality. For support or reporting issues, include Question ID: 65c501e5a32251f35c65fb95 in your ticket. Thank you. Domain 2 - Network Implementation

During a business trip, Bobby connects to the hotel's wireless network to send emails to some of his clients. The next day, Bobby notices that additional emails have been sent out from his account without consent. Which of the following protocols was MOST likely used to compromise Bobby's email password utilizing a network sniffer? SSL HTTP TFTP DNS

HTTP OBJ 1.4: HTTP is an unsecured protocol, and information is passed without encryption. If the user signed into their webmail over HTTP instead of HTTPS, a network sniffer could compromise the username and password. Additionally, if the user was using an email client, then the SMTP connection could have been compromised, but since that wasn't an option in this question, we must assume Bobby used a webmail client over HTTP instead. For support or reporting issues, include Question ID: 63fe0eb63b7322449ddc2922 in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following network devices can be used to detect and alert upon an identified threat based on its signature? IPS IDS Router Firewall

IDS OBJ 1.2: An Intrusion Detection System (IDS) is a network security/threat prevention technology that examines network traffic flows to detect and alert upon identified threats. An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent identified threats. A firewall is a network security system that monitors, controls, and blocks incoming and outgoing network traffic based on predetermined security rules. A router is networking hardware that connects computer networks and forwards data packets between those networks. A router operates at the network layer (Layer 3) of the OSI model and makes routing decisions based upon IP addresses. Each switchport on a router is a separate collision domain and a separate broadcast domain. For support or reporting issues, include Question ID: 63fe0f213b7322449ddc2e62 in your ticket. Thank you. Domain 1 - Networking Concepts

Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks? IDS IPS Honeypot Firewall

IPS OBJ 1.2: Intrusion Protection Systems (IPS) can reconfigure themselves based on the threats experienced. Firewalls maintain a static configuration and cannot change their configurations automatically. An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. An IDS can detect a threat, but it cannot react or change configurations based on those threats like an IPS can. A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. A honeypot is a single machine and cannot actively defend the entire network as it is not an inline device like an IPS. For support or reporting issues, include Question ID: 63fe0f033b7322449ddc2cec in your ticket. Thank you. Domain 1 - Networking Concepts

You're setting up a new Ethernet network in an office building. After completing the cabling installation, you find that some computers are unable to connect to the network. Upon inspection, you discover that some RJ45 connectors are not crimped correctly, causing intermittent connectivity issues. What is the likely cause of the issue due to this inadequate crimping? Crosstalk interference Improper termination Cable length mismatch Cable jacket damage

Improper termination OBJ 5.2: Incorrect crimping of RJ45 connectors, can result in poor connectivity or intermittent connection issues due to an improper termination. Crosstalk occurs when signals on one wire interfere with signals on adjacent wires, typically due to poor cable shielding or proximity. Cable jacket damage refers to physical harm to the outer covering of the Ethernet cable, which can expose the internal wires to environmental factors. A cable length mismatch happens when cables of different lengths are used within a network, causing signal degradation and performance issues. For support or reporting issues, include Question ID: 65dccbb04797dd06872c77e7 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue? Install an event management tool Log into the DNS server every hour to check if the logs are full Delete the logs when full Increase the maximum log size

Install an event management tool OBJ 3.2: Using an event management tool will allow the administrator to clear the event logs and move them from the server to a centralized database if needed. This will prevent the logs from filling up on the server without having to delete them permanently from the logging environment. For support or reporting issues, include Question ID: 63fe0f3f3b7322449ddc2fd9 in your ticket. Thank you. Domain 3 - Network Operations

In a network implementing Rapid Spanning Tree Protocol (RSTP), what is the role of the Alternate Port? It directly forwards traffic and can immediately transition to the forwarding state if the designated port fails It is a non-designated port that discards frames and does not learn MAC addresses, acting as a backup in the network topology It provides a backup to the root port and becomes active if the forwarding path experiences a failure It is an additional port designated for network management and configuration, separate from traffic forwarding roles

It provides a backup to the root port and becomes active if the forwarding path experiences a failure OBJ 2.2: The Alternate Port in RSTP is a backup to the Root Port, remaining in a blocking state under normal conditions and transitioning to forwarding if the Root Port fails, ensuring redundancy and rapid convergence. A non-designated port that discards frames and doesn't learn MAC addresses isn't a function of the alternate port. The alternate port is not a backup for the designated port and does not directly forward traffic under normal conditions. The alternate port is not used for network management or configuration; it's strictly for traffic forwarding redundancy. For support or reporting issues, include Question ID: 65f8f2bbae2d2e107f47fd62 in your ticket. Thank you. Domain 2 - Network Implementation

Ella is configuring a new network infrastructure for her small business. She wants to implement a protocol that allows network devices to dynamically discover and advertise their capabilities, including VLAN membership and management information. Which protocol should Ella deploy to achieve this functionality? LLDP DHCP CDP ARP

LLDP OBJ 5.5 - LLDP (Link Layer Discovery Protocol) is a standardized protocol used for dynamically discovering and advertising capabilities of network devices on a local area network. It provides information about device capabilities, VLAN membership, management information, and more. Therefore, it is the suitable choice for Ella to deploy in her network infrastructure to achieve the desired functionality. CDP (Cisco Discovery Protocol) also serves a similar purpose but is proprietary to Cisco devices, making it less ideal for a network infrastructure with heterogeneous devices. ARP (Address Resolution Protocol) and DHCP (Dynamic Host Configuration Protocol) are not designed for dynamically discovering and advertising device capabilities, making them incorrect choices in this scenario. For support or reporting issues, include Question ID: 65e5eaeef390ad47fd04a422 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following network performance metrics is used to represent the round-trip time it takes for a packet to be sent by a device to a server and then a response received from that destination server? Jitter Latency Bandwidth Throughput

Latency OBJ 3.2: Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back. Bandwidth is the maximum rate of data transfer across a given network. Now, bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions. Throughput is an actual measure of how much data is successfully transferred from the source to a destination. Therefore, we often measure throughput, instead of bandwidth, to monitor our network performance. Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients. For support or reporting issues, include Question ID: 63fe0f3a3b7322449ddc2f98 in your ticket. Thank you. Domain 3 - Network Operations

Norah is working as a system administrator, who primarily deals with the email servers within her organization. She is tasked with configuring the DNS records to ensure smooth email delivery for her employer. As part of her task, she needs to specify the mail servers responsible for handling email traffic for the organization's domain. Which specific record type should Norah use to designate the mail servers for the domain? AAAA MX NS CNAME

MX OBJ 3.4 - The Mail Exchange (MX) record specifies mail servers responsible for receiving email on behalf of a domain. When someone sends an email to an address within a domain, the MX record directs the email to the specified mail servers. By configuring these MX records, Norah can direct incoming email traffic to the designated mail servers, ensuring efficient email delivery within the organization. A Canonical Name (CNAME) is for aliasing one domain name to another, AAAA is used to map a domain name to an IPv6 address, a Name Server (NS) is for identifying authoritative name servers. For support or reporting issues, include Question ID: 65e5e998bc2531bc75079e99 in your ticket. Thank you. Domain 3 - Network Operations

Florence, a network administrator, is tasked with configuring DNS records to ensure proper name resolution for her organization's domain. Today, she needs to identify the authoritative name servers responsible for providing authoritative answers to DNS queries for the domain. Which specific record type should Florence use to designate the authoritative name servers for the domain? NS CNAME AAAA MX

NS OBJ 3.4 - Florence would be using the Name Server (NS) record, which is used to identify authoritative name servers for a domain. These name servers are responsible for providing DNS information about the domain to other DNS servers and clients. A Canonical Name (CNAME) is for aliasing one domain name to another, AAAA is used to map a domain name to an IPv6 address, the Mail Exchange (MX) record specifies mail servers responsible for receiving email on behalf of a domain. For support or reporting issues, include Question ID: 65e5e9efbc2531bc75079ea3 in your ticket. Thank you. Domain 3 - Network Operations

In a network environment, users report intermittent connectivity problems and sluggish performance. Upon investigation, it's revealed that multiple switches are interconnected without proper spanning tree protocol (STP) configuration. What is the likely cause of the network issues? DHCP server failure Network loop Bandwidth saturation ARP spoofing attack

Network loop OBJ 5.3: In this scenario, the absence of proper STP configuration allows loops to form in the network, leading to broadcast storms and degraded performance. Network loop best explains the reported network problems, while the other options are less relevant. ARP spoofing attack might disrupt communication but is unrelated to the topology issue described. DHCP server failure would affect address assignment but wouldn't cause network-wide connectivity issues like loops do. Bandwidth saturation could cause issues, but it doesn't involve loops resulting from improper STP configuration. For support or reporting issues, include Question ID: 65dcc323f2612a2e149056a7 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following network devices can be used to detect and prevent an identified threat based on its signature? IPS SIEM Syslog IDS

OBJ 1.2: An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent identified threats. An Intrusion Detection System (IDS) is a network security/threat prevention technology that examines network traffic flows to detect and alert upon identified threats. Syslog is a standard for message logging and does not have capabilities to detect or prevent threats. Security Information and Event Management (SIEM) systems collect and aggregate logs from various sources to provide security analysis and event management. They can detect anomalies and coordinate responses, but they do not inherently prevent threats based on signatures like an IPS. For support or reporting issues, include Question ID: 63fe0efd3b7322449ddc2c9b in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following concepts is the MOST important for a company's long-term health in the event of a disaster? Vulnerability scanning Implementing an acceptable use policy Off-site backups Uninterruptible power supplies

Off-site backups OBJ 3.3 - In case of a disaster, you must protect your data. Some of the most common strategies for data protection include backups made to tape and sent off-site at regular intervals or the use of cloud-based backup solutions. All of the other options are good, too, but the MOST important is a good backup copy of your company's data. For support or reporting issues, include Question ID: 63fe0f443b7322449ddc301a in your ticket. Thank you. Domain 3 - Network Operations

You opened your web browser and attempted to visit DionTraining.com, but you appear to have been redirected to a malicious website instead. What type of attack is being conducted? DNS poisoning VLAN hopping Rogue DHCP ARP spoofing

OBJ 4.2: DNS spoofing or DNS poisoning is an attack that corrupts the Domain Name System data in the DNS resolver's cache and causes the name server to return an incorrect result record, such as an attacker's IP address instead of the IP of the legitimate server. VLAN Hopping is an attack where the attacker is able to send traffic from one VLAN into another by either double tagging the traffic or conducting switch spoofing. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer, server, or gateway on the network. A rogue DHCP server is a DHCP server set up on a network by an attacker, or by an unaware user, and is not under the control of network administrators. Rogue DHCP servers are also commonly used by attackers for the purpose of network attacks such as an on-path or man-in-the-middle attack. For support or reporting issues, include Question ID: 63fe0f723b7322449ddc3255 in your ticket. Thank you. Domain 4 - Network Security

Which of the following errors would be received if an ethernet frame less than 64 bytes is received by a switch? Encapsulation error Runt Giant CRC error

OBJ 5.2: A runt is an ethernet frame that is less than 64 bytes in size. A giant is any ethernet frame that exceeds the 802.3 frame size of 1518 bytes. Encapsulation is a process by which a lower-layer protocol receives data from a higher-layer protocol and then places the data into the data portion of its frame. Cyclic Redundancy Checksum (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data as it transits the network. For support or reporting issues, include Question ID: 63fe0f463b7322449ddc3033 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Norman, a network administrator, is performing routine maintenance and wants to review the current configuration settings of a network device to ensure that it aligns with the latest compliance requirements. He needs a tool that can display the active running configuration and settings of network devices such as routers and switches. Which of the following actions should Norman take? Execute the show config command on the network device to view its active configuration. Use a cable tester to verify the physical connectivity of the network device. Utilize a Wi-Fi analyzer to assess the wireless signal strength and channel usage. Employ a protocol analyzer to inspect the data packets being transmitted by the network device.

OBJ 5.5: The show config command is used to display the current, active configuration of network devices such as routers and switches. This allows administrators to review and ensure that the device's configuration aligns with compliance and operational requirements. A Wi-Fi analyzer assesses the performance of wireless networks, including signal strength and channel utilization, but it cannot show the configuration of network devices. A cable tester is used to verify the integrity and connectivity of physical cables, not to view the configuration of network devices. A protocol analyzer captures and analyzes network traffic but does not display the active configuration settings of network devices. For support or reporting issues, include Question ID: 65ed020104c046a4fbad0d2d in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following dynamic routing protocols is most suitable for use in a large enterprise network where route scalability and quick convergence are critical factors? RIP GBP EIGRP OSPF

OSPF OBJ 2.1 - OSPF (Open Shortest Path First) is ideal for large enterprise networks because it scales well, converges quickly, and efficiently calculates routes using a link-state approach. It also supports hierarchical design with areas, making it easier to manage. RIP (Routing Information Protocol) is less suitable due to its 15-hop limit and slower convergence, which makes it impractical for larger networks. BGP (Border Gateway Protocol) is mainly used for routing between networks on the internet, making it too complex for internal enterprise use. EIGRP (Enhanced Interior Gateway Routing Protocol) is efficient and fast but is proprietary to Cisco, which can be a challenge in networks with devices from different vendors. These features make OSPF a strong choice for large, scalable networks. For support or reporting issues, include Question ID: 65d35fb7d882288a06aaf8f4 in your ticket. Thank you. Domain 2 - Network Implementation

Jason, a network technician, is troubleshooting a single-mode fiber that provides network connectivity to a remote site. He sees that the link light is off on the router's network interface, and suspects that the fiber may have a break somewhere between his router and the remote site. Single-mode fiber is not providing network connectivity to a remote site. Which of the following tools could be used to identify the location of the break in the fiber? Light meter OTDR Media converter Tone generator

OTDR OBJ 5.2: An Optical Time Domain Reflectometer (OTDR) is used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximate location for the break in meters or feet. A fiber light meter, also known as an optical power meter, is used to measure the power in an optical signal over a fiber optic cable. A fiber light meter could be used to test if the cable is broken, but it would not be able to determine where the break in the fiber cable is located. A tone generator is used with a toner probe to accurately identify the location of a cable pair or conductor within a wiring bundle, cross-connection point, or at the remote end. A tone generator is used with copper cables, not fiber optic cables. A media converter is a layer 1 networking device that connects two different media types, such as a copper twisted pair cable and a fiber optic cable. For support or reporting issues, include Question ID: 63fe0fa23b7322449ddc34a2 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Jason is a client who has called your department multiple times about the poor video conferencing quality he has been having, which includes delays and choppy audio. You've been tasked with identifying the cause of these performance issues on the network. Which of the following are the MOST likely PRIMARY factors for the poor video conferencing quality? (Choose TWO.) Network Congestion User Error Insufficient Bandwidth Packet Loss High Latency

Packet Loss, High Latency OBJ 5.4 - High latency and Packet Loss are the likely causes of the poor video conferencing quality described, for delays and choppy audio. High latency can result in significant delays, causing the video and audio data not to be synchronized properly during the conference. Packet loss is also a primary factor, since packet loss directly impacts the quality of video conferencing by causing gaps in the audio and video stream. Insufficient bandwidth primarily affects the quality and resolution of the video rather than causing delays and choppy audio. Network congestion can lead to increased latency and packet loss, making it a plausible cause for poor video conferencing quality. However, it is more of a contributing factor to the latency and packet loss rather than the primary cause. For support or reporting issues, include Question ID: 65ecdf9e674cab5a34dc7118 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which of the following is a true statement about playbooks and templates in networking? Playbooks and templates serve different purposes, but both are used for automating network configurations. Playbooks are used for documenting network designs, while templates are used for automating network configurations. Playbooks and templates are interchangeable terms used to refer to the same concept in networking. Playbooks are used for automating network configurations, while templates are used for documenting network designs.

Playbooks and templates serve different purposes, but both are used for automating network configurations. OBJ 1.8 - Playbooks in networking are used to define a set of tasks or actions to be executed in an automated manner, typically using tools like Ansible, providing a structured approach to automate network configurations. On the other hand, templates are predefined configurations or patterns that can be reused to automate the deployment of network devices or services. While both playbooks and templates are used for automation, they serve different purposes. The other options either misrepresent the roles of playbooks and templates or suggest they are interchangeable, which is incorrect. For support or reporting issues, include Question ID: 65d35dba194b1942f24022b1 in your ticket. Thank you. Domain 1 - Networking Concepts

With respect to a company's DNS infrastructure setup, which DNS server is responsible for holding the master copy of zone records that can be edited and updated? Non-authoritative DNS server Primary DNS server Recursive DNS server Secondary DNS server

Primary DNS server OBJ 3.4 - A Primary DNS server holds the master copy of the DNS zone records. It is the authoritative source for the zone, and any changes to the DNS records are made there. A Recursive DNS server queries other servers to resolve domain names but does not hold zone files. A Non-authoritative DNS server provides answers based on its cache and does not hold zone records. A Secondary DNS server holds a read-only copy of the zone file from the primary server and cannot be directly edited. For support or reporting issues, include Question ID: 65f7c56bb56e4af387c62a00 in your ticket. Thank you. Domain 3 - Network Operations

Your boss is looking for a recommendation for a cloud solution that will only allow your company's employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company? Hybrid Cloud Private Cloud Public Cloud Community Cloud

Private Cloud OBJ 1.3: A private cloud service would be the best recommendation to protect and secure the services from those outside the company from accessing its contents. The private cloud is defined as computing services offered either over the Internet or a private internal network and only to select users instead of the general public. Also called an internal or corporate cloud, private cloud computing gives businesses many of the benefits of a public cloud - including self-service, scalability, and elasticity - with the additional control and customization available from dedicated resources over a computing infrastructure hosted on-premises. Private clouds also deliver a higher level of security and privacy through both company firewalls and internal hosting to ensure operations and sensitive data are not accessible to third-party providers. For support or reporting issues, include Question ID: 63fe0ea83b7322449ddc286f in your ticket. Thank you. Domain 1 - Networking Concepts

You are currently troubleshooting a workstation in the office and determined that it is an issue with the cabling somewhere between the workstation and the switch. You have tested the patch cable from the workstation to the wall jack and it is not faulty. You want to check the port on the switch next. Which of the following would BEST help you identify which switch port is associated with the workstation's wall jack? Proper labeling Standard procedures Network baseline Inventory management

Proper labeling OBJ 3.1: You should always use proper labeling of your cables, wall jacks, and patch panels to make it easy to locate which switchport is associated with each portion of the cable distribution plant. Ensuring everything is properly labeled will help when you need to troubleshoot a network connection in your interior cable distribution plant. A standard procedure is a set of step-by-step instructions compiled by an organization to help workers carry out routine operations. A baseline is a process for studying the network at regular intervals to ensure that the network is working as designed. Inventory management refers to the process of ordering, storing, and using a company's inventory. For support or reporting issues, include Question ID: 63fe0f313b7322449ddc2f2f in your ticket. Thank you. Domain 3 - Network Operations

Which of the following is a potential security concern when using a cloud service provider that involves multiple customers sharing the same physical hardware? On-Demand Metered services Resource Pooling Rapid elasticity

Resource Pooling OBJ 1.3 - Resource pooling can pose a security concern because multiple customers share the same physical hardware in a cloud environment. This shared infrastructure increases the risk of vulnerabilities, such as improper isolation or side-channel attacks, which could expose sensitive data. Rapid elasticity, metered services, and on-demand are characteristics of cloud computing that enhance functionality but are not directly tied to security risks involving shared hardware. For support or reporting issues, include Question ID: 63fe0e933b7322449ddc276e in your ticket. Thank you. Domain 1 - Networking Concepts

A network is experiencing routing inefficiencies, with packets taking longer paths than necessary. What TWO items should the network engineer review to optimize the network's routing Routing Tables QoS Settings Default Routes DHCP Lease Times

Routing Tables, Default Routes OBJ 5.3 - Default Routes should be examined to ensure that they direct traffic efficiently for destinations not found in the routing table, possibly adjusting them to take advantage of more direct routes. The routing table should also be reviewed for accuracy and optimization to ensure that all routes are the most efficient paths to their destinations. QoS settings prioritize traffic but do not influence route paths. DHCP leases pertain to IP address assignment durations and do not affect routing. VLAN assignments segment networks but are unrelated to the routing paths between different network segments. For support or reporting issues, include Question ID: 65ecda26b7c86894cc092778 in your ticket. Thank you. Domain 5 - Network Troubleshooting

You are troubleshooting a network issue and notice that packets are being discarded due to their size being below the minimum allowed by the network protocol. Which of the following could be the cause? Mini Frames Jumbo Frames Giants Runts

Runts OBJ 5.2: Runts are packets that are smaller than the minimum allowable size specified by the network protocol. Therefore, Runts are the correct answer as they directly address the issue of undersized packets being discarded. Jumbo Frames refer to the ability to transmit larger than standard Ethernet frames, which is unrelated to the issue of small packet size. Mini Frames aren't a networking term. Giants are packets that exceed the maximum size allowed. For support or reporting issues, include Question ID: 65dccc494797dd06872c77ec in your ticket. Thank you. Domain 5 - Network Troubleshooting

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company's web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as? SSO TouchID FaceID MFA

SSO OBJ 4.1: Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services. For support or reporting issues, include Question ID: 63fe0f663b7322449ddc31ba in your ticket. Thank you. Domain 4 - Network Security

A remote research station located in a dense forest with thick tree cover needs internet access for monitoring wildlife and environmental data. Wired connections are infeasible due to the remote location. Which technology should they consider for reliable connectivity? High-frequency radio Satellite internet Cellular network Microwave connection

Satellite internet OBJ 1.5 - Satellite internet is the best choice, providing reliable connectivity even in remote areas with obstructed line-of-sight. High-frequency radio may face signal degradation in dense forest environments. Microwave connections require clear line-of-sight and are not suitable for forested terrain. Cellular network coverage may be insufficient in remote forest locations. For support or reporting issues, include Question ID: 65d388b2a7c0b53e69e77cd4 in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following types of network documentation would provide a map of the wireless coverage area? Site survey report Logical network diagram Wiring diagram Physical network diagram

Site survey report OBJ 3.1: A wireless site survey is the process of planning and designing a wireless network to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability, and quality of service (QoS). The site survey report will contain a floorplan of the areas surveyed with the wireless coverage areas and signal strengths notated on it. Wiring diagrams are used to clearly label which cables are connected to which ports. The more in-depth wiring diagrams will include a floorplan or rack diagram, so you can see how the cables are run in the physical environment. A physical network diagram is used to show the actual physical arrangement of the components that make up the network, including cables and hardware. A logical diagram is used to illustrate the flow of data across a network and is used to show how devices communicate with each other. These logical diagrams usually include the subnets, network objects and devices, routing protocols and domains, voice gateways, traffic flow, and network segments in a given network. For support or reporting issues, include Question ID: 63fe0f523b7322449ddc30c4 in your ticket. Thank you. Domain 3 - Network Operations

A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document? Site survey report Logical network diagram Network baseline Audit report

Site survey report OBJ 3.1: A wireless site survey report will usually take the form of a floorplan with a color-coded series of rings on it to show the signal strengths of wireless network signals in various locations. This is often referred to as a "heat map" by technicians. The technician performing the survey will document this information and use it as a tool during troubleshooting and optimization efforts concerning the wireless coverage in a specific office or building. A logical network diagram illustrates the flow of information through a network and shows how devices communicate with each other. It typically includes elements like subnets, network objects and devices, routing protocols and domains, voice gateways, traffic flow, and network segments. Network baselining is the act of measuring and rating the performance of a network in real-time situations. Providing a network baseline requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage. A network audit entails collecting data, identifying threats and areas of weakness, and compiling a formal audit report. This report is then sent on to network administrators and other relevant parties. For support or reporting issues, include Question ID: 63fe0f333b7322449ddc2f48 in your ticket. Thank you. Domain 3 - Network Operations

Which type of network device operates at layer 2 of the OSI model and allows connected devices to operate at full-duplex since each port is in their own collision domain? Access point Router Switch Hub

Switch OBJ 1.2: A switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A switch operates at the data link layer (Layer 2) of the OSI model and makes switching decisions based upon MAC addresses. Each switchport on a switch is a separate collision domain, but all switchports are in a common broadcast domain. A router is networking hardware that connects computer networks and forwards data packets between those networks. A router operates at the network layer (Layer 3) of the OSI model and makes routing decisions based upon IP addresses. Each switchport on a router is a separate collision domain and a separate broadcast domain. A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. A hub operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, therefore they must use half-duplex for communication and CSMA/CD. A wireless access point is a networking device that allows other Wi-Fi devices to connect to a wired network. A wireless access point operates at the physical layer (Layer 1) of the OSI model to extend the wired network into the wireless domain. For support or reporting issues, include Question ID: 63fe0f163b7322449ddc2dd9 in your ticket. Thank you. Domain 1 - Networking Concepts

A network administrator wants to separate web servers on the network logically. Which of the following network device will need to be configured? HIDS IPS Switch Hub

Switch OBJ 1.2: Logical separation of network devices is accomplished using VLANs, which are configured on the network switches. A hub is a layer 1 device and provides no logical separation. An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. A host-based intrusion detection system is a form of network security that works to detect identified threats. Neither a IPS nor HIDS can logically separate the web servers on the network. For support or reporting issues, include Question ID: 63fe0f073b7322449ddc2d1a in your ticket. Thank you. Domain 1 - Networking Concepts

Which of the following statements correctly highlights a key difference between a server rack and a switch rack? Switch racks typically have higher security features, like biometric locks, compared to server racks because switches are more critical to network security. Server racks are equipped with built-in cooling systems, such as fans or liquid cooling pipes, due to the high heat output of servers, whereas switch racks rely solely on the data center's ambient cooling. Switch racks are primarily used for housing network switches and routers, allowing for better airflow management specific to these devices, while server racks are designed for denser configurations. Server racks require special electromagnetic interference (EMI) shielding to protect sensitive data stored on the servers, whereas switch racks do not need such protection.

Switch racks are primarily used for housing network switches and routers, allowing for better airflow management specific to these devices, while server racks are designed for denser configurations. OBJ 2.4 - Switch racks are designed to accommodate network switches and routers, focusing on airflow management that suits the operational requirements of these devices. Server racks are engineered to handle denser configurations that servers often necessitate due to their size and power requirements. Both server racks and switch racks can utilize the data center's cooling systems. Built-in cooling within racks is not exclusively a feature of server racks. EMI shielding is a consideration for all types of racks housing electronic equipment, not just server racks, depending on the data center's design and security requirements. Security features, including biometric locks, can be implemented on any rack type depending on the security policy of the data center and not specifically more critical to switch racks. For support or reporting issues, include Question ID: 65f33adfdc86141f18ad552c in your ticket. Thank you. Domain 2 - Network Implementation

There are two switches connected using both a Cat 6 cable and a Cat 5e cable. Which type of problem might occur with this setup? Missing route Switching loop Improper cable types Auto-sensing ports

Switching loop OBJ 2.2: A switching loop is when there is more than one Layer 2 path exists between two endpoints. This can be prevented by using the STP (Spanning Tree Protocol). The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that result from them. STP is defined in the IEEE 802.1d standard. Both Cat 6 and Cat 5e are compatible with each other and can both operate at speeds of up to 1000 Mbps (1 Gbps), so it is not an improper cable type issue. Auto-sensing ports refer to a feature found in network adapters that allows them to automatically recognize the current local network's speed and adjust its own setting accordingly. This would not be an issue since the switch can detect the appropriate speed to use with the Cat 6 and Cat 5e cables. Routes are used at layer 3, but switches are layer 2 devices. Therefore, the switches do not need to use a route to pass traffic between each other. For support or reporting issues, include Question ID: 63fe0f1f3b7322449ddc2e49 in your ticket. Thank you. Domain 2 - Network Implementation

Which of the following is a connection-oriented protocol? TCP ICMP NetBIOS UDP

TCP OBJ 1.4: A connection-oriented protocol is a form of data transmission in which data is transmitted and confirmed that it is received by the receiver. If it isn't received, the data is retransmitted. Examples of connection-oriented protocols include TCP, SSH, and SSL. A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples of connectionless protocols. For support or reporting issues, include Question ID: 63fe0ed23b7322449ddc2a7f in your ticket. Thank you. Domain 1 - Networking Concepts

Which protocol is connection-oriented and ensures reliable data delivery by establishing a virtual circuit between sender and receiver? UDP GRE ICMP TCP

TCP TCP (Transmission Control Protocol) is connection-oriented, providing reliable, ordered, and error-checked delivery of data by establishing a virtual circuit between sender and receiver. UDP is connectionless, suitable for real-time applications but does not guarantee reliable delivery. ICMP is used for network diagnostics, error reporting, and is connectionless, not designed for data transfer. GRE is a tunneling protocol, not inherently providing reliable data delivery; it encapsulates various network layer protocols for routing purposes. For support or reporting issues, include Question ID: 65c4f7453119b867243c9684 in your ticket. Thank you. Domain 1 - Networking Concepts

After a network upgrade, a client reports they can no longer access the internet. Upon investigation, the network administrator notices that the client's machine has an IP address that does not belong to any of the configured subnets in the network. Considering the following options, what is the most likely cause of this problem? There is a duplicate IP address conflict. The subnet mask on the client's machine is incorrectly configured. The client's machine is set to a static IP address outside the DHCP scope. The DHCP server is offline.

The client's machine is set to a static IP address outside the DHCP scope. OBJ 5.3 - The most likely cause is the client's machine is incorrectly configured, as manually configuring a static IP address that does not align with the network's subnet configurations can lead to a loss of network access. If the DHCP server were offline, the client might receive an APIPA address or no address at all, depending on the network setup. A duplicate IP address would typically result in intermittent connectivity issues, not complete loss of access. An incorrect subnet mask would affect local or remote network access but does not directly relate to being assigned an IP outside of the subnet. For support or reporting issues, include Question ID: 65ea5c7e5a5d627ed78b3081 in your ticket. Thank you. Domain 5 - Network Troubleshooting

A network administrator installs and configures one distribution switch and five access switches in a new building. Which of the following is the BEST physical location for the equipment? The distribution switch in the MDF and the access switches in the IDF The distribution switch in the IDF and the access switches in the MDF All switches should be placed in the IDF to leave room in the MDF for servers All switches should be placed in the MDF to leave room in the IDF for servers

The distribution switch in the MDF and the access switches in the IDF OBJ 2.4: Distribution switches should be placed in the Main Distribution Facility (MDF) and the access switches would be placed in the IDF closer to the end-users. The Main Distribution Frame (MDF) is a signal distribution frame or cable rack used in telephony to interconnect and manage telecommunication wiring between itself and any number of intermediate distribution frames and cabling from the telephony network it supports. An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting the telecommunications cable between end-user devices and the main distribution frame (MDF). For support or reporting issues, include Question ID: 63fe0eb33b7322449ddc2902 in your ticket. Thank you. Domain 2 - Network Implementation

When configuring the speed of an interface on a network switch, what is the consequence of setting the speed to a value higher than what the connected device supports? The interface will automatically downgrade to the highest supported speed of the connected device. The connected device will automatically upgrade its port speed to match the configured speed on the switch. The interface may experience increased collisions and potentially cause a duplex mismatch. The switch will reject the configuration and revert to the default speed setting for that interface.

The interface may experience increased collisions and potentially cause a duplex mismatch. OBJ 2.2 - Configuring the interface speed to a value higher than what the connected device supports does not automatically lead to speed matching or configuration rejection. Instead, it can lead to operational issues like increased collisions and duplex mismatches. Duplex mismatches occur when one device operates in full-duplex mode while the other is in half-duplex mode, leading to performance degradation. Manually setting a speed higher than the connected device supports does not guarantee automatic downgrading to a compatible speed. Most switches will not reject a manual speed configuration; instead, they will apply the setting, which may lead to operational issues if there's a mismatch. Connected devices do not automatically upgrade their port speed to match the switch configuration; they operate based on their hardware capabilities and configuration. For support or reporting issues, include Question ID: 65f8f133ae2d2e107f47fd53 in your ticket. Thank you. Domain 2 - Network Implementation

Mark is tasked with finding specific information regarding a server on his network. He decides to use Nmap and adds a specific flag to his command to accomplish this. If he uses the -O flag with his Nmap command, what should he expect to see in the output? The versions of services running on the open ports. The operating system details of the target server. A list of IP addresses and the protocols (TCP/UDP) they are using. A list of open ports on the server.

The operating system details of the target server. OBJ 5.5 - The -O flag in Nmap is used for operating system detection. This flag tells Nmap to use a series of tests to guess the operating system running on the target machine. Showing IP addresses and the protocols they use would require a different Nmap scan, such as a simple scan without specific flags for operating system detection. The -sV flag is used to determine the versions of services running on open ports, not -O. Listing open ports is the default behavior of Nmap without specifying any flags for operating system detection. For support or reporting issues, include Question ID: 65f2ef770c9debb3ee799eea in your ticket. Thank you. Domain 5 - Network Troubleshooting

Which statement accurately describes characteristics of a UDP (User Datagram Protocol) connection? UDP provides error checking and retransmission of lost packets. UDP guarantees in-order delivery of data packets. UDP is connection-oriented, ensuring reliable data delivery. UDP is suitable for real-time applications due to its low latency.

UDP is suitable for real-time applications due to its low latency. UDP (User Datagram Protocol) is connectionless and does not establish a connection before sending data. This lack of connection setup contributes to lower latency, making it suitable for real-time applications like streaming, gaming, and voice communication. UDP is connectionless, not connection-oriented, and it does not ensure reliable data delivery. UDP does not provide error checking or retransmission of lost packets. UDP does not guarantee in-order delivery of data packets; packets may arrive out of order. For support or reporting issues, include Question ID: 65c4f7e93119b867243c9689 in your ticket. Thank you. Domain 1 - Networking Concepts

During the process of troubleshooting a device, Victor executes the command 'show power' on a network device's terminal. Which of the following best describes the output Victor can expect to see? A summary of the power supply status, including redundancy and health. A summary of the routing protocols configured on the device and their statuses. A list of power management settings for the device's network interfaces. The power consumption and status of PoE ports on the device.

The power consumption and status of PoE ports on the device. OBJ 5.5 - The "show power" command typically provides information about the power consumption and status of Power over Ethernet (PoE) ports on a network device, showing how much power is being used by each port and the overall status of PoE power supply. A summary of the power supply status, including redundancy and health, might seem plausible since it involves power status but is not specifically related to the output of the "show power" command on a network device, which focuses on PoE status rather than the general power supply status. A list of power management settings for the device's network interfaces, while including the word "power," is misleading because power management settings are typically not displayed with the "show power" command. A summary of the routing protocols configured on the device and their statuses, relates to routing protocols and their statuses, which would not be displayed by the "show power" command. For support or reporting issues, include Question ID: 65f2153322e43322dac7d3d8 in your ticket. Thank you. Domain 5 - Network Troubleshooting

As a network technician, Amber is tasked with troubleshooting an issue where several end devices connected to a switch are experiencing intermittent connectivity problems. Upon inspecting the switch's interface counters, she notices an unusually high number of CRC errors on the interfaces connected to the problematic devices. What is the MOST likely cause of the CRC errors being observed? The switch interfaces are configured with the wrong IP address. The devices are experiencing a high level of electromagnetic interference. There is a mismatch in duplex settings between the switch ports and the end devices. The DHCP server has run out of IP addresses to assign to the devices and more need to be added to the resource pool.

There is a mismatch in duplex settings between the switch ports and the end devices. OBJ 5.2 - A mismatch in duplex settings between the switch ports and the end devices is the most likely cause of the observed CRC errors. CRC errors are usually indicative of physical layer issues such as cabling problems, bad network interface cards, or mismatched duplex settings. When duplex settings are mismatched, one side may be trying to use full-duplex communication while the other is set to half-duplex, leading to frame collisions and CRC errors. Incorrect IP address configuration on switch interfaces would not cause CRC errors, as these errors are related to the physical layer rather than the network layer. Electromagnetic interference can cause signal degradation leading to errors, it is less likely to be the cause of a high number of CRC errors specifically associated with certain interfaces unless those cables run through areas with significant interference which would be causing other significant issues. Exhaustion of IP addresses from the DHCP server would lead to connectivity issues, but it would not cause CRC errors on the switch's interfaces. For support or reporting issues, include Question ID: 65eceaf169aa1dbaceda0d49 in your ticket. Thank you. Domain 5 - Network Troubleshooting

You typed IPCONFIG at the command prompt and find out your IP is 192.168.1.24. You then go to Google.com and search for "what is my IP," and it returns a value of 35.25.52.11. How do you explain why your computer has two different IP addresses? This is caused because your gateway is conducting NAT or PAT This is caused by the way traffic is routed over the internet This is caused by how a switch handles IP addresses This is caused because of the way routers handle IP addresses

This is caused because your gateway is conducting NAT or PAT OBJ 2.1: Your computer network uses a private IP address for machines within the network and assigns a public IP address for traffic being routed over the network using either NAT or PAT. Most small office home office (SOHO) networks utilize a single public IP for all of their devices and use a technique known as PAT to associate the public IP with each internal client's private IP when needed. Network Address Translation (NAT) and Port Address Translation (PAT) allow multiple devices on a LAN to be mapped to a single public IP address to conserve IP address. In NAT, private IP addresses are translated into public IP addresses. In PAT, private IP addresses are translated into a single public IP address and their traffic is segregated by port numbers. For support or reporting issues, include Question ID: 63fe0ee73b7322449ddc2b8c in your ticket. Thank you. Domain 2 - Network Implementation

A network administrator is planning to install a Power Distribution Unit (PDU) in the company's data center. Which of the following best describes the primary function of a PDU? To distribute power to multiple devices from a single source. To serve as the primary power source in case of an outage. To convert AC to DC power for network devices. To monitor and control the power consumption of connected devices.

To distribute power to multiple devices from a single source. OBJ 2.4 - The primary function of a Power Distribution Unit (PDU) is to distribute electrical power to various network devices from a single power source. PDUs are essential in data centers for efficiently managing power distribution to racks of servers and networking equipment. Serving as the primary power source in case of an outage is typically the role of an Uninterruptible Power Supply (UPS). While some PDUs offer additional features, converting AC to DC power is typically the function of a power supply unit within each device, not the PDU. Although some advanced PDUs can monitor and control power consumption, this is not their primary function. For support or reporting issues, include Question ID: 65f8eb3507cad8113a4b20cb in your ticket. Thank you. Domain 2 - Network Implementation

Avery, a network engineer, is tasked with setting up a highly available web application that requires uninterrupted service even in the event of a server failure. The application will be hosted on multiple servers behind a load balancer. To facilitate this setup, why would they use a Virtual IP (VIP)? To assign a unique IP address to each server, ensuring that they can be individually accessed for maintenance without affecting the application's availability. To provide a single point of access for clients, while the load balancer distributes incoming traffic to the backend servers based on load. To dynamically change the DNS records, allowing for the quick addition or removal of servers from the pool without client disruption. To encrypt the traffic between the client and the load balancer, enhancing the security of user data.

To provide a single point of access for clients, while the load balancer distributes incoming traffic to the backend servers based on load. OBJ 2.1 - A Virtual IP (VIP) is utilized in a highly available application environment to offer a single, consistent point of entry for clients. The load balancer uses this VIP to distribute incoming requests among multiple backend servers, ensuring uninterrupted service even if one server fails. A VIP's primary function is not to encrypt traffic; this task is typically handled by security protocols such as SSL/TLS. VIPs do not manage DNS records; their purpose is to abstract the backend server pool to a single address for client connections, independent of DNS. A VIP is not used to assign unique IP addresses to individual servers for maintenance purposes; it serves as a single address that represents multiple servers behind a load balancer. For support or reporting issues, include Question ID: 65f336330473232bbf4f30be in your ticket. Thank you. Domain 2 - Network Implementation

What is the BEST reason to decommission outdated network devices and systems? To remove potential security risks and optimize network performance. To improve efficiency because new devices will use fewer network resources than their predecessors. To reduce redundancy and for the company to be able to return the device for an environmental credit. It will streamline network management and decrease operational costs.

To remove potential security risks and optimize network performance. OBJ 3.1 - Decommissioning outdated network devices and systems is most important for removing potential security risks and optimizing network performance by eliminating obsolete technology that may no longer receive updates and could pose security threats. Reducing redundancy and recycling or trading in devices for environmental credits are beneficial practices, they are not the most important reasons for decommissioning outdated network devices. The main goal is to maintain network integrity, security, and performance, rather than focusing on redundancy or environmental incentives. Newer devices might be more efficient, but this is not always the case. Further, the primary reason for decommissioning is related to security and performance improvements, not resource consumption. Simplifying network management and potentially reducing costs associated with maintaining older technology can be an added benefit, it overlooks the critical aspect of addressing security vulnerabilities and performance enhancements. For support or reporting issues, include Question ID: 65f1fc1d86d111d24ede490e in your ticket. Thank you. Domain 3 - Network Operations

Dion Training has just moved into a new office building and the previous owners never documented which port on the patch panel was connected to the network jacks located in each office. You have been hired to create a wiring diagram to document where all of the cables are connected. Which of the following tools should you use to perform this task? Tone generator Time-domain reflectometer Loopback adapter Cable tester

Tone generator OBJ 5.5: A tone generator is used with a toner probe to accurately identify the location of a cable pair or conductor within a wiring bundle, cross-connection point, or at the remote end. A tone generator is used with copper cables, not fiber optic cables. A cable tester is used to verify the electrical connections in a twisted pair or coaxial cable. A time-domain reflectometer (TDR) is used to determine the characteristics of electrical lines by observing reflected waveforms to characterize and locate faults in copper cables. A loopback adapter is a plug that is used to test the physical port or interface on a network device. For support or reporting issues, include Question ID: 63fe0fa83b7322449ddc34f7 in your ticket. Thank you. Domain 5 - Network Troubleshooting

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implement to correct this issue? Airflow management Surge protector UPS Grounding bar

UPS OBJ 2.4 - An uninterruptible power supply (UPS) is a battery system that can supply short-term power to electrical units. Since all the devices are restarting simultaneously, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts. An uninterruptible power supply (UPS) is a battery system that can supply short-term power to electrical units. Since all the devices are restarting simultaneously, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts. An uninterruptible power supply (UPS) is a battery system that can supply short-term power to electrical units. Since all the devices are restarting simultaneously, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts. An uninterruptible power supply (UPS) is a battery system that can supply short-term power to electrical units. Since all the devices are restarting simultaneously, it is likely due to a power outage. In this case, a UPS would continue to supply power to the network equipment during outages or blackouts. For support or reporting issues, include Question ID: 63fe0f423b7322449ddc2ffc in your ticket. Thank you. Domain 2 - Network Implementation

Dennis works as a network administrator. One day while working at the office, his boss decided to task him with implementing measures to enhance security within his organization's network. To complete the task, Dennis must temporarily limit access to parts of the company's website. Which of the following strategies would be the most effective way for Dennis to limit access? Port Blocking MAC Address Filtering Content Filtering URL Filtering

URL Filtering OBJ 4.3 - Uniform Resource Locator (URL) filtering controls access to websites by blocking or allowing access based on their URLs, helping to prevent access to malicious sites and enforce internet usage policies effectively. MAC address filtering restricts access to the network based on the device's MAC address but doesn't directly prevent access to malicious websites or enforce internet usage policies. Port blocking closes specific ports to prevent certain types of traffic from entering or leaving the network. Content filtering blocks or restricts access to specific types of content, such as adult or inappropriate websites, but it's not as comprehensive as URL filtering. For support or reporting issues, include Question ID: 65e902fe0a57c4bf80d088f5 in your ticket. Thank you. Domain 4 - Network Security

A technician has installed an 802.11n network, and most users can see speeds of up to 300Mbps. A few of the users have an 802.11n network card but cannot get speeds higher than 108Mbps. What should the technician do to fix the issue? Upgrade the OS version to 64-bit Upgrade the WLAN card driver Roll back the firmware on the WLAN card Install a vulnerability patch

Upgrade the WLAN card driver OBJ 5.4: Wireless N networks can support up to 600Mbps with the network cards' proper software drivers. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates. Wireless network interface card drivers are software programs installed on your hard disk that allow your operating system to communicate with your wireless and network adapters. Wireless and network driver problems usually occur due to missing, outdated, or corrupt drivers. For support or reporting issues, include Question ID: 63fe0fbe3b7322449ddc3605 in your ticket. Thank you. Domain 5 - Network Troubleshooting

An attacker is using double tagging to conduct a network exploit against your enterprise network. Which of the following types of attacks is being conducted? DNS poisoning Rogue DHCP VLAN hopping ARP spoofing

VLAN hopping OBJ 4.2: VLAN Hopping is an attack where the attacker is able to send traffic from one VLAN into another by either double tagging the traffic or conducting switch spoofing. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer, server, or gateway on the network. DNS spoofing or DNS poisoning is an attack that corrupts the Domain Name System data in the DNS resolver's cache and causes the name server to return an incorrect result record, such as an attacker's IP address instead of the IP of the legitimate server. A rogue DHCP server is a DHCP server set up on a network by an attacker, or by an unaware user, and is not under the control of network administrators. ... Rogue DHCP servers are also commonly used by attackers for the purpose of network attacks such as an on-path or man-in-the-middle attack. For support or reporting issues, include Question ID: 63fe0f5f3b7322449ddc3160 in your ticket. Thank you. Domain 4 - Network Security

Nordic Treasures, a small business, has decided that it wants to improve its security stance and take steps to secure its internal communications. It was decided that due to a low budget, they wish to implement a system that provides better authentication without relying on third-party certificate authorities. Which method would be the most suitable? Employing IPsec tunnels for data encryption Purchasing enterprise SSL certificates from a trusted CA Utilizing PKI with self-signed certificates Implementing a single-factor authentication system

Utilizing PKI with self-signed certificates OBJ 4.1: PKI with self-signed certificates offers robust authentication and encryption without the need for external CAs, making it cost-effective for Nordic Treasures. Purchasing SSL certificates can be expensive and requires reliance on external authorities. Single-factor authentication lacks the robust security of PKI. IPsec tunnels provide encryption but not authentication, unlike PKI. For support or reporting issues, include Question ID: 65d352e7194b1942f240227a in your ticket. Thank you. Domain 4 - Network Security

Dion Training has a single switch that services every room within its offices. The switch contains 48 ports, but Jason wants to divide the ports based on functional areas, such as web development, instruction support, and administration. Which technology should Jason utilize to divide the physical switch into three logically divided areas? DSL NAT VPN VLAN

VLAN OBJ 2.2: A VLAN (virtual LAN) allows a single physical switch to be divided into logical networks. VLANs are only supported on managed switches, but they allow for a different logical subnetwork address to be assigned to various ports on the switch. This requires that communications between different VLANs must go through a router, just as if you had multiple switches. A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet. Dynamic NAT is a many-to-one mapping of a private IP address or subnets inside a local area network to a public IP address or subnet outside the local area network. The traffic from different zones and subnets over trusted (inside) IP addresses in the LAN segment is sent over a single public (outside) IP address. For support or reporting issues, include Question ID: 63fe0f663b7322449ddc31bf in your ticket. Thank you. Domain 2 - Network Implementation

You are working as a network administrator for Dion Training. The company has decided to allow employees to connect their devices to the corporate wireless network under a new BYOD policy. You have been asked to separate the corporate network into an administrative network (for corporate-owned devices) and an untrusted network (for employee-owned devices). Which of the following technologies should you implement to achieve this goal? VPN WPA2 MAC filtering VLAN

VLAN OBJ 4.1: A virtual local area network (VLAN) is a type of network segmentation configured in your network switches that prevent communications between different VLANs without using a router. This allows two virtually separated networks to exist on one physical network and separates the two virtual network's data. A virtual private network (VPN) is a remote access capability to connect a trusted device over an untrusted network back to the corporate network. A VPN would not create the desired effect. WPA2 is a type of wireless encryption, but it will not create two different segmented networks on the same physical hardware. MAC filtering is used to allow or deny a device from connecting to a network, but it will not create two network segments, as desired. For support or reporting issues, include Question ID: 63fe0f633b7322449ddc3192 in your ticket. Thank you. Domain 4 - Network Security

An attacker has configured their machine to report itself as a switch when connected to a wired network in an attempt to exploit your enterprise network. Which of the following types of attacks is being conducted? ARP spoofing DNS poisoning VLAN hopping Rogue DHCP

VLAN hopping OBJ 4.2: VLAN Hopping is an attack where the attacker is able to send traffic from one VLAN into another by either double tagging the traffic or conducting switch spoofing. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer, server, or gateway on the network. DNS spoofing or DNS poisoning is an attack that corrupts the Domain Name System data in the DNS resolver's cache and causes the name server to return an incorrect result record, such as an attacker's IP address instead of the IP of the legitimate server. A rogue DHCP server is a DHCP server set up on a network by an attacker, or by an unaware user, and is not under the control of network administrators. Rogue DHCP servers are also commonly used by attackers for the purpose of network attacks such as an on-path or man-in-the-middle attack. For support or reporting issues, include Question ID: 63fe0f5f3b7322449ddc3165 in your ticket. Thank you. Domain 4 - Network Security

Which of the following must be combined with a threat to create risk? Vulnerability Mitigation Exploit Malicious actor

Vulnerability OBJ 4.1: A risk results from the combination of a threat and a vulnerability. A vulnerability is a weakness in a device, system, application, or process that might allow an attack to take place. A threat is an outside force that may exploit a vulnerability. Remember, a vulnerability is something internal to your organization's security goals. Therefore, you can control, mitigate, or remediate a vulnerability. A threat is external to your organization's security goals. A threat could be a malicious actor, a software exploit, a natural disaster, or other external factors. In the case of an insider threat, they are considered an external factor for threats and vulnerabilities since their goals lie outside your organization's security goals. For support or reporting issues, include Question ID: 63fe0f753b7322449ddc3273 in your ticket. Thank you. Domain 4 - Network Security

After a series of cybersecurity breaches in the company network, the IT department decides to enhance the security measures for wireless access. They aim to implement a new protocol that offers stronger encryption and protection against brute-force attacks. Which wireless security protocol should the IT department choose to meet these requirements? WEP WPA3 WPA2 WPA

WPA3 OBJ 2.3 - WPA3 is the latest wireless security protocol, offering stronger encryption and protection against brute-force attacks, making it the most suitable choice for enhancing network security. Wired Equivalent Privacy (WEP) is an outdated and insecure wireless security protocol that is vulnerable to attacks. While WPA provides encryption for wireless networks, it is less secure than WPA2 and WPA3. While WPA2 is more secure than WPA, it has known vulnerabilities that have been addressed in the newer protocol, WPA3. For support or reporting issues, include Question ID: 65dfa2f8b6560dbaad25f6d2 in your ticket. Thank you. Domain 2 - Network Implementation

Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company's owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer's hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend? Shredding Wiping Purging Degaussing

Wiping OBJ 4.3: Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse. Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Therefore, it is a bad solution for this scenario. Purging involves removing sensitive data from a hard drive using the device's own electronics or an outside source (like a degausser). A purged device is generally not reusable. Shredding involves the physical destruction of the hard drive. This is a secure method of destruction but doesn't allow for device reuse. For support or reporting issues, include Question ID: 63fe0f643b7322449ddc31a6 in your ticket. Thank you. Domain 4 - Network Security

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as? DDOS Brute force Spoofing Zero-day

Zero-day OBJ 4.2: A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability, hence the term zero-day. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. A brute-force attack consists of an attacker systematically trying all possible password and passphrase combinations until the correct one is found. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. For support or reporting issues, include Question ID: 63fe0f563b7322449ddc30f8 in your ticket. Thank you. Domain 4 - Network Security

Following recent changes to your network's configuration, you need to review the current running configuration to ensure all modifications have been correctly applied. Which command allows you to view the active configuration on a Cisco network device? show running-config description show system show startup-config

show running-config OBJ 5.5 - The show running-config command (often used interchangeably with "show config" in other practical scenarios) enables you to view the active (running) configuration on a Cisco network device, helping ensure that all recent changes are correctly applied. The description command is used in assigning a description to a given interface. show startup-config displays the configuration that will be used on the next reboot, not the current active configuration. show system-config is not a standard command for viewing the device's current configuration. For support or reporting issues, include Question ID: 65ecfd9edbf10acd492911c6 in your ticket. Thank you. Domain 5 - Network Troubleshooting

Jonathan is an IT specialist investigating an issue where a web application is slow to connect to its database server. To identify the path that the data packets take through the network and to pinpoint where delays occur, which of the following commands should they be using? ping tcpdump traceroute/tracert nslookup

traceroute/tracert OBJ 5.5 - traceroute/tracert is specifically designed to trace the path that packets take to reach a destination across a network, making it suitable for identifying where delays occur. Ping can test the ability to reach a destination and measure the round-trip time, but does not show the path or hops that the packets take. nslookup is intended for querying DNS to obtain domain name or IP address mappings. tcpdump captures packets that are transmitted or received over a network but does not specifically show the path or identify where delays occur in the network. For support or reporting issues, include Question ID: 65ecf30369aa1dbaceda0d80 in your ticket. Thank you. Domain 5 - Network Troubleshooting


Set pelajaran terkait

MAN 4330/5331 Compensation Final Exam

View Set

Learning system PN : communication

View Set

Comparison of Somatic and Autonomic Nervous System (lower motor neurons)

View Set

Labor Law & Economics Chapter 1: Contemporary Labor Relations: Objectives, Practices, and Challenges

View Set

Chapter 2: The History of Management

View Set

EXSC 301 Final Exam/ heart disease & obesity (pt. 1)

View Set

FHA Loans and the Consumer Workshops

View Set