IT CertificationsComprehensive Study Set

B.4 Comptia Network+ N10 008 Certification Practice Exam

174 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following tools would generate this output? Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established

ANSWER

Netstat - displays active/ listening connections

QUESTION 2

People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue?

ANSWER

Reduce the wireless power levels - adjusting the power level of anAP can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network

QUESTION 3

Which protocol would be used to exchange information between different Autonomous systems?

ANSWER

BSP - is an EGP (external gateway protocol) and is used to exchange information between autonomous systems. autonomous systems. - A network or a group of networks owned/controlled by a single entity

QUESTION 4

Which of the following controls could be used to allow employees entry into building to be recorded by a card reader?

ANSWER

Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically

QUESTION 5

Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices?

ANSWER

TACACS+ SSO Is a tempting answer we are asking what can actually manage these accounts not the terminology used to describe having a centrally manage account

QUESTION 6

While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario?

ANSWER

The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running past its maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft)

QUESTION 7

While configuring a load balancer between multiple systems which of the following must be configured in order to ensure proper connectivity during a fail over?

ANSWER

VIP - virtual IP an essential part of configuring load balance systems as a single system

QUESTION 8

Which of the following service models would most likely be used to replace on premises servers with a could solution

ANSWER

IaaS - client moves whole infrastructure to the cloud minus the hardware of course which is always controlled by the CSP in cloud deployments

QUESTION 9

Which of the following best mitigate a hackers frequent attempts at brute forceing A company's password

ANSWER

Two factor authentication, complex passwords. — passwords are best protected with longer, more complex passwords preferably pass phrases made up of multiple words. Additionally some form of MFA is considered essential today for "password security". Multi factor authentication protects your password by preventing it from being a single point of failure now we should require another factor in addition to our password such as using a biometrics or a smart card

QUESTION 10

After configuring new firewalls with the correct configuration to be deployed to each remote branch, unneeded services were disabled, and all firewalls rules were applied successfully. Which of the following actions should be performed next to finish hardening the firewalls?

ANSWER

Update the firewalls with current firmware and software — Keeping a device up today is an essential step in hardening any system

QUESTION 11

Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution?

ANSWER

Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people

QUESTION 12

A new network was set up in order to facilitate more users in a building near your companies HQ. The new network is connected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which of the following corrections would most likely resolve this issue?

ANSWER

Correct the external firewall gateway address — Could be a misconfigured firewall

QUESTION 13

Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge?

ANSWER

Tailgating — Is the act of following somebody into a secure area without their knowledge Piggybacking is following somebody into a secure area with their knowledge

QUESTION 14

IP headers would be found under which of the following OSI layers?

ANSWER

Layer 3- routers, IPv4 , IPv6, and ICMP

QUESTION 15

Which of the following solutions would provide redundancy for a server if our main concern is physical port failure

ANSWER

NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity

QUESTION 16

Which of the following is the largest MTU for a standard ethernet frame

ANSWER

1500

QUESTION 17

Which of the following TCP ports is used by the windows OS for file sharing

ANSWER

445- NetBIOS/SMB ( sharing files/access)

QUESTION 18

Which of the following subnet mask's is the equivalent of a CIDR of /20?

ANSWER

255.255.240.0. - /20

QUESTION 19

A large amount of expensive equipment is being moved into a company warehouse this equipment needs to be tracked when it leaves or enters the warehouse or when it is taken to be serviced which of the following solutions would best allow us to record these changes

ANSWER

Asset tags— Asset tags are great for tracking inventory of any type. We can scan the tags and usually enter a note during the process to describe the actions we took during this time

QUESTION 20

Which of the following is most likely to generate sufficient East-West traffic?

ANSWER

A duplication of a hosted virtual server to another physical server for redundancy. East-West traffic is server to server traffic, while north-South traffic is server to client

QUESTION 21

In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement

ANSWER

A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router

QUESTION 22

While installing Wi-Fi for a large amount of users, we want to utilize and 802.11 Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement?

ANSWER

5 GHz. — 23 non overlapping channels

QUESTION 23

Which of the following would most likely be used to review previous upgrades to a system

ANSWER

Change management

QUESTION 24

Which of the following commands can be used to display the pass that networking traffic takes to reach other networks

ANSWER

Show route

QUESTION 25

While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experiencing extreme amounts of latency. Which of the following problems is most likely occurring?

ANSWER

A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many of the basic security controls of manage switches, such as STP

QUESTION 26

Which of the following best describes a network appliance that warns of unapproved devices that are accessing the network

ANSWER

IDS - intrusion detection system

QUESTION 27

Which of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity?

ANSWER

Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network

QUESTION 28

Which transceiver type can support up to 40 Gbps?

ANSWER

QSFP+ QSFP+ 10 Gbps per channel / 40 Gbps channels

QUESTION 29

When a large amount of users are remotely accessing a centralized VM hosting server, which of the following concerns are raised assuming the network can readily support this increase in traffic

ANSWER

CPU usage and. Memory VMs much like physical systems however do you have both CPU and RAM requirements the more systems running on the VM host the hire the requirements

QUESTION 30

Client devices cannot enter network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DH pool which of the following in the administrator perform to resolve the issue

ANSWER

Decrease the number of VLANs — While we would generally increase the scope of the DHCP pool that may cause other problems which is why we see this question states we want to avoid increasing the scope by reducing the least time we will cycle through IP at a quicker rate then we otherwise would allowing us to reuse IP address is much more quickly

QUESTION 31

What type of cable would likely be used to connect to the WAN Port on a cable modem

ANSWER

Coaxial

QUESTION 32

Which of the following would need to be configured to ensure a device with a specific Mac addresses always assigned the same IP address from DHCP

ANSWER

Reservation — While a static assignment would ensure a device would have a consistent IP address the question states that it Has to be from DHCP making a Mac reservation our best answer

QUESTION 33

What port enables telnet access to a device

ANSWER

23 Telnet

QUESTION 34

What should be reviewed on a switch in order to review physical network addresses

ANSWER

MAC table— Mac addresses are physical network addresses

QUESTION 35

You were troubleshooting a network switch that seem to have stopped responding to request when the login level was set to debugging which of the following should be checked to begin troubleshooting the switch

ANSWER

CPU utilization — If setting logging to debugging the highest level/lease severe level of logging you end up asking the device for all logs which is information on an incredible amount of traffic

QUESTION 36

What is used to track and document various types of known vulnerabilities

ANSWER

CVE- Common vulnerability and exposure

QUESTION 37

After a DNS record was updated some users report being unable to access the website associated with that record which of the following should be changed to fix the issue

ANSWER

TTL — DNS TTL keeps records cached for a certain period of time any cached do you know would point towards the wrong site if the A (IPv4) record was changed

QUESTION 38

Which of the following IEEE 802.11 standards Would be best to use for multiple simultaneous client access

ANSWER

CSMA/CA Carrier sense multiple access with collision avoidance allow multiple users to connect to a Wi-Fi network while minimizing collisions/interference on the network

QUESTION 39

Which system would most likely be found and a screen subnet

ANSWER

FTP — Screen subnets it's also known as DMZ's are areas of the network that are used to separate the Internet from our corporate network devices that need to be directly access from the Internet will be placed here such as websites email server and file sharing servers

QUESTION 40

After trying to set up a port mirror with the following configuration: Switch mirror port details: eth0:10.1.2.3 AA:BB:CC:DD:EE:FF Which of the following commands could be entered on the PC to finish this configuration?

ANSWER

Ifconfig eth0 promisc — Turns on promiscuous mode

QUESTION 41

Which of the following command can confirm the name of a Linux server

ANSWER

Nslookup— The OS of the server who's name we are confirming doesn't affect the command we run we determine the command we use based on the OS that we are actively using if we were running commands in order to query in the DNS( name) information of a device we would use nslookup on a Windows system or DIG on a Linux system

QUESTION 42

A new cabling certification is being requested every time and network technician rebuilds one end of a CAT 6 (vendor-certified) Cable to create a crossover connection that is used to connect switches which of the following will address this issue by allowing the use of the original cable

ANSWER

MDIX— Auto MDIX allows a cable to take the correct connection requirements. (Crossover vs straight through) and that's the opposite end of the cable becomes less important to the tech

QUESTION 43

Which of the following devices could be used to detect which devices exit on a given network?

ANSWER

Ip scanner A simply IP scanning tool could tell you which devices exist on your network and what their IP addresses are a port scanner would be a close second but it would provide more information in the question is asking for making an IP scanner a better answer ( it would should open/close ports as well as services running)

QUESTION 44

After investigating reporter for network performance and network admin finds hundreds of CRC Errors on an interface which of the following is the most likely cause of these errors

ANSWER

A bad wire on the Cat 5e cable CRC Errors can because by a multitude of issues these issues can range from corrupt data to noise (interference) On the cable to just plain bad cabling

QUESTION 45

Considering that hubs are vastly outdated in terms of network hardware you've decided to replace all hubs on your network with their devices of the following devices which are you most likely to replace your hubs with

ANSWER

A layer 3 switch Herbs were used to move traffic ( poorly) threw out a network so some form of switch would be the best choice for replacing them

QUESTION 46

A company has an access layer switch in the lobby of their headquarters which of the following security technology should we consider first given the placement of the switch

ANSWER

Port security - Considering physical access is provided to the switch we need to lock it down to the best of our abilities. Portsecurity attempts to do justice by limiting who and how many devices can plug into an individual switch port though in general you need to be careful allowing anybody untrustworthy to have physical access to your network equipment

QUESTION 47

The technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building several APs are mounted in this office that users report that the network connections frequently disconnect and reconnect throughout the day which of the following is the most likely cause of this issue

ANSWER

Channel overlap is occurring A high-rise building is likely to have many AP's set up by various businesses which is likely to cause considerable interference resulting in an unstable connection

QUESTION 48

The network device is configured to send critical events to a syslog server but severity five alerts are not being received from networking devices

ANSWER

The network device is not configured to log that level to the syslog server. Whenever a particular syslog level is configured A system returns all events from that level and more severe

QUESTION 49

When assigned 196.168.1.0/26 as a network, an admin gave a router the following up configurations Ip address: 192.168.1.30 Subnet mask: 255.255.255.224 Gateway: 192.168.1.1 Users on the network immediately lost connectivity what is the most likely reason as to why?

ANSWER

The incorrect IP address was configured A CIDR of /26 is the equivalent of the subnet mask 255.255.255.192

QUESTION 50

Which of the following features would allow us to condense multiple SSID into a single SSID

ANSWER

Seamless roaming Seamless roaming allows you to dynamically connect to different APs as your room through building all of these APs would have the same SSID in order to signify they are the same network

QUESTION 51

Which of the following techniques will help aid with congestion reported by users on networks was large amounts of video and VoIP traffic

ANSWER

Quality of service QoS gives delay sensitive traffic( such as streaming video and voice) A higher priority you are moving through the network this generally works by delaying other sets of traffic slightly in order to give considerable increases to prioritize traffic

QUESTION 52

Which of the following technologies provide a failover for mechanisms for the default gateway

ANSWER

FHRP When multiple routers are used on a LAN you need a protocol which manages a single VIP ( virtual IP) The enables clients to connect to redundant routers as FHRP protocols fill this job perfectly

QUESTION 53

Which of the following devices would be used to manage a corporate WLAN?

ANSWER

A wireless controller

QUESTION 54

A workstation is configured with the following information IP :172.20.5.25 Mask: 172.20.5.0/27 Gateway: 172.20.5.1 Which of the following addresses would represent the broadcast address of this network

ANSWER

172.20.5.31 A /27 network could contain 32 IP address (5.0-5.31) the first address (5.0) is the network ID the last address (5.31) is the broadcast address and all addresses between those are valid assignable hosts (5.1-5.30)

QUESTION 55

And network is experiencing a number of CRC errors during normal operations which of the following layers of the OSI model will likely need troubleshooting?

ANSWER

Layer 2 CRC errors are contained within an ethernet header ( layer2)

QUESTION 56

A network tech is reviewing the interface counters on a routers interface the tech is attempting to confirm a cabling issue given the information below which of the following metrics confirms that there is a cabling issue? CRC's :170 Giants :0 Runts :0 Multicast:12

ANSWER

CRC's CRC's Measure the number of frame errors detected over an interface which could be caused by corrupt data noise ( interference) on the cable or just plain bad cabling

QUESTION 57

Which of the following records can be used to track the number of changes on a DNS zone

ANSWER

SOA Start of authority ( admninstrative DNS info/ for zone transfers)

QUESTION 58

Are use her in a branch office reports that access to all files has been lost after receiving a new PC all other users in the branch can access file shares the IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router but the machine cannot ping the router which of the following is most likely the cause of the incident?

ANSWER

Incorrect subnet mask The machine cannot access files or ping the router which illuminates DNS (which isn't required unless contacting by device name) and TCP port( which would affect a single service) Past that you are more likely to sign the wrong mask which could be a simple typo rather than a different class which would be an entirely different IP range

QUESTION 59

Which of the following ports is commonly used by VoIP phones?

ANSWER

5060 Sip - VoIP setup Process of elimination can be your best friend

QUESTION 60

Which of the following topologies would have the highest number of connections compared to other topologies

ANSWER

Mesh- A mesh network is designed to allow most devices to have redundant connections with most other devices in order to provide a highly available network

QUESTION 61

Which of the following protocols would allow you to install and manage a Windows server in a different building than the one you're currently in

ANSWER

RDP

QUESTION 62

Which of the following is a physical topology for an ethernet LAN?

ANSWER

Star

QUESTION 63

After installing and connecting the on premise equipment for a DSL connection you noticed the modem will not sync which of the following processes should be followed first to troubleshoot the issue

ANSWER

Use a toner probe to identify the circuit Checking the hardware issues is common during any installation you just need to know the right tool for the job

QUESTION 64

Which of the following documents would you help ensure proper versioning is followed and unnecessary upgrades are not made to the equipment

ANSWER

A change management policy

QUESTION 65

Which of the following protocols would be used to resolve an IPv6 address to a MAC address

ANSWER

Neighbor discovery protocol Neighbor discovery serves a purpose the ARP did on IPv4 networks

QUESTION 66

Our new server farm is being set up somewhere in California that are a higher base business plans to migrate to however there will be a years period of time we're both server firms are in use and the sensitivity of our data is a concern which of the following technologies could alleviate our concern

ANSWER

Site to site VPN When going from one physical location to another without a physical connection between the two locations it is always a good idea to utilize encrypted VPN when security is a concern

QUESTION 67

Which of the following tools could be used to detect the exact break point of a fiber optic link

ANSWER

OTDR Optical time domain reflectometer

QUESTION 68

Which of the following DNS records works as an alias to another record

ANSWER

CNAME Alias record

QUESTION 69

Which of the following best represents the concept of connecting to a secure server in order to securely access a second server

ANSWER

A jump box A secure system which is used as a single access point for other systems this hardens remote management of the remote system since access is limited

QUESTION 70

To comply with an industry regulation all communications Dustin to secure server should be logged in archived on a storage device which of the following can be configured to for fill this requirement

ANSWER

Port mirroring Port mirroring allows all traffic to be copied and sent to another device such as secure secure storage device

QUESTION 71

Which of the following IP ranges falls between 169.254.0.0 and 169.254.255.255

ANSWER

APIPA

QUESTION 72

After installing a fiber optic link between routers and using a tool to verify the cable the link does not connect which of the following would explain the issue

ANSWER

They used the wrong type of fiber transceiver Incorrect TX/RX Polarity exists on the link

QUESTION 73

After pulling a new stitch and adding it to the existing network monitoring software do you want to determine which metrics can be gathered from a given switch which of the following should be utilized from the switch

ANSWER

MIB Contains a string of possible metrics that the switch contract

QUESTION 74

Which of the following step should be done after confirming the cause of a problem

ANSWER

Establish a plan of action to resolve the issue and identify potential effects

QUESTION 75

An IT director is setting up a new disaster and HA policies for a company limited downtime is critical to operations to meet corporate requirements for the director set up two different data centers across the country that will stay current on data and applications in the event of an outage the company can immediately switch from one data center to another which of the following does this best describe

ANSWER

Hot site According to comp Tia a hot site is a back up site that can fail over almost immediately and is working with a live data set

QUESTION 76

Which of the following types of devices can provide content filtering and threat protection and manage multiple IPSec site to site connection

ANSWER

Next generation firewall Next generation firewall are firewalls with many capabilities beyond that of a regular firewall they are very similar to UTMs ( many controls in one) that mini allow a company to customize their solution while UTMs are generally bundled products

QUESTION 77

When configuring redundant network links between switches which of the following should be enable to prevent network stability issues

ANSWER

STP Isn't technology which detect potential loops on the network which would otherwise cause broadcast storms. Broadcast storm which is an infinitely repeating broadcast can bring the network down or at least slow it down considerably

QUESTION 78

Which of the following factors should be considered when evaluating a firewall to protect a data center is east west traffic

ANSWER

Replication traffic between an on premise server and a remote back up facility East west traffic is server to server traffic while north south traffic is server to client

QUESTION 79

Despite confirming that all devices are connected to the network throughout the entirety of the day some of your users are reporting intermittent Internet connectivity some users report connectivity and contemporarily re-establish a connection by disconnecting and reconnecting through the web authentication process which of the following steps and most likely determine the cause of this issue

ANSWER

Verify the session time and configuration on the captive portal settings Despite being connected to a wireless network you may not be allowed to access certain networking resources or the Internet depending on the access granted to you by the network many networks are protected by captive portals which are webpages that may ask for additional credentials or knowledge may have a user agreement before you can access the network

QUESTION 80

A use reports being unable to access the network resources after making changes in the office which of the following should be done first

ANSWER

Ask which changes were made Ask for details on the changes made first so that going forward we can make more informed decisions on how to troubleshoot the network

QUESTION 81

Layer 1

ANSWER

Physical Layer

QUESTION 82

Layer 2

ANSWER

Data Link Layer

QUESTION 83

Layer 3

ANSWER

Network Layer

QUESTION 84

Layer 4

ANSWER

Transport Layer

QUESTION 85

Layer 5

ANSWER

Session Layer

QUESTION 86

Layer 6

ANSWER

Presentation Layer

QUESTION 87

Layer 7

ANSWER

Application Layer

QUESTION 88

You Want to have separate Wi-Fi networks for your employees and your guests. Which of the following features should be configures to allow different wireless access through the same equipment

ANSWER

SSID Most modern WAPs can support multiple frequencies/SSIDs in order to facilitate multiple networks. So here we can simply assign on SSID to the corporate network and another SSID for the guest network

QUESTION 89

Which would be the best use to detect MAC spoofing?

ANSWER

Internet Control Message Protocol

QUESTION 90

the chain of connections from a device to a switch on your network is as follows: Device> LC/LC patch cable> Patch Panel> Cross-connect fiber cable> Patch Panel> LC/LC patch cable> Switch Despite using known working patch cables, the connection isn't working and the device has been tested and was working before being installed. Which of the following if the most likely cause of a problem in this connection?

ANSWER

TX/RX was reversed simply reverse the TX/RX on the connector

QUESTION 91

Which of the following types of authentication technologies will allow a single account to be used to access multiple services/applications?

ANSWER

SSO One account that gives access to various/applications

QUESTION 92

Which of the following OSI layers do TCP and UDP operate within?

ANSWER

Transport

QUESTION 93

The length of an IPv6 address is?

ANSWER

128 bits

QUESTION 94

A network admin wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?

ANSWER

192.1.0.124/30

QUESTION 95

What best describes the function of OSI layer 3

ANSWER

Provides connectionless communication using logical addresses

QUESTION 96

You are reviewing a network diagram and are looking for the edge router. What is MOST likely symbol used for a router?

ANSWER

a Circle with 4 outward arrows

QUESTION 97

A company is implementing IPv6 addressing and wants to ensure there are consistent addresses for printers and servers that will not change. However, the company does not want to use static addresses. Which of the following IPv6 schemes will provide the same address for the devices?

ANSWER

EUI-64

QUESTION 98

the length of a MAC address is?

ANSWER

6 bytes 48 bits, aka 6 bytes (1B=8b)

QUESTION 99

what is the default mask for the IP address 190.25.250.10?

ANSWER

/16 since the first octet is 190 this is a class B address. Class B addresses use a default of /16 (aka 255.255.0.0)

QUESTION 100

class A address

ANSWER

1-126

QUESTION 101

class b address

ANSWER

128-191

QUESTION 102

class c address

ANSWER

192-223

QUESTION 103

class d address

ANSWER

224-239

QUESTION 104

class e address

ANSWER

240-255

QUESTION 105

Which of the following CIDR matches the IPv4 VLSM? Choose all that apply

ANSWER

/21 is 255.255.248.0 /30 is 255.255.255.252

QUESTION 106

which of the following OSI model layers is responsible for ensuring proper transmission of frames using a frame-check-sequence value?

ANSWER

Layer 2- Data Link Frames are found on Layer 2

QUESTION 107

the length of an IPv4 address is?

ANSWER

32 bits

QUESTION 108

what best describes the function of OSI Layer 2?

ANSWER

provides error detection through the FCS for frames transmitted

QUESTION 109

host alpha has an IP address of 192.168.35.209 and is part of the 19.2168.35.192 subnet. If the options below, which mask would be correct?

ANSWER

255.255.255.224 explanation is on PowerPoint 100 if needed

QUESTION 110

a network tech is reviewing a network diagram and is looking for Layer 2 switch. What symbol should they be looking for?

ANSWER

a rectangle with 2 horizontal arrows

QUESTION 111

a senior engineer has asked you to create several subnet out of the provided/25 network. Each department will need their own subnet and they should be no larger than necessary. What CIDR notations would be needed for each department? Ops: 52 Hosts, Marketing: 28 host, Admin:13 hosts, IT: 7 hosts

ANSWER

Ops/26, Marketing/27, Admin/28, IT/28

QUESTION 112

Which of the following OSI model layers is responsible for compression and data encoding?

ANSWER

Presentation

QUESTION 113

of the devices listed which will provide a high number of interfaces and offer routing services for a LAN?

ANSWER

Multilayer Switch

QUESTION 114

Which of the following would act ad a standalone star network with a layer 1 network device?

ANSWER

4 PCs all connected to a single hub, and nothing else. a hub is a layer 1 device

QUESTION 115

a firewall as configures with a role that forwards FTP traffic to an internal server that is listening on a non-standard port. What best describes the rule configured on this firewall?

ANSWER

PAT They are describing a process known as ' port forwarding' which is considered a component of PAT

QUESTION 116

To support redundancy at Company A, all care switches are connected to each other. What type of network topology is being utilized?

ANSWER

Mesh

QUESTION 117

what is the best reason for using wireless mesh topology to support IoT sensors?

ANSWER

It creates various paths to a particular destination

QUESTION 118

in the event of WAN outage, or configuration error, you may be required to remotely reconfigure a company router. What method would best provide access in this situation?

ANSWER

Out-of-band The WAN connection would be considered 'in-band' because WAN traffic passes through the router. If we want to access this router even when the WAN connection is down, we will need an out-of-band connection

QUESTION 119

a new device transmits data into a stich for the first time. Which of the statements below is true?

ANSWER

Data is flooded out of every port in that VLAN, except the one it came in on

QUESTION 120

A network engineer has been assigned the replace a failed router. The network already has a switch, cable modem and static IP assignments. furthermore, there is a web server running on this network that should remain available to the internet. What is the correct configuration and placement for the devices above?

ANSWER

The modem is places in bridge mode, the router is places behind the modem and the web server is places behind the router.

QUESTION 121

A network engineer is reviewing a network statistics and notices a nigh level of collisions between a switch and a PC. What is the most likely source of this issue?

ANSWER

The PC's NIC and/or the switchport are set to half-duplex

QUESTION 122

Which addresses are routable over the internet without using any form of NAT?

ANSWER

172.35.10.250 this is a public address!

QUESTION 123

Which of the following would a network tech most likely connect to power wireless access points in drop ceilings?

ANSWER

Power-over-ethernet switch

QUESTION 124

A nearby city offers wireless internet access throughout the public areas. What type of network is this?

ANSWER

MAN

QUESTION 125

Data has been stored locally on a subnet for access by several employee devices. What is being described in this situation?

ANSWER

NAS

QUESTION 126

A network engineer is adjusting the network settings on a server. They issue the following command: route add 0.0.0.0 mask 0.0.0.0 10.1.5.1 metric1 what setting has the engineer attempted to alter?

ANSWER

They have set a default gateway

QUESTION 127

A switch without and VLANs receives a frame with a destination address of FF:FF:FF:FF:FF:FF. What will the switch do with this frame?

ANSWER

Flood the frame out all interfaces except the one it was received on

QUESTION 128

Which of the following technologies should be used in high-throughput networks to reduce networks overhead?

ANSWER

Jumbo Frames

QUESTION 129

A network engineer is asked to create a solution that will serve the data needs of the entire company. There are 3000+ users and the data must remain onsite. What option listed below would meet these conditions

ANSWER

SAN

QUESTION 130

You receive a switch that has VLANs configured on all of its ports. At what layer is the switch operating?

ANSWER

Layer 2

QUESTION 131

What protocol uses BPDUs to detect loops on Layer 2 of the OSI model?

ANSWER

STP

QUESTION 132

A network technician needs to monitor the traffic going into a mission-critical in the datacenter. Which of the following is the best method to perform this?

ANSWER

Use port mirroring

QUESTION 133

You've been tasked with connecting two hubs together. To avoid problems that would arise from increasing the size of the collision domain, what device should you use to connect the hubs together?

ANSWER

Bridge

QUESTION 134

After a broadcast storm that brought down the corporate network a technician has ben asked to install hardware to mitigate this risk in the future. What could be installed to accomplish this assignment? ( pick 2)

ANSWER

Gateway Bridge

QUESTION 135

A switch is to be configured so that it can carry five VLANs over a single physical link. What type of port can facilitate this?

ANSWER

a trunk port

QUESTION 136

An eight port switch was configures to have three VLANs. Of the eight ports on the back of the switch, one was designates a trunk port, while the other seven where each assigned to only one LVAN. What type of port is only assigned to a single VLAN?

ANSWER

An Access port

QUESTION 137

Users report the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?

ANSWER

Layer 3 Switch

QUESTION 138

The corporate network consists of 3 switches, a router, and a hub. The switches are connected together in a chain, to a single port on the router. Each of the switches had 8 ports. coming off the second switch is a hub, which has 4 computers attached to it. How many broadcast domains exist in the corporate network?

ANSWER

1

QUESTION 139

A manager wants to deploy a syslog server on the network. What benefit would a syslog server provide to the company?

ANSWER

Aggregates switch logs for easier review and correlation

QUESTION 140

A new server has ben deployed in the cloud that does not support a GUI. Which of the following could be used to star a secure remote console session with this server?

ANSWER

SSH- is encrypted

QUESTION 141

You discover that an employee's PC is not receiving an IP address via DDHCP. An change log outlines that the PC'S had its OS Patches and a new NIC installed (1Gbps), to replace an older slower card (100Mbps) The user is a member of a group that accesses a server hidden behind a firewall. Other group members are not having a problem and the switchports are up and set for auto negotiate. What is the MOST likely problem?

ANSWER

The PC had DHCP reservation which is invalidated by the new NIC.

QUESTION 142

Of the options below, What could be used translate and tie in legacy phones into a VoIP solution?

ANSWER

VoIP Gateway Is used to bridge (connect) legacy phones into a VoIP deployment, Typically this gateway is connected to the physical (legacy) PBX.

QUESTION 143

Your organization just moved to a cloud based email service. Many email recipients are complaining that any email sent from the organization is going into the junk folder because the sends identity cannot be confirmed. Which of the following DNS record should be modified to minimize this problem?

ANSWER

TXT

QUESTION 144

You already have a DNS record that resolved ABC.123.net to your company's webserver. You would like a new DNS record to allow DEF.123.net to point to the same IP as ABC.123.net. What type of DNS record needs to be created to facilitate this?

ANSWER

CNAME Is a type of DNS record that maps an alternative name to a true or 'canonical' domain name.

QUESTION 145

Over the summer a college has been hosting one dat training exercises, from Monday to Friday, with guests and students. Each day there are 250 attendees, most of which are new, and they all need access to the guest Wi-Fi. The guest network uses a /24 subnet. On Tuesday several users complain that the Wi-Fi is unavailable, The complaints increase the following day. What could be done to prevent this issue from occurring in the future?

ANSWER

Reduce DHCP lease time form 8 days to 8 hours

QUESTION 146

To prevent outgoing emails as being categorized as spam, which of the DMS records below should be updated with the organization's SPF information?

ANSWER

TXT SPF allows the receiving mail server to check during mail delivery that a mail claiming to come from a specific domain is submitted by an IP address authorized by that domains administrators. This mechanism helps detect spam! The list of authorized sending hosts and IP addresses for a domain is published in the DNS-TXT record for that domain.

QUESTION 147

Which protocol is used to send out emails across a network infrastructure or between email servers?

ANSWER

SMTP

QUESTION 148

When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?

ANSWER

MIB

QUESTION 149

What ports can be used for email ( pick 3)

ANSWER

25- smtp 143- imap 110-pop SMTP= Simple Mail Transfer Protocol. emails coming into an email server, or going between servers. IMAP= Instant Messaging Access Protocol. for viewing emails as they exist on the email server. POP= Post Office Protocol For downloading emails from the email server

QUESTION 150

Which of the following cloud service models would best support an organization looking to have a hosted database, such as SQL or Oracle?

ANSWER

PaaS ( Platform as a Service): typically used to provide development and database platforms for developers or database admins

QUESTION 151

A cloud storage server has been brought online that is intended to serve hospitals exclusively. Several hospitals, all owned by different entities, have begun using this highly secured cloud server. What type of cloud deployment model matches this type of server?

ANSWER

Community A community cloud is shared by a group of similar organizations that all have similar needs. In this example, it is a server built only to serve hospitals.

QUESTION 152

Which of the following is configured on a network device to enable hosts to receive the proper DHCP configuration if the server is on a different subnet

ANSWER

IP helper

QUESTION 153

Which of the following is the most likely cause for network PC to have an APIPA address?

ANSWER

DHCP failure APIPA stands for Automatically Procured IP Address . In Windows, APIPA addresses are 169.54.X.X unless configured otherwise. An APIPA is the address a computer will give itself if the DHCP server is unreachable. Windows will retry to contact the DHCP server every five minutes until it gets a response.

QUESTION 154

Several computers in a factory need to be connected together. What medium would be acceptable for short distances and also the most cost effective?

ANSWER

BNC and a RG-59 cable RG-59 cables (coaxial) are only good for short distances, and can have BNC connectors! Plenum cables are expensive! ST, a fiber connector, shoulder be put on a UTP cable (copper) RJ11 is for terminating phone lines and shoulder be attached to a Cat 6 cable

QUESTION 155

At IT company is installing WAPs in a new business complex. Some of the network cables must run above the drop ceiling and through or near are condition ducts. What type of cable would be best suited for this need?

ANSWER

Plenum

QUESTION 156

To connect the new serve to the switch a pair of Cat5e cables had to be coupled together. By themselves, each cable was 200 feet (61 Meters) long. Users have been reporting an intermittent loss of connectivity to the server. What is the most likely cause of this problem?

ANSWER

Attenuation

QUESTION 157

Where is an office building would a network tech find the entry point for the ISP?

ANSWER

Demarc

QUESTION 158

The company has deployed a network storage solution to support future growth. What types of connections can be used that will not require new network cables and dedicated switches? ( pick 2)

ANSWER

FCoE, PATA

QUESTION 159

An organization is moving into an office that was unused for several years. While continuing to use the infrastructure already in place, several employees report that the network connections, workstations, and switches are rated for 100Mbps, and set to auto-negotiate. What is most likely the issue with the slow speeds?

ANSWER

Employees are connected to a hub

QUESTION 160

Two Cat5e cables need to be connected together to tie in a new workstation. Each cable is 200 feet (61 meters) long. Instead of using a coupler, what should be used to connect the cables together to avoid attenuation?

ANSWER

Bridge

QUESTION 161

A technician is installing a remote call box that requires a single copper ethernet connection. The uplink rom the business network is over single-mode fiber. Which of the following devices should be installed to bet facilitate the connection?

ANSWER

Media Converter

QUESTION 162

Tyler connected his laptop directly to Joe's laptop that has a gigabit Ethernet port, using a straight-through cable. Through this connection he successfully transferred several large files. Later, Tyler directly connected to a desktop that has a 10/100 ethernet port, but was unable to establish a connection using the same cable. What best describes the cause of this problem?

ANSWER

Tyler's laptop does not support auto- MDIX We don't know what type of NIC is in Tyler's Laptop. What we do know: when one side is a non-gigabit standard, like when Tyler connected to the desktop, we need to use a crossover cable. Alternatively is one side of the connection supports auto- MDIX that device can reconfigure itself to support a straight-through cable even when it should be crossover. The only answer then is that both Tyler's laptop, and the desktop, lack auto-MDIX. Lastly, auto-MDIX is built into the gigabit ethernet standard, so its safe to assume gigabit ethernet ports have auto-MDIX

QUESTION 163

a PoE phone is not receiving power at the employees desk. A network engineer tests the network components with a PoE injector at the switch and this resolves the issue. Which of the following was the most likely cause of the problem?

ANSWER

Bad Switchport

QUESTION 164

A series of WAPs are being deployed around the corporate campus to provide better Wi-Fi coverage. The placement of one of the APs required the network cable to be run alongside power cables that pass through a conduit. What type of cable would be the best fit for this situation?

ANSWER

STP

QUESTION 165

A company requires an ethernet cable capable of providing 1Gpbs for the lowest possible cost. Of the options below, what cable standard should they select?

ANSWER

Cat 5e 1 Gbps (older and cheaper than CAT 6)

QUESTION 166

What type of cable would most likely be terminated with an F connector?

ANSWER

RG-6 A coaxial cable, such as RG-6, can be terminated with either a BNC or F connector.

QUESTION 167

Which of the following cable types should be used to connect a cable modem to a SOHO router?

ANSWER

Ethernet

QUESTION 168

which of the following connector types is used to terminate household telephone cabling?

ANSWER

RJ-11 used for phones RJ-11 had 4 copper wires.

QUESTION 169

Of the internet connections below, which is the fastest?

ANSWER

Cable. Cable can support up to 10 Gbps down, 1 Gbps up when running the latest version of DOCSIS. The others max out before they even reach 1 Gbps

QUESTION 170

Joe needs a WAP that can support speeds of at least 1Gbps.Which of the following standard will meet Joe's needs?

ANSWER

802.11ac

QUESTION 171

Which Wi-fi security mode utilizes TKIP for its encryption?

ANSWER

WPA

QUESTION 172

The organization WLAN offers complete 2.4 and 5.0 Ghz network, are connected to the crowded 2.4 Ghz network. What technology could be deployed to better distribute more users to the faster and less congested 5Ghz network?

ANSWER

Band Steering

QUESTION 173

An employee is attempting to use a video conferencing app from the company's meeting room on the second floor. However, they report that the WiFi occasionally stops working during the video calls. The signal strength is reported as being -75dBm. What should be installed to resolve this issue?

ANSWER

A range extender With -75dBm , our signal is too weak to sustain a reliable streaming session. If we want to install something to resolve this issue, we need another access point The closer to zero the better our single

QUESTION 174

A network built in bridge mode contains 802.11g, 802.11n and 802.11 ac access points. What speeds would this wireless network perform at?

ANSWER

54 Mbs

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials