Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vendor: CompTIA Exam Code: N10-006

Similar presentations


Presentation on theme: "Vendor: CompTIA Exam Code: N10-006"— Presentation transcript:

1 Vendor: CompTIA Exam Code: N10-006 Exam Name: CompTIA Network+ Certification Exam Version:

2 QUESTION 1 Which of the following would a technician do to monitor remote traffic through an access point? Enable an SNMP agent Enable network mapping Set monitoring SSID Select WPA2 Answer: A Explanation: Large networks with hundreds or thousands of nodes are difficult to manage without a large staff to monitor every computer. SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS). QUESTION 2 Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable? nmap nbtstat dig arp Answer: C The commanddigis a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux (Unix) or Macintosh OS X operating system. The most typical use of dig is to simply query a single host. QUESTION 3 Which of the following standards can operate at either 20MHz or 40MHz channel spacing? A a B b C g D n Answer: D The 2.4 GHz ISM band is fairly congested. With n, there is the option to double the bandwidth per channel to 40 MHz which results in slightly more than double the data rate. However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band, which in many areas may prove to be infeasible. The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacent channel spaced ?0 MHz away. The primary channel is used for communications with clients incapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean of the primary and secondary channels. 2

3 QUESTION 4 A client's computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client's machine? ipconfig nslookup dig tracert Answer: A Explanation: ipconfigis a commmand line utility available on all versions of Microsoft Windows starting with Windows NT. ipconfig is designed to be run from the Windows command prompt. This utility allows you to get the IP address information of a Windows computer. It also allows some control over active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility. QUESTION 5 A user's computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working? nbstat arp Answer: C nslookupis a network utility program used to obtain information about Internet servers. As its name suggests, the utility finds name server information for domains by querying DNS. QUESTION 6 Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable? Cable has been looped too many times. Cable has a twist tie attached too close to the connector. Cable is too warm. Cable is run too close to a fluorescent light. Answer: D Explanation: Cat 5is a twisted pair cablefor carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). QUESTION 7 Given a subnet mask of , how many usable IP addresses would be in that subnet? A. 250 B. 254 3

4 4 C. 255 D. 256 Answer: B Explanation:
TheSubnet Maskhowever, determines the "class" of a Network is a "Class C" network.A class c network can host up to 254 pc's QUESTION 8 On which of the following OSI model layers would a MAC address be used? Network Data Link Transport Physical The ITU-TG.hnstandard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of aselective repeatSliding Window Protocol. QUESTION 9 Joe, a network technician, is troubleshooting in a wiring closet in The cabling to all the equipment does not match the documentation from Which of the following configuration management methods has been overlooked? Change management System logs Asset management Baselining Answer: A Change management is the request for to change any configuration which is documented. QUESTION 10 Which of the following TCP/IP model layers does the OSI model Presentation layer map to? Internet Application Network Interface Answer: C TheApplication layerprovides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed. 4

5 QUESTION 11 Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope? Reservations Lease times Removing IPs from the active leases Configuring the DNS options Answer: A Explanation: Reservationsare permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. QUESTION 12 A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? STP PoE VTP trunking Port forwarding Answer: B Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras. QUESTION 13 Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions? Redundancy Fault tolerance Unified communications Uptime requirements Answer: C In unified communication video,voice,data have only one end gateway so to give priority to avoid delay in voice and video we use Qos. QUESTION 14 Which of the following uses SSL encryption? SMTP FTP 5

6 6 HTTPS SNMP Answer: C Explanation:
HTTPSis the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. QUESTION 15 Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem? DDOS Cross talk Open short EMI Answer: D External Machine Interface (EMI), an extension to Universal Computer Protocol (UCP), is a protocol primarily used to connect to short message service centres (SMSCs) for mobile telephones. QUESTION 16 Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step? Test the theory Establish a plan of action Establish a theory Document findings As to prove the cause of problem documents need to be attached so document finding is the first step after we implemented and diagnosed that problem. QUESTION 17 A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology? Verify full system functionality Identify the problem Implement the solution Establish a theory means to correlate the finding and cause of a problem in order to fix the 6

7 problem. QUESTION 18 Spanning-Tree Protocol is used with which of the following network devices? Router NIC Switch DHCP server Answer: C Explanation: Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network. QUESTION 19 In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods? Load balancing Quality of service Fault tolerance Traffic shaping Answer: B In unified communication video, voice, data have only one end gateway so to give priority to avoid delay in voice and video we use Qos. QUESTION 20 The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem? Incorrect service set identifier Low signal strength or interference Incorrect encryption scheme Incorrect IP address or subnet mask This generally happens when the signals are weak in any particular area and any movement can make you lose connectivity to the internet. In this case you can try to increase the radio power so that the signal strength can be increased. QUESTION 21 A technician wants to separate networks on a switch. Which of the following should be configured to allow this? 7

8 8 VLAN Trunking Spanning tree Traffic filtering Answer: A Explanation:
A VLAN is a group of end stations in a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. QUESTION 22 A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester: Which of the following should the technician do NEXT? Cable is a crossover, continue troubleshooting Pin 3 is not used for data, continue troubleshooting Pin 3 is not used for data, replace the NIC Redo the cable's connectors Answer: D QUESTION 23 A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO). Routing table Next hop Port mirroring Port monitoring VLANs Answer: CE Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion detection system, passive probe or real user monitoring (RUM) technology that is used to support application performance management (APM). 8

9 In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or VLAN. QUESTION 24 A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds? Change management Baselines Asset management Cable management Answer: A Explanation: As soon as technician found a problem he generates a change management request to make changes to fast up the speed of router. QUESTION 25 Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter? Multimode fiber Setting up a new hot site Central KVM system Central UPS system Answer: D For unintruppted power supply we need ups as from this no power issue will come and our systems will remain safe. QUESTION 26 During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario? WPA2, SSID enabled, and n. WEP, SSID enabled, and b. WEP, SSID disabled, and g. WPA2, SSID disabled, and a. WPA2 is a security technology commonly used on Wi-Fi wireless networks. WPA2 (Wireless Protected Access 2) replaced the original WPA technology on all certified Wi-Fi hardware since and is based on the IEEE i technology standard for data encryption. 9

10 QUESTION 27 Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling? MDF 66 block IDF Patch panel Answer: D Explanation: A patch panel, patch bay, patch field or jack field is a number of circuits, usually of the same or similar type, which appear on jacks for monitoring, interconnecting, and testing circuits in a convenient, flexible manner. QUESTION 28 Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet? MAC filtering RAS SSL VPN L2TP Answer: C SSL VPN consists of one or more VPN devices to which the user connects by using his Web browser. The traffic between the Web browser and the SSL VPN device is encrypted with the SSL protocol or its successor, the Transport Layer Security (TLS) protocol. QUESTION 29 Which of the following is the difference between b and g? Distance Frequency Speed Transmission power 802.11b has a maximum speed of 11Mbps whereas g has a speed of 54Mbps. QUESTION 30 Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party? Ping Protocol analyzer 10

11 11 Tracert Dig Answer: C Explanation:
Tracet command will tell the administrator which route is not present or which is present so he will come to know whether he has appropriate route or not. QUESTION 31 A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used? Packet sniffer Stateless firewall Packet filter Stateful firewall Answer: D Stateful firewall keeps track of the state of network connections (such asTCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected. QUESTION 32 In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in n? MIMO, DSSS MIMO, OFDM CSMA, DSSS CSMA, CDMA Answer: B 802.11n builds upon previous standards by adding multiple-input multiple- output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) QUESTION 33 A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality? RADIUS Single sign on Multifactor authentication Two-factor authentication 11

12 12 Answer: B Explanation:
Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. QUESTION 34 A strong network firewall would likely support which of the following security features for controlling access? (Select TWO). War driving War chalking MAC filtering FTP bouncing Port filtering Answer: CE MAC filtering set the security level at layer 2 and port filtering will set the security level on layer 4 so by filtering the traffic on both layers our network will get secure. QUESTION 35 A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation? UTP Plenum Coaxial STP Answer: D Shielded twisted pair is a special kind of copper telephone wiring used in some business installations. An outer covering or shield is added to the ordinary twisted pair telephone wires; the shield functions as a ground. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each signal on twisted pair requires both wires QUESTION 36 Which of the following wireless standards provide speeds up to 150Mbps? A a B b C g D n 12

13 802.11n builds upon previous standards by adding multiple-input multiple- output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) QUESTION 37 Which of the following defines a rack located in an office building between the main rack and other office equipment? DSU MDF CSU IDF Answer: D Explanation: An intermediate distribution frame (IDF) is a distribution frame in a central office or customer premises, which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. IDFs are used for telephone exchange central office, customer-premise equipment, wide area network (WAN), and local area network (LAN) environments, among others. QUESTION 38 Which of the following connectors is usable in SFP modules? ST LC LX SX Answer: B LC connector is used in SFP modules. QUESTION 39 A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering? CAT5e connection between offices via the patch panel located in building's communication closet. CAT5e cable run through ceiling in the public space between offices. VPN between routers located in each office space. A WEP encrypted wireless bridge with directional antennae between offices. Answer: C A VPN connection across the Internet is similar to a wide area network (WAN) link between the sites. From a user perspective, the extended network resources are accessed in the same way as resources available from the private network. 13

14 QUESTION 40 Which of the following would MOST likely be used by a network administrator to test DNS resolution? dig ipconfig netstat nbtstat Answer: A Explanation: The commanddigis a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux (Unix) or Macintosh OS X operating system. The most typical use of dig is to simply query a single host. QUESTION 41 A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts? MAC spoofing Dynamic IPs MAC filtering Static IPs Answer: D To give every user same ip every time because we have to document that ip slot we use static ip configuration. QUESTION 42 A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration? Protocol analyzer nslookup tracert Answer: B ipconfigis a commmand line utility available on all versions of Microsoft Windows starting with Windows NT. ipconfig is designed to be run from the Windows command prompt. This utility allows you to get the IP address information of a Windows computer. It also allows some control over active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility. QUESTION 43 14

15 A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem? Incompatible network card Channel overlap Latency WEP encryption Answer: B Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The b standard reserves 14 frequency channels for use with wireless APs. QUESTION 44 Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows: IP address: Subnet Mask: Default Gateway: Which is MOST likely preventing the user from accessing the Internet? Duplicate IP address Incorrect gateway Incorrect VLAN Bad switch port We usually give default gateway as an end device which is directly connected with ISP so in this case user has lost his connectivity with due to wrong default gateway configured. QUESTION 45 A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE). WEP PoE VLANs SSL VPN IDS QoS Answer: BCF 15

16 As customer don't want to use Ac adapter so Power over Ethernet is best option (PoE) as in this switch provide power to phones.Phones will transfer their power requirement via cdp to vlan assigned.And Qos provide the voice packet priority over the data packets to avoid jitter. QUESTION 46 A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network? Change the SSID to match other wireless networks for increased throughput. Change the encryption type to a different mechanism to avoid interference. Change the channel to a different channel than the other wireless networks. Change the WAP to a different manufacturer than the other wireless networks. Answer: C Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The b standard reserves 14 frequency channels for use with wireless APs. You can use any other channel instead of the one that you are using. QUESTION 47 Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside? Presentation Application Physical Session Answer: D QUESTION 48 A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP? NetBIOS name filtering IP address filtering MAC address filtering Computer name filtering MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have 16

17 a whitelist entry for each device that he or she would use to access the network.
QUESTION 49 Which of the following is the common port used for IMAP? 25 53 C. 143 D. 443 Answer: C Explanation: The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an client to access on a remote mail server. The current version, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC An IMAP server typically listens on well-known port 143 QUESTION 50 A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch? WINS QoS NAT DHCP Answer: B Qos provide the voice packet priority over the data packets to avoid jitter and delay. QUESTION 51 Which of the following network protocols is used to resolve FQDNs to IP addresses? DNS FTP APIPA Answer: A An Internet service that translatesdomain namesinto IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain namewww.example.commight translate to QUESTION 52 Which of the following network protocols is used for a secure command line interface for management of network devices? 17

18 18 SSH TELNET IGMP HTTP Answer: A Explanation:
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. QUESTION 53 Which of the following network protocols is used to transport between servers? IMAP4 POP3 SNMP SMTP Answer: D While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying QUESTION 54 A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT? Establish a plan of action to resolve the problem. Test the theory to determine a cause. Re-establish a new theory or escalate. Implement the solution or escalate as necessary. Answer: C As first theorey doesn't work he will establish a new theorey or escalate it to the vendor hardware company to work on it. QUESTION 55 Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? The signal strength has been degraded and latency is increasing hop count. An incorrect subnet mask has been entered in the WAP configuration. The signal strength has been degraded and packets are being lost. 18

19 D. Users have specified the wrong encryption type and routes are being rejected.
Answer: B Explanation: Due to wrong subnet entered user is unable to communicate with anyone so to communicate he needs to be in right subnet. QUESTION 56 An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25? SMTP SSH DNS TELNET Answer: A Port no. 25 is assigned to smtp as documented by iana. QUESTION 57 Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect? Create a MAC filter containing the current users. Turn off SSID broadcast. Change the encryption type to AES 256-bit for current users. Reduce the signal strength to 0 percent. MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. QUESTION 58 Which of the following should be used when throughput to the destination network is a priority? MTU Hop count Reliability of the path Bandwidth Answer: D 19

20 QUESTION 59 Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification? ping netstat route arp Answer: A Explanation: Pingis a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. QUESTION 60 A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user's PC? System log History log Network sniffer Nslookup Answer: C Network snifferis a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications. QUESTION 61 A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied? TCP SMTP ICMP ARP TheInternet Control Message Protocol(ICMP) is one of the core protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages. It is assigned protocol number 1. 20

21 QUESTION 62 A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error? Implicit deny HTTP transports over UDP Website is down DNS server failure Answer: A Explanation: In a network firewall ruleset if a certain type of traffic isn't identified it will be denied or stopped by Implicit Deny. QUESTION 63 The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location? Smart jack MDF VPN 66 block Answer: B Short for main distribution frame, a cable rack that interconnects and manages the telecommunications wiring between itself and any number of IDFs. Unlike an IDF, which connects internal lines to the MDF, the MDF connects private or public lines coming into a building with the internal network. QUESTION 64 A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure? Reduce the power input on the replacement servers. Cover the servers with plastic tarps. Purchase twice as many servers to create high availability clusters. Transfer the replacement servers offsite to a data center. Answer: D As we replace replacement servers offsite to datacenter this will cause lower traffic on over lan and will not cause failure of these server also. QUESTION 65 Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network? 21

22 22 Evil twin Honeypot DMZ Honeynet Answer: B Explanation:
In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. QUESTION 66 Which of the following is the FASTEST Ethernet technology? 10GBaseSR 10BaseT 100BaseFX 1000BaseT Answer: A 10GBASE-SR ("short range") is a port type for multi-mode fiber and uses 850 nm lasers. Its Physical Coding Sublayer 64b/66b PCS is defined in IEEE Clause 49 and its Physical Medium Dependent PMD in Clause 52. It delivers serialized data at a line rate of Gbit/s. QUESTION 67 A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal? Use content filtering Install and configure IDS Enable MAC address filtering Enable RAS on the network firewall Answer: C Most Wi-Fi access points and routers ship with a feature calledhardwareorMAC address filtering . This feature is normally turned "off" by the manufacturer, because it requires a bit of effort to set up properly. However, to improve the security of your Wi-Fi LAN (WLAN), strongly consider enabling and using MAC address filtering. QUESTION 68 Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective? Content filtering Port filtering MAC filtering IP filtering 22

23 23 Answer: B Explanation:
TCP/IPport filteringis the practice of selectively enabling or disabling Transmission Control Protocol (TCP) ports and User Datagram Protocol (UDP) ports on computers or network devices. When used in conjunction with other security practices, such as deploying firewall software at your Internet access point, applying port filters to intranet and Internet servers insulates those servers from many TCP/IP-based security attacks, including internal attacks by malicious users. QUESTION 69 Companies trying to cut suspected virus activity on the network IP addresses could use which of the following? Longer lease times More reservations Larger scopes Dynamic IP addressing Answer: D In Dynamic IP addressing all the hosts with private ip address will be patted to the same ip so the administrator will not have to keep track of each and every host with private ip mapped to a static public ip address. QUESTION 70 Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher's station, a few feet away, to the same hub. The teacher is experiencing no network connectivity. Which of the following is MOST likely the problem? Cross-talk Split cables Distance EMI Asplit cableis invisible to wire maps and continuity testers, making it very difficult to troubleshoot. QUESTION 71 A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST? arp ipconfig tracert route As from ipconfig command technician will come to know wheather he has assigned right ip 23

24 24 address to NIC or not. QUESTION 72
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools? NMAP ping nslookup tracert Answer: D Explanation: traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. QUESTION 73 A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers? TACACS+ SNMP Syslog DOCSIS Answer: B SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS). QUESTION 74 Which of the following network topologies describes a network where each node is connected to every other node? Bus Star Mesh Ring Answer: C In a true mesh topology every node has a connection to every other node in the network. QUESTION 75 Which of the following DHCP properties defines the size of the pool of available IP addresses? A. Options 24

25 25 Scope Leases Reservations Answer: B Explanation:
A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service. QUESTION 76 Which of the following supports faster wireless broadband speeds? Satellite WiMAX ISDN OC-3 Wi-MAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates with the 2011 update providing up to 1 G bit/s for fixed stations QUESTION 77 A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem? The network cable connecting the NAS to the network switch is bad. The network port that the appliance is connected to is assigned to the wrong VLAN. Port security on the Ethernet switch has disabled the port. Firewall needs to be updated for the new NAS device. Answer: C As by port security switch find the changes in mac address because nic is replaced so due to security reason switch shut that port. QUESTION 78 A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement? EAP-PEAP MAC ACL EAP-TTLS MS-CHAPv2 Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in 25

26 wireless networks and Point-to-Point connections
wireless networks and Point-to-Point connections. EAP is an authentication framework providing for the transport and usage of keying material and parameters generated by EAP methods. QUESTION 79 A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP? WPA WPA2 WEP VPN Answer: C Explanation: Wired Equivalent Privacy(WEP) is a security algorithm for IEEE wireless networks. Introduced as part of the original standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network.WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools QUESTION 80 Which of the following protocols works at the LOWEST layer of the OSI model? L2TP PPTP ISAKMP IPSec Answer: A Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. QUESTION 81 A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? WAP placement TX/RX channel Signal strength Transmission power Before going ahead with the deployment, the first thing that need to be check is where you are going to place your wireless router so that you can have internet connectivity from every location that you need. 26

27 QUESTION 82 A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO). SNMP Network sniffer Syslog System log History log Answer: AC Explanation: Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Syslog is a standard for computer message logging. It permits separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. QUESTION 83 Which of the following network appliances will only detect and not prevent malicious network activity? IDS IPS Firewall Answer: A Anintrusion detection system(IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. QUESTION 84 Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this? Decreasing radio strength MAC filtering WEP encryption SSID broadcast disable Decreasing Radio Strength will reduce signal strength outside the house and will accomplish what she is intending to do.

28 QUESTION 85 A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application? Network maps Traffic analysis Syslog ICMP Answer: B Explanation: By traffic analysis administrator will come to wheather user are using bandwidth for right purpose or not. QUESTION 86 An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection? RDP RTP RIP RAS Answer: A Remote Desktop Protocol(RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. QUESTION 87 A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue? SMTP SNTP SNMP SNAT Answer: C SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS). QUESTION 88 Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would

29 BEST help Joe? Web server Syslog Network sniffer SNMP Answer: C Explanation: Network sniffer is a tool to analyze packets that are being exchanged between the hosts and using this Joe can understand whether there was traffic encountered to server or not which was infected. QUESTION 89 When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network? ping nbstat arp msconfig Answer: B TheNbstatcommand is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tables for both local and remote computers. QUESTION 90 Which of the following WAN technologies has the HIGHEST latency? ADSL LTE Satellite WiMAX Satellite WAN latency is the delay caused by the physical distance a signal must travel from earth, to the satellite, and back to earth to complete a round-trip transmission. Because of the physics involved in the round-trip-time (RTT), end-to-end latency can take 600 milliseconds or more due to geosynchronous satellites orbiting miles above the earth. QUESTION 91 Which of the following connectors are MOST commonly used on a POTS line? RJ-45 MTRJ DB-9 RJ-11

30 Answer: D Explanation: The six-position plug and jack commonly used for telephone line connections may be used for RJ11, RJ14 or even RJ25, all of which are actually names of interface standards that use this physical connector. The RJ11 standard dictates a 2-wire connection, while RJ14 uses a 4-wire configuration, and RJ25 uses all six wires. The RJ abbreviations, though, only pertain to the wiring of the jack (hence the name "registered jack"); it is commonplace but not strictly correct to refer to an unwired plug connector by any of these names. Typically you'll find the RJ-11 and RJ- 14 on your Plain Old Telephone Service (POTS) QUESTION 92 Which of the following cable types is required to run through an air duct? UTP Fiber PVC Plenum Plenum rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any "air handling" space. For example, most large office buildings use the ceiling to return air to the AC unit. This qualifies this ceiling as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. QUESTION 93 Which of the following technologies can cause interference for g? A. RADAR B a IrDA Bluetooth This wireless communication standard has a maximum transmission speed of 54 Mbits per second and a typical indoor range of 30 meters. It uses the 2.4 GHz band. This band may have to deal with interference from cordless telephones, Bluetooth devices, and various appliances. QUESTION 94 A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem? Low PoE wattage Opposing antenna polarizations Short distance between antennas WPA 2 encryption Answer: B

31 The polarization of an antenna is the orientation of the electric field (E-plane) of the radio wave with respect to the Earth's surface and is determined by the physical structure of the antenna and by its orientation. It has nothing in common with antenna directionality terms: "horizontal", "vertical", and "circular". Thus, a simple straight wire antenna will have one polarization when mounted vertically, and a different polarization when mounted horizontally. QUESTION 95 Which of the following reduces the deployment cost of a wireless LAN? A. WPA B x MIMO PoE Answer: D Explanation: Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras. QUESTION 96 Which of the following is a terminal emulator used to manage a network device? VPN IDS PuTTY IPS Answer: C PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet and rlogin. QUESTION 97 A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation? Environmental monitor Multimeter Toner probe Protocol analyzer A "Protocol analyzer" is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. QUESTION 98 Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the

32 impact of web surfing? Caching Load balancing Port filtering Traffic analyzer Answer: A Explanation: In computer science, acacheis a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere. If requested data is contained in the cache (cache hit), this request can be served by simply reading the cache, which is comparatively faster. QUESTION 99 Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols? DNS DOS DHCP DSL Answer: C when we install a dhcp server into our network then dhcp server works on the basis of dora process first dhcp server sends a hello message in to the network to discover the clients pc and when any client pc found in the network then, dhcp server offers the IP to client pc. When client pc selects any IP from dhcp server then client pc request for selected IP to dhcp server then dhcp server provide that IP to client pc and both send ackonledgement to each other. QUESTION 100 Which of the following commands displays the routing table on a server or workstation? nbtstat route traceroute nmap Answer: B The route command allows you to make manual entries into the network routing tables. The route command distinguishes between routes to hosts ... QUESTION 101 A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports? netstat tracert

33 nbtstat nslookup Answer: A Explanation: Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc. QUESTION 102 Which of the following would be the BEST solution for an IDS to monitor known attacks? Host-based Signature-based Network-based Behavior-based Answer: B Signature detection involves searching network traffic for a series of bytes or packet sequences known to be malicious. A key advantage of this detection method is that signatures are easy to develop and understand if you know what network behavior you're trying to identify. QUESTION 103 At which of the following layers of the OSI model does ASCII work? Session Transport Presentation Application Answer: C The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file. QUESTION 104 Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity? dig netstat ping Answer: D TheNbstatcommand is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tables

34 for both local and remote computers.
QUESTION 105 Which of the following uses port 23 by default? TELNET IMAP FTP SNMP Answer: A Explanation: Telnetis a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). QUESTION 106 Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause? Port speed mismatch Faulty F-connectors Bad wiring Bad switch Answer: C Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause. QUESTION 107 Which of the following is the MAXIMUM rated speed for CAT5 cabling? 10Mbps 100Mbps 1000Mbps 10Gbps Answer: B Category 5 cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet) QUESTION 108 Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?

35 Proxy server TDR Smart jack VPN concentrator Answer: D Explanation: The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet. QUESTION 109 Which of the following wireless security measures, although widely implemented, does not provide strong security? IPSec WPA2 MAC address filtering D x Answer: C By MAC address filtering you can only filter layer 2 traffic but in security system layer 4 and layer 4 security is also essential. QUESTION 110 After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO). Bad Ethernet switch port TX/RX reversed Bad connectors Bad patch cable Mismatched MTU Answer: CD It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement. QUESTION 111 Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling? SC RJ-45 RJ-11

36 D. BNC Answer: B Explanation: The heavier wire in some Cat 6 cables makes them too thick to attach to standard 8P8C(RJ- 45)connectors without a special modular piece QUESTION 112 Which of the following performance benefits would multiple domain controllers BEST provide? Fault tolerance Caching engine Proxy server Quality of service Answer: A Fault-tolerantdesign is a design that enables a system to continue its intended operation, possibly at a reduced level, rather than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in response time in the event of some partial failure QUESTION 113 A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause? Split cable EMI DB loss Crosstalk Answer: C The maximum length for a cable segment is 100 m per TIA/EIA A. If longer runs are required, the use of active hardware such as a repeater or switch is necessary. The specifications for 10BASE-T networking specify a 100metre length between active devices. This allows for 90metres of solid-core permanent wiring, two connectors and two stranded patch cables of 5metres, one at each end. QUESTION 114 Assigning the same IP address to a network device is which of the following? SSID Scope Reservation Lease You might want to assign network printers and certain servers DHCP reservations to ensure that

37 they always have the same IP address, but continue to receive updated configuration information from the DHCP server. For example, create reservations for servers that must always have the same IP address. QUESTION 115 Which of the following could be installed to allow a home user with one desktop computer to economically have Internet access in every room in the house? Fiber optic CAT6 Broadband over powerline CAT5 Answer: C QUESTION 116 Which of the following standards transmits the signals the GREATEST distance? a b g n Answer: D Explanation: 802.11nuses multiple antennas to increase data rates. QUESTION 117 Which of the following fiber types is MOST often used indoors? Plenum Modal conditioning Multimode Singlemode Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet) and 10 Gbit/s for 300m (1000 feet) -- more than sufficient for the majority of premises applications. QUESTION 118 Which of the following DNS records is used to identify a domain's SMTP server? CNAME PTR MX A

38 Answer: C Explanation: Amail exchanger record(MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how should be routed with the Simple Mail Transfer Protocol (SMTP). QUESTION 119 Which of the following TCP ports are used by FTP? (Select TWO). 20 21 22 23 25 80 Answer: AB FTP uses two ports by default: 21 for sending commands, and 20 for sending data. For instance if you said "FTP <ServerName>" it would make the attempt using port 21. If the session was established, port 20 would be using for the data. Note: These are the default ports which is what I assume you were asking. A server administrator can however configure FTP to use whatever port he defines. QUESTION 120 Which of the following protocols is MOST commonly used for the transfer of router configuration files? SSL TFTP DNS IMAP Answer: B Trivial File Transfer Protocol(TFTP) is a file transfer protocol notable for its simplicity. It is generally used for automated transfer of configuration or boot files between machines in a local environment. Compared to FTP, TFTP is extremely limited, providing no authentication, and is rarely used interactively by a user. QUESTION 121 Which of the following protocols resolves IP addresses to MAC addresses? ARP RARP NTP

39 Answer: B Explanation: ARP is used to convert an IP address to a physical address such as an Ethernet address. ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4,Chaosnet,DECnetand Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). IPv4 over IEEE and IEEE is the most common case. QUESTION 122 Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network? Network based IDS Firewall Network based IPS Honeynet Answer: D QUESTION 123 Some visitors are unable to access the wireless network. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors? Building A Channel: 2 Encryption: WPA2 Building B Channel: 6 Encryption: WPA2 Building C Channel: 11 Encryption: WPA2 Encryption set to Open in all Buildings Encryption set to Open in Building B Encryption set to WEP in Building B Channel set to 11 in Building B Answer: B Explanation: Because the building B is in the middle, the wireless access router will have reachability to the building A and C. Now, the only thing that we need to do is to open theWireless access on B for the guest users for the WAP in B so that the users coming to building A and C can get access to internet using the open connection. QUESTION 124 Some employees are unable to maintain a wireless network connection. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings? Building A Building B Building C Channel: 1 Channel: 6 Channel: 11

40 Encryption: WPA2 Encryption: Open SSID. CorpSSID. GuestSSID. Sales Change Channel in Building B to 7 Change Encryption in Building B to match A and C Change Channel in Building C to 1 Change SSID in Building C to match Building A Answer: D Explanation: The configuration difference between users in building A and C is that they have same encryption however the SSID is different so the user has to manually authenticate and connect to the network whenever he will move between buildings. If the SSID's are same then he will not have to authenticate himself again and he will get automatic connectivity. QUESTION 125 Which of the following port numbers is used for SNMP? A. 61 B. 151 C. 161 D. 1611 Answer: C Simple Network Management Protocol(SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, UPSes and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. QUESTION 126 A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO). That there is strong encryption enabled and configured on the access point. The user's home network has a correctly completed WHOIS entry. The access point is broadcasting the SSID based upon manufacturer's standards. There are no conflicts of channels in use by neighboring wireless networks. There are redundant internal DNS names set in the access point's settings. That the access point's MAC address is properly set in its configuration settings. Answer: AD Strong encryption is required to keep the user's internet safe and secure so as to avoid misuse of the internet connection and to ensure that channel conflicts are not there so that the signals do not compete with each other and user start to face intermittent connection. QUESTION 127 Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?

41 OTDR Protocol analyzer Toner probe Cable certifier Answer: D Explanation: A cable certifier is an electronic device used to verify the source of electric current, voltage and a switching matrix used to connect the current source and the volt meter to all of the contact points in a cable. QUESTION 128 Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps? A B G N Answer: A 802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s. The data rate is reduced to 48, 36, 24, 18, 12, 9 then 6 Mbit/s if required. QUESTION 129 Which of the following is the definition of a DNS server? Hosts proprietary business applications Translates FQDN's to IP addresses Provides network IDS/IPS security Assigns IP addresses to network devices Answer: B Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as the Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS names to the IP addresses that computers use to communicate with each other. QUESTION 130 Which of the following features can BEST be used to facilitate authorized remote access to a network? VPN concentrator Proxy server Content filter Load balancer

42 Answer: A Explanation: The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet. QUESTION 131 Which of the following WAN technology types has the GREATEST latency? ISDN Fiber Satellite Cable Answer: C Becausesatellites provide a microwave radio relay technology complementary to that of communication cables. They are also used for mobile applications such as communications to ships, vehicles, planes and hand-held terminals, and for TV and radiobroadcasting. QUESTION 132 Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as: virtual desktops. switches. PBXs. virtual servers. Answer: D A Virtualserver, usually a Web server, that shares computer resources with other virtual servers. In this context, the virtual part simply means that it is not adedicated server -- that is, the entire computer is not dedicated to running the server software QUESTION 133 Which of the following is a Class A IP address? A B C D Class A ip address ranges from to QUESTION 134 A network where all traffic feeds through a centralized gateway uses which of the following topologies?

43 Peer-to-peer Ring Bus Star Answer: D Explanation: A bus topology is a type of network setup where each computer and network device is connected to a single cable or backbone. QUESTION 135 A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a: man-in-the-middle attack. rogue access point. evil twin. packet sniffer. Answer: B A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. QUESTION 136 A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST? VLAN settings History logs Patch cable Port security Answer: C A patch cable or patch cord or patch lead is an electrical or optical cable used to connect ("patch- in") one electronic or optical device to another for signal routing. QUESTION 137 Which of the following can be used to limit wireless network access to a single computer? Configure PPP Packet sniffing MAC address filtering Omni-directional antennas

44 Wireless access can be filtered by using theMedia Access Control (MAC)addresses of the wireless devices transmitting within your wireless network. You can either permit or prevent specific wireless computers and devices access to your wireless network. QUESTION 138 Which of the following is the Telco end of a T1 demarc? Smart jack Network tap Proxy server IDF Answer: A Explanation: Smartjacks provides diagnostic capabilities. A very common capability provided by a smartjack is loopback, such that the signal from the telephone company is transmitted back to the telephone company. This allows the telephone company to test the line from the central office, without the need to have test equipment at the customer site. The telephone company usually has the ability to remotely activate loopback, without even needing personnel at the customer site. When looped back, the customer equipment is disconnected from the line. QUESTION 139 The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue? The installation exceeds the link limitations The antenna is mounted for vertical polarization The dBi output of the antenna is too low The radio is too powerful for the installation Explanation: Unlike isotropic antennas, dipole antennas are real antennas. Dipole antennas have a different radiation pattern compared to isotropic antennas. The dipole radiation pattern is 360 degrees in the horizontal plane and 75 degrees in the vertical plane (assuming the dipole antenna is standing vertically) and resembles a donut in shape. Because the beam is "slightly" concentrated, dipole antennas have a gain over isotropic antennas of 2.14 dB in the horizontal plane. Dipole antennas are said to have a gain of 2.14 dBi (in comparison to an isotropic antenna). QUESTION 140 Which of the following WAN technologies uses an analog phone line to transmit data? LTE DSL Satellite Cable Answer: B

45 DSL is a high-speed Internet service like cable Internet
DSL is a high-speed Internet service like cable Internet. DSL provides high-speed networking over ordinary phone lines using broadband modem technology. DSL technology allows Internet and telephone service to work over the same phone line without requiring customers to disconnect either their voice or Internet connections. QUESTION 141 In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented? Scope options Leases Reservations DNS suffixes Answer: C Explanation: DHCP Reservation is used to assign a fixed IP Address to a device that always requires the same IP Address every time it is in use. This feature can be used for a print server, IP Camera, Network storage device as well as a computer QUESTION 142 Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server? nbtstat ipconfig dig netstat By dig command technician will come to know wheather name resolution is happening in correc way or not. QUESTION 143 A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions? A VPN concentrator A switch A router A firewall A router is a device which is capable of performing entire task required by the business owner.

46 QUESTION 144 A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation? Run the dig command on the workstation. Run the nslookup command on the workstation. Run the ipconfig command on the workstation. Run the ifconfig command on the workstation. Answer: D Explanation: The "ifconfig" command allows the linux/unix operating system to setup network interfaces and allow the user to view information about the configured network interfaces. QUESTION 145 Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information? netstat ipconfig ping traceroute Answer: B As ipconfig command will give the information which is assigned to nic for communication so that technician will contact joe with his ip. QUESTION 146 A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO). Loopback plug Multimeter OTDR Crimper Cable tester TDR Answer: DE A cable tester is an electronic device used to verify the source of electric current, voltage and a switching matrix used to connect the current source and the volt meter to all of the contact points in a cable. QUESTION 147 A user's workstation is experiencing multiple errors when trying to open programs. Which of the

47 following log files should the technician review to assist in troubleshooting these errors?
History Log Application Log System Log Security Log Answer: B Explanation: As application logs provide the user wheather application is compatible with system or not.Or what is the cuase which is making trouble. QUESTION 148 802.11n can operate at which of the following frequencies? (Select TWO). 2.4Mhz 2.5Mhz 5Mhz 2.4Ghz 2.5Ghz 5Ghz Answer: DF 802.11n is an amendment which improves upon the previous standards by adding multiple-input multiple-output antennas (MIMO) n operates on both the 2.4 GHz and the lesser used 5 GHz bands QUESTION 149 Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO). LC F-connector DB-9 BNC RJ-11 SC Answer: AF A variety of optical fiber connectors are available, but SC and LC connectors are the most common types of connectors on the market.[citation needed] Typical connectors are rated for 500?,000 mating cycles. The main differences among types of connectors are dimensions and methods of mechanical coupling. Generally, organizations will standardize on one kind ofconnector, depending on what equipment they commonly use. Different connectors are required for multimode, and for single-mode fibers QUESTION 150 Which of the following cable types supports the FURTHEST distance when connecting various

48 MDFs? Multimode UTP Singlemode CAT6 Answer: C Explanation: Single-mode optical fiber (SMF) is an optical fiber designed to carry only a single ray of light (mode). These modes define the way the wave travels through space, i.e. how the wave is distributed in space. QUESTION 151 Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection? Media converter T1-crossover Multimode cable Coaxial Answer: A Media converters support many different data communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, T1/E1/J1, DS3/E3, as well as multiple cabling types such ascoax, twisted pair, multi-mode and single-mode fiber optics. QUESTION 152 Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns? Alter the domain account login policies to reflect the most common application rule sets. Ensure that the user accounts are properly configured in domain services. Implement a software solution that facilitates single sign-on authentication. Increase the time between mandatory password changes by a factor of three. Asingle signonpermits a user to enter one name and password in order to access multiple applications QUESTION 153 A network consultant arrives at a customer's site to troubleshoot their server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take? Document findings Identify the problem Escalate the problem

49 D. Establish a plan of action
Answer: C Explanation: It is better to escalate the problem if you are not aware of the situation as it saves downtime and keeps customer happy. QUESTION 154 A network administrator is adding af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power? 96W 168W 240W D W Answer: B The switch supports 168W to power all the phones at full power. QUESTION 155 Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network? Decrease signal strength on the antenna Change the wireless channel on the WAP Change the device placement to further obfuscate the signal Set up encryption on the WAP and clients Answer: D The encryption will help the clients and server to uniquely identify themselves in an interfering environment. QUESTION 156 A small office client is requesting a network redesign. Both wired and wireless devices must connect to the network. All of the wireless devices can communicate using the latest standards. The building has a long courtyard in the middle with reinforced walls, which extends up through all the floors. The distance from the switch to the furthest drop is 88 meters. Which of the following is the correct network redesign choice? Fiber optic cabling is necessary due to distance limitations. The wireless network should be b due to equipment limitations. One WAP will be sufficient to provide wireless coverage to the floor. The wired network should be run with at least CAT6 cabling.

50 Explanation: The Category 6 cable, also known as Cat-6, is backward compatible with the Category 5/5 e and Category 3 cable standards. It can create a high speed computer network and operate at an optimal performance if other components in the network are compatible with gigabit speeds. Advantage: Speed and Performance The cable can handle speed performance of up to 250 MHZ. This fast performance makes it possible to use with a fast ethernet network including Gigabit Ethernet and 10-Gigabit Ethernet. The whole generation of the Cat 6 cable was introduced to complement the Gigabit Ethernet which includes interface cards, patch panels, routers, switches, and other components which is developed to achieve a full gigabit network. Many IT professionals realized that the Cat 6 cable provide very fast network performance and can deliver gigabit speeds. Advantage: Similar Structure with Cat 5 Cable Cat 6 cable has a similar structure to the Cat 5 and Cat 5e. The Cat 6, Cat 5 and Cat 5e cables have 8 wires that are twisted together to form four pairs. The difference is that one pair of the wires in the Cat 6 cable is kept from contacting with others so that it can produce double the bandwidth of the Cat 5 and Cat 5e. Advantage: Backward Compatible The plug and port of the Cat 6 cable is the same as the Cat 5 and Cat 5e. Therefore, it can be plugged into any port or connection that supports both of those cables. If you use the Cat 5 port, it will not yield the full speed that it is capable of handling. Instead, it will operate at the speed of the computer or cable. However, the speed will be acceptable. Advantage: Upgradable If upgrading to a more optimal network, the Cat 6 cable should be included in part of the upgrade. The Cat 6 cable will not operate at the full speed if other units in the network does not support gigabit speeds. Small businesses that are starting should consider installing the Cat 6 cable since it is becoming the industry standard. QUESTION 157 An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO) 20 21 22 23 25 53 Answer: AB Explanation: FTP use both port 21 and 20 (port 21 for the command port and port 20 for the data). QUESTION 158 Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network? Wire schemes Change management Network diagrams System baselines Answer: D

51 Explanation: System baseline is the record line or changes record that administrator keep to match the effect after new configuration with previous configuration. QUESTION 159 Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO). A /28 B /27 C /27 D /27 E /27 F /30 Answer: CE A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address is typically received by all network-attached hosts, rather than by a specific host. Reference: QUESTION 160 Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO). Switch Cable Repeater Router Bridge Hub Answer: AD A Multilayer Switch and Router work from OSI layer 2, 3 or 4 to IP DSCP (if IP packet) and/or VLAN IEEE 802.1p. QUESTION 161 Which of the following is a path vector routing protocol? RIP EIGRP ISIS OSPF BGP Answer: E BecauseBGP involves a table of IP networks or "prefixes" which designate network reachability

52 among autonomous systems (AS).
QUESTION 162 Which of the following routing protocols utilizes the DUAL algorithm for determining best path? EIGRP RIPv2 OSPF RIP Answer: A Explanation: Diffusing Update Algorithm guarantees loop-free operation and provides a mechanism for fast convergence. QUESTION 163 Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links? Access control list Load balancer Content filter Proxy server Answer: B Load balancingis a computer networking method for distributing workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any one of the resources. QUESTION 164 Which of the following devices can be utilized to monitor and block websites accessible by a company? WINS server DNS server Reverse proxy Answer: C On the Internet, content filtering (also known asinformation filtering) is the use of a program to screen and exclude from access or availability Web pages or that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer. QUESTION 165 The network interface layer of the TCP/IP model corresponds with which of the following layers of

53 the OSI model? (Select TWO).
Transport layer Network layer Session layer Physical layer Presentation layer Data link layer Answer: DF Explanation: The lowest layer of the OSI Reference Model is the physical layer, which is responsible for the "nitty gritty" details of transmitting information from one place to another on a network. The layer just above the physical layer is the data link layer, called the network interface layer or just the link layer in the TCP/IP architectural model. Its primary job is to implement networks at the local level, and to interface between the hardware-oriented physical layer, and the more abstract, software- oriented functions of the network layer and those above it. QUESTION 166 Which of the following BEST describes the definition of DHCP? DHCP is utilized to dynamically lease IP addresses to hosts. DHCP is utilized to statically lease IP address to hosts. DHCP is utilized to permanently lease IP address dynamically to hosts. DHCP is utilized to permanently lease IP address statically to hosts. Answer: A Because DHCP server maintains a database of available IP addresses and configuration information. When the server receives a request from a client, the DHCP server determines the network to which the DHCP client is connected, and then allocates an IP address or prefix that is appropriate for the client, and sends configuration information appropriate for that client QUESTION 167 Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations? The administrator should create exclusions for the workstations IP addresses. The administrator should change the servers to utilize DHCP to obtain IP addresses. The administrator should change the workstations to utilize static IP addresses. The administrator should create exclusions for the servers IP addresses. Answer: D Whenever you define the ip pool from which IP addresses are to be dynamically assigned to the users then in order to avoid assignment of static ip address we can creat exclusion for the static ip addresses so that they are not assigned to any other host and this is how we can avoid ip address conflict on the network. QUESTION 168

54 The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented? DMZ Honeynet PAT Port security Answer: A Explanation: In computer security, a DMZ is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. QUESTION 169 A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly? QoS Install n WAP PoE Parabolic antenna Answer: C Power over EthernetorPoEdescribes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wirelessaccesspoints or IP cameras. QUESTION 170 A network administrator tests a multimode fiber cable from end-to-end on a new link that is down and notices that the dB loss is Which of the following is the MOST likely cause? TXRX reversed dB loss too high dB loss too low Bad connectors Some Ethernet switches support medium dependent interface crossover (MDIX),which allows a switch port to properly configure its leads as transmit (Tx) or receive (Rx) leads. You can interconnect such switches with a straight-through cable (as opposed to a crossover cable). However, if a network device does not support MDIX, it needs an appropriate cable (that is, a crossover cable ) to allow its Tx leads to connect to the Rx leads on a connected device, and vice versa. Therefore, care must be taken when selecting cable types interconnecting network components. QUESTION 171 A technician is reviewing the following company diagram to determine proper connectivity settings:

55 Device Connection Type Distance
Server A CAT6e 380ft LaptopB g 310ft PC1 CAT ft LaptopC n 100ft ServerE Single Mode 500ft Which of the following device configurations is out of specifications? LaptopC ServerE LaptopB ServerA PC1 Answer: D Explanation: no legitimate Category 6e standard exists QUESTION 172 A technician is reviewing the following aggregated information on a server to determine the cause of a user's connection problem: Facility Severity Mnemonic Message FW1 4 FPD Packer discarded AP2 7 AUTH User disassociated SW1 7 PUPD Port changed from up to down Which of the following is the technician reviewing? Syslog server logs Application logs Network sniffer logs SNMPv2 queries Answer: A Explanation: Syslog server logs are the logs that are saved on a system whenever an instance happens of the wireless device. Reviewing the logs can help him understand the behavior of the WAP as well as the client. QUESTION 173 When a packet that is entering a switch port is encapsulated, which of the following is the switch performing? A q

56 Collision avoidance Port mirroring STP Answer: A Explanation: Encapsulation is the term associated with 802.1q which is enabled by default on many devices. QUESTION 174 A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT? Ask the users for more information, such as which applications were not functioning. Power-cycle the switch that the users share to clear out cached DNS records. Escalate the issue to the network administrator to have their domain credentials reset. Close and document the service call, as there was no actual issue affecting the users. Because the system was up and running when the technician reached there, he can ask for applications that were not working or can ask for more information so that he can isolate the problem. Power cycling will not help because the system is already up and recycling can wipe out logs. Escalation will also not help because the system is now up and running. Closing the call will be unfair because the same instance can occur again. QUESTION 175 A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue? Power-cycle the computers and switches to re-establish the network connection. Re-run the network cabling through the ceiling alongside the lights to prevent interference. Test the wiring in the network jacks for faults using a cable verifier. Re-run the network cabling so that they are 12 inches or more away from the electrical lines. Answer: D The electric cables create electric field around them and can interrupt in internet connectivity as well. It is quite possible that this is the cause which is creating the connectivity issue. QUESTION 176 A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this? MPLS Caching engines QoS

57 D. Load balancing Answer: C Explanation: QoS is the service where you can prioritize traffic running over one protocol as compared to the other. It is very similar to the term where you are opening a VIP queue for allowing that traffic to pass. QUESTION 177 Honeypots and honeynets are different in which of the following ways? Honeynets are managed collections of honeypots. Honeypots only test software security, not hardware. Honeynets require specialized hardware to implement. Honeypots are usually servers and honeynets are routers and switches. Answer: A Explanation: A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. QUESTION 178 A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network: Biometric fingerprint scan Complex 12 character password 5 digit pin code authorization Randomized security question prompt upon login Which of the following security setups does this company employ? Single factor authentication Three factor authentication Two factor authentication Single sign-on According to proponents, two-factor authentication could drastically reduce the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim's password would no longer be enough to give a thief access to their information. QUESTION 179 Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds? A. A

58 B G N Answer: D Explanation: 802.11n is an amendment which improves upon the previous standards by adding multiple-input multiple-output antennas (MIMO) n operates on both the 2.4 GHz and the lesser used 5 GHz bands QUESTION 180 A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability? Wrong encryption type SSID mismatch Signal bounce Incorrect channel Answer: C Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open. QUESTION 181 Which of the following is the MAXIMUM potential speed of CAT5e UTP cable? 10BaseT 100BaseT 100BaseFX 1000BaseT Category 5 e cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and BASE-T (Gigabit Ethernet). QUESTION 182 A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem? tracert QoS ipconfig MAC filtering

59 Explanation: By doing MAC filtering technician can block the data coming from a specific mac address. QUESTION 183 Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses? IP filtering Port filtering MAC address filtering DHCP lease Answer: A IPFilter(commonly referred to asipf) is an open source software package that provides firewall services and network address translation (NAT) for many UNIX-like operating systems. The author and software maintainer is Darren Reed. IPFilter supports both IPv4 and IPv6 protocols, and is a stateful firewall. QUESTION 184 Which of the following remote access types requires a certificate for connectivity? SSH PPP HTTPS WEP Secure Shell(SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively) QUESTION 185 A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings. Which of the following methods provides this functionality? Use WAP auto-configuration Use a wireless controller Use PXE to load and track WAPs Use DHCP scope options Answer: B A wireless controller is used in combination with the Lightweight Access Point Protocol (LWAPP) to manage light-weight access points in large quantities by the network administrator ornetwork operations center. The wireless LAN controller is part of the Data Plane within the Cisco Wireless Model. The WLAN controller automatically handles the configuration of anywhere from 6 to 6000

60 wireless access-points, depending on the model.
QUESTION 186 The APIPA address falls into which of the following class of addresses? A B C D Answer: B Explanation: As the range for class B is from to QUESTION 187 An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic? Load balancing internal web servers Redundant network resources Implement fault tolerance on the WAN Implement caching engines Answer: D A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise's bandwidth. QUESTION 188 A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?

61 AP1 (a/b/g/n) UserPC Wireless-G
IPv4 Route Table Active Routers: Network Destination Netmask Gateway Interface Metric On-link 306 261 The router should be listed as The NIC is set to the wrong subnet mask The route of last resort is missing Loopback traffic is weighted higher than NIC interface traffic Answer: C Explanation: The default route is missing from the table. It looks like this: Network Destination Netmask Gateway Interface Metric QUESTION 189 Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network. AP1 (a/b/g/n) UserPC Wireless-G SSID iCorpOne SSID icorpone WEP Key: 337D1FAB10 WEP Key: 337d1fab10 Index: 1 Index: 1 Mode Mixed Mode: G Channel: 1 Channel: Auto Which of the following settings is incorrect on the client? The mode is incorrect SSID Mismatch Incorrect WEP Key

62 D. Channel is set incorrectly
Answer: B Explanation: the first thing which will be checked is the SSID and it is case sensitive but in the above shown example, it is not same so it will stop user from connecting. QUESTION 190 A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue? The DHCP lease pool was not large enough DHCP lease times were set too low The router is not the only DHCP server DHCP was not enabled on the replacement router Answer: C This happens when there are multiple DHCP servers in the same LAN subnet. Here some machines are getting ip address from the router while some are getting ip address from another DHCP server present in the same domain. QUESTION 191 A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used? Kerberos CHAP TACACS+ RADIUS Answer: A Kerberos is a distributed authentication service that allows a process (a client) running on behalf of a principal (a user) to prove its identity to a verifier (an application server, or just server) without sending data across the network that might allow an attacker or theverifier to subsequently impersonate the principal. Kerberos optionally provides integrity and confidentiality for data sent between the client and server. QUESTION 192 Which of the following wireless standards uses a block encryption cipher rather than a stream cipher? WPA2-CCMP WPA WEP WPA2-TKIP

63 Answer: A Explanation: Counter Cipher Mode with Block Chaining Message Authentication Code Protocol or CCMP (CCM mode Protocol) is an encryption protocol designed for Wireless LAN products that implement the standards of the IEEE i amendment to the original IEEE standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by WEP, a dated, insecure protocol. QUESTION 193 Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE? Layer 3 Layer 5 Layer 6 Layer 7 Answer: C The presentation level is translator between the application and network format. Unlike the lower layers, its concern is with the syntax and semantics of the informationtransmitted. Most user programs do not exchange random binary bit strings. They exchange data such as names, addresses, dates, etc. Different computers store the data in a different way. In order to allow these computers to transmit the data to each other the presentation layer translates the data into a standard form to be used on the network. Another function is data compression which can be used to reduce the number of bits needed to send the packet of information. Security is also added at this layer by using data encryption and decryption. This prevents others from intercepting the data and being able to decipher the meaning of the bits. QUESTION 194 A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key? DoS Buffer overflow Dictionary file SQL injection A file used by the debugger. It contains information about a program's structure and contents. The Compiler creates the dictionary file in the first phase of compilation, when checking the syntax. A dictionary file has the filename extension.idy, and is often referred to an.idyfile. QUESTION 195 Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key? A. Evil twin

64 War chalking Buffer overflow Virus Answer: A Explanation: An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there. QUESTION 196 A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed? Behavior based IDS Network based IDS Signature based IDS Honeypot Answer: C Signature detection involves searching network traffic for a series of bytes or packet sequences known to be malicious. A key advantage of this detection method is that signatures are easy to develop and understand if you know what network behavior you're trying to identify. QUESTION 197 A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented? Change management Asset management Network sniffer System logs Answer: B Assetmanagement is defined as the business practice of managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of hardware and software applications within an organization. QUESTION 198 Which of the following can be described as a DoS attack? Disabling a specific system and making it unavailable to users Implementing a keylogger Intercepting a packet and decrypting the contents

65 D. Communicating with employees to get company information
Answer: A Explanation: A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. QUESTION 199 A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat? Man-in-the-middle Social engineering Phishing DoS A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. QUESTION 200 An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly? Antivirus scanner IDS Packet sniffer Toner probe Answer: C Packet Sniffer is a tool that can help you locate network problems by allowing you to capture and view the packet level data on your network.So we can capture the session and find the cause of failure. QUESTION 201 Which of the following provides secure access to a network device? SNMPv2 FTP RSH SSH Answer: D Secure Shell(SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between

66 two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). QUESTION 202 Which of the following uses distance vector algorithms to determine the BEST network route to a destination address? IS-IS OSPF BGP RIP Answer: D Explanation: Here the termdistance vectorrefers to the fact that the protocol manipulatesvectors (arrays) of distances to other nodes in the network QUESTION 203 Which of the following uses classless subnet masks across a network? Subnetting CIDR Supernetting Summarization Answer: B Classless Inter-Domain Routing is based onvariable-length subnet masking(VLSM), which allows a network to be divided into variously sized subnets, providing the opportunity to size a network more appropriately for local needs and also CIDR allows an address or routing prefix to be written with a suffix indicating the number of bits of the prefix, such as /24. QUESTION 204 Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents? Logical network diagrams Physical network diagrams Wiring schematics Group security role assignments Answer: A A logical network diagram illustrates the network architecture of a group of interconnected computers and other devices, such as printers, modems, switches, routers, and even mobile devices. These electronic components form the physical network that provides local area network (LAN) and wide area network (WAN) access to users. Once you know the layout and you have an idea about the packet flow then your job becomes easy and you can create an action plan to go for the implementation.

67 QUESTION 205 While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST? Toner Multimeter Reflectometer Cable tester Answer: A Explanation: Toner-connects to any voice, data, or video cable to detect open/short circuits, continuity, AC/DC voltage* and dial tone* all while protecting up to 52 volt. QUESTION 206 Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming? Traffic shaping Proxy server VPN concentrator High availability As traffic shaping will prioritize the video packets over another packets and then video packets will travel fast on bandwidth. QUESTION 207 While working on a PC, a technician notices in the routing table. Which of the following does this indicate? It is the default route. This is the address for the DHCP server. The PC has not been assigned an IP address. The firewall is down. The address generally means "any address". If a packet destination doesn't match an individual address in the table, it must match a gateway address. In other words, default gateway is always pointed by QUESTION 208 Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users? A. Create an ACL on the switches and routers that are dropping SIP and RTP packets.

68 Create a QoS policy prioritizing users over RTP and SIP traffic.
Create another VLAN for SIP and RTP traffic. Create a rule to throttle SIP and RTP to 10Kbps or less. Answer: C Explanation: As if we will create a vlan for sip and rtp traffic only this traffic will flow from the ports then. QUESTION 209 If a NIC does not have a link light, there is a failure at which of the following OSI layers? Physical Session Data link Presentation Answer: A The NIC does not have light refers to a situation that there could be a fault in the LAN cable or the ports are down and all of these fall under the physical layer. To make it simple, it falls in physical layer because blinking lights refers to the physical connectivity. QUESTION 210 Which of the following is the control when observing network bandwidth patterns over time? Network log Baseline Flow data Interface statistics Answer: B To successfully baseline a network it is important to consider two functions; performance at protocol level and performance at application level. There are many significant metrics to consider at the protocol level, but only a few which are critical. The most important is bandwidthutilizationcompared with bandwidth availability. The most likely cause of poor network performance is insufficient bandwidth. Trending bandwidthutilizationallows you torecognizeproblem areas, provide enough bandwidth to reach performance objectives, and predict future capacity requirements. Changes in bandwidthutilizationpatterns also provide a clear indication of network usage alterations, such as a change in end-userbehavior, or theunauthorizedaddition of an application. QUESTION 211 Which of the following technologies is used on cellular networks? Ethernet CDMA CSMA/CA POTS

69 Answer: B Explanation: CDMA is an example of multiple access, which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). To permit this to be achieved without undue interference between the users CDMA employs spread-spectrum technology and a special coding scheme QUESTION 212 Which of the following technologies allows multiple staff members to connect back to a centralized office? Peer to Peer VPN PKI VLAN VPNenables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. This is done by establishing a virtual point-to- pointconnection through the use of dedicated connections, encryption, or a combination of the two. QUESTION 213 Which of the following is the MOST secure way to prevent malicious changes to a firewall? SNMPv2 access only TELNET access only SSH access only Console access only Answer: D QUESTION 214 Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator? DoS attack Man-in-the-middle attack Smurf attack Xmas attack An attack where a user gets between the sender and receiver of information and sniffs any information being sent. In some cases, users may be sending unencrypted data, which means theman-in-the-middle(MITM) can obtain any unencrypted information. In other cases, a user may be able to obtain information from the attack, but have to unencrypt the information before it can be read.

70 QUESTION 215 Which of the following OSI layers allows users to access network services such as file sharing? Layer 1 Layer 3 Layer 4 Layer 7 Answer: D Explanation: Basically File Transfer protocol(FTP) is responsible for file transfer which lies under Application layer (Layer 7) of OSI layers. QUESTION 216 Which of the following can function in an unsecure mode? SNMPv3 SSH SSL SCP Answer: A SNMPv3 makes no changes to the protocol aside from the addition of cryptographic security, it looks much different due to new textual conventions, concepts, and terminology.SNMPv3 primarily added security and remote configuration enhancements to SNMP QUESTION 217 Which of the following is used to register and resolve IP addresses with their plain language equivalents? Proxy server DNS server Brouter equipment DHCP server Answer: B DNS server translate (resolution) the human-memorable domain names and hostnames into the corresponding numeric Internet Protocol (IP) addresses. QUESTION 218 An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks? DDoS Viruses

71 Worms Man-in-the-middle Answer: A Explanation: DDoS attack,a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as thePing of DeathandTeardropattacks, exploit limitations in the TCP/IP protocols QUESTION 219 Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network? Zone filtering Signature identification Port identification Port scanner Answer: B Signature-based detection really is more along the lines of intrusion detection than firewalls. However, many personal firewalls and some corporate firewalls contain this functionality. Essentially, the system can be configured to look for specific patterns, known to be malicious, and block the traffic QUESTION 220 Which of the following protocols is MOST commonly associated with VoIP? LDAP HTTPS SIP SCP Answer: C The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks. QUESTION 221 Stateful packet inspection is a security technology used by which of the following devices? Unmanaged switch Hardware firewall Bridge IDS With Stateful Packet Inspection (SPI), every time a packet is sent out of the computer, the firewall keeps track of it. When a packet comes back to the firewall, the firewall can tell whether or not the

72 in-bound packet is a reply to the packet that was sent out
in-bound packet is a reply to the packet that was sent out.This way, the firewall can handle most network traffic safely without a complex configuration of firewall rules. QUESTION 222 Which of the following commands will provide an administrator with the number of hops a packet takes from host to host? nslookup ping traceroute route Answer: C Explanation: In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. QUESTION 223 Which of the following is needed when using WPA2-Enterprise wireless encryption? TFTP RADIUS LDAP IPSec Answer: B The WPA2 standard supports two different authentication mechanisms: one using standard RADIUS servers and the other with a shared key, similar to how WEP works. QUESTION 224 Which of the following technologies is used to connect public networks using POTS lines? OC3 OC12 PSTN Cable The PSTN consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all interconnected by switching centers, thus allowing any telephone in the world to communicate with any other QUESTION 225 An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

73 Packet sniffer Honeypot Port mirroring IPS Port scanner IDS Answer: AC Explanation: (IPS), also known asintrusion detection and prevention systems(IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. And we use packet sniffer to detect the types of packet. QUESTION 226 Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time? Burst-frame Full-duplex Half-duplex VoIP Answer: B Afull-duplex(FDX), or sometimesdouble-duplexsystem, allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously. Land-line telephone networks are full-duplex, since they allow both callers to speak and be heard at the same time QUESTION 227 Which of the following is a common physical network topology? Cross-over Loopback Star Straight Answer: C A star network consists of one centralswitch,hubor computer, which acts as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all nodes through a hub. In star topology, every node (computer workstation or any other peripheral) is connected to central node called hub or switch. QUESTION 228 PKI is a method of user authentication which uses which of the following?

74 Various router commands
Access control lists Certificate services A RADIUS server Answer: C Explanation: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally QUESTION 229 A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex? Transmission speed Frequency Auto-negotiate Distance Autonegotiation is an Ethernet procedure by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. In this process, the connected devices first share their capabilities regarding these parameters and then choose the highest performance transmission mode they both support. QUESTION 230 An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation? Coaxial Wireless bridge PoE Multimode fiber PoE provides both data and power connections in one cable, so equipment doesn't require a separate cable for each need. QUESTION 231 Which of the following is always true when a router selects a destination? The default gateway is selected over any other static or dynamic route. The shortest route is always selected. The most specific route is selected over the default gateway.

75 D. A dynamic route is selected over a directly attached network.
Answer: C Explanation: Router always looks for the most closely matched route for forwarding the packet. For example if there are two routes in your router and you have to send a packet to a host with an ip then it will forward packet to rather than : Network Destination Netmask Gateway QUESTION 232 A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO). Combined DNS and DHCP hosting Encryption Content filtering Fault tolerance Website caching Answer: CE A content-filtering web proxy server provides administrative control over the content that may be relayed in one or both directions through the proxy. Acaching proxyserver accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. QUESTION 233 Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? VLAN MPLS VPN PSTN Answer: B MPLSis a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links (paths) between distant nodes rather than endpoints QUESTION 234 Drag and Drop Question Drag and drop the fiber cable connection types to the appropriate image.

76 Answer:

77 QUESTION 235 An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened? 25 53 C. 110 D. 443 Answer: A Explanation: SMTPis an Internet standard for electronic mail ( ) transmission across Internet Protocol (IP) networks. SMTP uses TCP port 25. QUESTION 236 Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut? Mesh Ring Bus Star Answer: C

78 Abus network topologyis a network topology in which a set of clients are connected via a shared communications line/cables, called a bus. QUESTION 237 Which of the following is an example of a Class C address? A B C D Answer: D Explanation: Class C address range varies from to QUESTION 238 Drag and Drop Question A customer's server is not sending s. Arrange the troubleshooting steps in the order the technician should perform them: Answer:

79 QUESTION 239 Drag and Drop Question GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only. GigSwitch1 needs to be configured with the following parameters: Configure the necessary protocol to prevent switching loops Configure GigSwitch1 with a /24 IP address for management Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used.

80 Answer:

81 QUESTION 240 Lab Simulation Workstations are unable to access the internet after a recent power outage. Configure the appropriate devices to ensure All workstations have internet connectivity.

82 Answer: The switches are not connected properly. Connect Switch 1 to switch three on the last port and then connect the last port of the switch 3 to the first port of switch 2. In this way the switches will be connected properly. Click Enable All to enable the switches. QUESTION 241 Lab Simulation You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 1: Select the tool that was used to create the cable test results. Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.

83

84

85

86

87 Answer: Cable certifier - incorrectly crimped cable
QUESTION 242 Lab Simulation Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem. You, a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any NECESSARY changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are clickable. When you feel the simulation is complete please select the Done button.

88

89

90

91

92 Answer: Change the speed and duplex settings on AP2 only to 100 and full. Change the mode to G on AP2 Change the channel to 6 on AP2 Explanation: Since we know that the network was running perfectly before replacing AP2 we should start by looking at this new device that was used to replace the old one. Here we see that the other AP's have hard coded the speed and duplex settings to 100/full, while AP2 is set to auto/auto. Also, the other AP's have been configured to use G, while AP2 is using B. Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6, and 11 are spaced far enough apart that they don't overlap. On a non-MIMO setup (i.e a, b, or g) you should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using 11, AP2 should be using 6. QUESTION 243 A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? SSID name WAP encryption strength WAP radio power Channel overlay Answer: C WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power. QUESTION 244 The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need? WAP placement MAC address filtering Content filtering Encryption type and strength Answer: B MAC Filtering (or EUI filtering, or layer 2 address filtering) is a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. QUESTION 245 Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

93 HTTPS SSH RSA SSL Answer: B Explanation: DES encryption algorithm encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and the resulting cipher text is again encrypted with a third key). QUESTION 246 The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO). Network Session Transport Physical Data link Answer: DE The network layer is responsible for packet forwarding includingroutingthrough intermediate routers, whereas thedata link layeris responsible for media access control, flow control and error checking. QUESTION 247 In which of the following layers of the OSI model would MAC addressing be found? Application Data Link Answer: C The ITU-TG.hnstandard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of aselective repeatSliding Window Protocol. QUESTION 248 Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues? Faulty cable Remote management disabled Improper VLAN assignment

94 D. Mismatched duplex Answer: C Explanation: Finance Server is placed in same VLAN which is assigned to finance users if they are able to access internet that's means connectivity to switch is good, so we have to check the VLAN assigned to users. QUESTION 249 A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic? Duplex settings SNMP string VLAN assignments Spanning tree A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment. QUESTION 250 Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address? Port security IDS Firewall rules Switch VLAN assignments Firewall rules block or allow specific traffic passing through from one side of the router to the other. Inbound rules (WAN to LAN) restrict access by outsiders to private resources, selectively allowing only specific outside users to access specific resources. Outbound rules (LAN to WAN) determine what outside resources local users can have access to. QUESTION 251 The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall? PAT DHCP DMZ NAT

95 Answer: C Explanation: DMZ is a physical or logical subnetwork that contains and exposes an organization's external- facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. QUESTION 252 Which of the following attacks would allow an intruder to do port mapping on a company's internal server from a separate company server on the Internet? SYN flood Teardrop Smurf FTP bounce Answer: D FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request. QUESTION 253 Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet? Syslog files Honeypot Network sniffer tracert A network sniffers monitors data flowing over computer network links. It can be a self-contained software program or a hardware device with the appropriate software or firmware programming. QUESTION 254 A network technician has just upgraded a switch. The new switch's IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch's own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem? The proxy server is set incorrectly. The Ethernet cable is pinched. The network gateway is set incorrectly. The IP address is set incorrectly. When user is able to ping everything in its own subnet that means that all the hosts are reachable

96 however when you are not able to ping anything outside of this subnet then pleasecheck if the device is sending traffic to the correct host who should forward it to the further devices. QUESTION 255 Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice? Wide Area Network NAT Virtual PBX Virtual LAN Answer: C Explanation: Virtual PBX,a business phone system providing call routing, follow-me calling, voic , fax- mail, and ACD queues with no customer installed equipment. QUESTION 256 An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem? Cable tester Protocol analyzer Load balancer OTDR Answer: B A packet analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.As data streams flow across the network, the sniffer captures eachpacket and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content. QUESTION 257 Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue? Faulty GBIC Faulty SFP Cable is a crossover VLAN mismatch Answer: D As user has link light on NIC that means he has connectivity with switch so he need to check his vlan assignment. QUESTION 258 Which of the following can a network technician change to help limit war driving?

97 Signal strength SSID Frequency Channel Answer: A Explanation: War driving is a term used to describe the process of a hacker who, armed with a laptop and a wireless adapter card and traveling via a car, bus, subway train, or other form of mechanized transport, goes around sniffing for WLANs. Over time, the hacker builds up a database comprising the network name, signal strength, location, and ip/namespace in use.. QUESTION 259 Which of the following is an example of a CSMA/CD medium? WEP SONET Token ring Ethernet Answer: D Explanation: CSMA/CDis a Media Access Control method in which a carrier sensing scheme is used and also a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame QUESTION 260 Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO). Proxy server Traffic shaping Caching engines Load balancing Quality of service Answer: BE Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate. QoS (Quality of Service) is a major issue in VOIP implementations. The issue is how to guarantee that packet traffic for a voice or other media connection will not be delayed or dropped due interference from other lower priority traffic. Things to consider are: Latency: Delay for packet delivery Jitter: Variations in delay of packet delivery Packet loss: Too much traffic in the network causes the network to drop packets Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts QUESTION 261 A network technician is troubleshooting signal problems with certain WAPs in an office and finds

98 consistently high ping times across the units
consistently high ping times across the units. Such an issue is called which of the following? Latency Attenuation Crosstalk Frequency hopping Answer: A Explanation: During the high ping time users are using most of the bandwidth that causes latency so signal strength get affected by this. QUESTION 262 A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems? Firewalls VLANs Channels Antenna types Answer: C Protocol requires to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other. Channels 1, 6, and 11 are the most common channels to choose, and most routers will use one of them as the default channel--but the general idea is to be as far away from everybody else as you can. QUESTION 263 Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port? A. 110 B. 123 C. 143 D. 443 Post Office Protocol (POP) is an application-layer Internet standard protocol used by local clients to retrieve from a remote server over a TCP/IP connection. POP3 server listens on well-known port 110. QUESTION 264 Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow? Non-Plenum CAT5 Non-Plenum CAT5e

99 Plenum CAT5 Plenum CAT5e Answer: D Explanation: Cat 5eis a twisted pair cablefor carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). QUESTION 265 Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation? Content filter Proxy server Layer 3 switch Firewall Answer: B A proxy server is a server (a computer system or an application) that acts as an intermediary for requests fromclients seeking resources from other servers. QUESTION 266 Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards. Which of the following is the correct tool? Cable certifier Cable tester OTDR Protocol analyzer Answer: A A cable certifier is used to verify that a cable meets its specifications such as the bandwidth and frequency. For example, it can verify a CAT 5e cable meets specifications and supports speeds of 1000Mbps. QUESTION 267 A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method? SSID disable SNMPv3 WEP WPA2

100 WPA2 improves security of Wi-Fi connections by not allowing use of an algorithm called TKIP (Temporal Key Integrity Protocol) that has known security holes (limitations) in the original WPA implementation. QUESTION 268 Which of the following will allow a technician to monitor all network traffic when connected to a mirror port? VLAN tags SNMP Packet sniffer Syslog Answer: C Explanation: Mirror port just send the packet to the port which is selected to grab the packet of any destination port to capture that packets we need packet sniffer. QUESTION 269 A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO). Preventing dictionary attacks on user passwords Reducing spam from outside sources Shielding servers from attacks on internal services Blocking external probes for vulnerabilities Directing DNS queries to the primary server Answer: CD Port security is required because if we keep the ports unsecure then hackers can do port scanning and can compromise the internal secured network so we will have to shield servers to avoid attacks from outside and we need to block incoming scanning request coming from outside. QUESTION 270 A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause? VLAN tag mismatch Wrong subnet mask Smurf attack Faulty routing rule Answer: D This happens when the DNS server is able to resolve the URL but there can be a conflicting route pointing to somewhere else rather than to the correct device who is responsible for routing traffic to the internet. QUESTION 271

101 The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is: patch management. security limitations. documentation. social engineering. Answer: A Explanation: A patch is a piece of software designed to fix security vulnerabilities and other bugs, and improving the usability or performance. QUESTION 272 A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task? Media convertor Switch Firewall Bridge Answer: B They connect multiple PCs, printers, servers and other hardware. Switches allow you to send information, such as , and access shared resources, including printers, in a smooth, efficient, and transparent manner. QUESTION 273 Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released? DHCP lease DNS suffix Subnet mask DHCP reservation By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid. QUESTION 274 Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availability solution? Media converter Proxy server VPN concentrator Load balancer

102 Answer: C Explanation: The VPN Concentrator is used for Remote Access VPN's that allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet. QUESTION 275 A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? VLANs PoE PAT VPN Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses. QUESTION 276 After a technician has identified the problem and its impact, which of the following steps should be performed NEXT? Implement preventative measures. Establish a plan of action to resolve the problem. Establish a theory of probable cause. Implement the solution or escalate as necessary. By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not. QUESTION 277 Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps? A a B b C g D n Answer: B The b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.) Hypothetical speed Range(indoors) Range(outdoors)

103 11 Mbits/s 50 m 200 m 5.5 Mbits/s 75 m 300 m 2 Mbits/s 100 m 400 m 1 Mbit/s 150 m 500 m QUESTION 278 A technician tests a cable going to the patch panel and notices the following output from the cable tester: On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue? White Orange Solid Brown Solid Orange White Green Answer: D Explanation: T568A Wiring Pin Pair Wire Color white/green green white/orange

104 blue white/blue orange white/brown brown QUESTION 279 Which of the following monitoring devices are used only to recognize suspicious traffic from specific software? Signature based IPS Application based IDS Anomaly based IDS Application based IPS Answer: B Explanation: An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a system or agent that would typically sit between a process, or group of servers, monitoring and analyzing the application protocol between two connected devices. QUESTION 280 Which of the following security appliances are used to only identify traffic on individual systems? Host based IPS Network based IDS Host based IDS Answer: D A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as the network packets on its network interfaces. QUESTION 281 Which of the following components of wiring distribution is referred to as the core communications

105 closet for an organization?
MDF Smart jack IDF Demarc extension Answer: A Explanation: MDF stands for Main Distribution Frame and is the main computer room for servers, hubs, routers, DSL's, etc. to reside. QUESTION 282 Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? 10GBaseLR 100BaseFX 100BaseTX 1000BaseX Answer: D 1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error- correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media. QUESTION 283 Which of the following does Kerberos provide? Non-repudiation Accounting Exchange Authentication Kerberos is a trusted third-party authentication service based on the model presented by Needham and Schroeder. It is trusted in the sense that each of its clients believes Kerberos'judgmentas to the identity of each of its other clients to be accurate. QUESTION 284 Which of the following does Kerberos use to authenticate? Tickets Servers Users Clients

106 Answer: A Explanation: Kerberos keeps a database of its clients and their private keys. The private key is a large number known only to Kerberos and the client it belongs to. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. The private keys are negotiated at registration. QUESTION 285 After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic? The new user is downloading large files. The router failed, flooding the network with beacons. The new user's IP address is a duplicate. A switching loop was created. Answer: D A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections betweentwo network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. QUESTION 286 Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays? Caching VoIP QoS SMTP Answer: C By Qos we can prioritize the voice packets over data network.So delay and latency will get reduce. QUESTION 287 A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet? ISDN Cable modem DSL Dial-up networking

107 Explanation: Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. QUESTION 288 A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO). OC3 line with built-in firewall DS3 line with a separate firewall Cable modem with a separate firewall Dial-up modem with separate firewall DSL router with firewall capabilities Answer: CE QUESTION 289 At which of the following layers do frames exist? (Select TWO). OSI model Data link layer TCP/IP model Network Interface layer OSI model Physical layer OSI model Network layer TCP/IP model Internet layer Answer: AB The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination. QUESTION 290 A user is unable to access any network resources. The IP configuration of the workstation is as follows: IP Address: Subnet Mask: Default Gateway: Which of the following would allow the user to connect to network resources? Change the default gateway to Change the default gateway to Change the IP address to Change the IP address to Answer: D

108 The given ip address is network id which we don't assign to the host so the next ip is applicable to this. QUESTION 292 A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem? Faulty crossover cable DNS server is down Switching loop Outside interface shutdown Answer: D QUESTION 293 Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO). dig nslookup nbstat ifconfig ipconfig Answer: DE QUESTION 294 A router operates at which of the following layers of the OSI model? Layer 2 Layer 3 Layer 4 Layer 5 Answer: B QUESTION 295 When querying a DNS server for an AAAA record, which of the following is an appropriate response? A B. 00:f3:82:99:a2:b8 C in-addr.arpa D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

109 QUESTION 296 A computer on VLAN 10 with the IP address of /27 cannot ping a computer on VLAN 20 with the IP address of /27. Which configuration change will allow the PING to be successful? Replace the router with a Layer 2 switch that supports VLANs Change VLAN 20 computers Default Gateway to /27 Change VLAN 10 computers Default Gateway to /27 AllowICMP to pass through the Router Answer: D QUESTION 297 Which of the following network devices restricts traffic based on words, signatures, and URLs? Layer 2 switch Content filter Load balancer Traffic analyzer Answer: B QUESTION 298 A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred? Port security is blocking all traffic. An IDS is blocking all traffic. Implicit deny is blocking all traffic. SMTP is blocking all traffic. Answer: C QUESTION 299 Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

110 110 Network security policy Network baseline Logical network diagram
Wiring schematic Answer: C QUESTION 300 Which of the following is the only standard that can operate at either frequency? A a B b C g D n Answer: D Explanation: Only n can operate at 2.4Ghz and 5Ghz QUESTION 301 Which of the following wireless standards provide speed of 11Mbps? 110

111 111 A. 802.11a B. 802.11b C. 802.11g D. 802.11n Answer: B Explanation:
802.11a - 54Mbps - OFDM 802.11b - 11Mbps - DSSS 802.11g - 54Mbps - OFDM/DSSS 802.11n - 150/300Mbps (MIMO) - OFDM QUESTION 302 A computer's DNS has bad cach records.which tools can be used to clear the DNS record. netstat ipconfig nslookup tracert ipconfig/flushdns will flush/clear the old DNS record, which includes good and bad cached records QUESTION 303 A router operates at which of the following layers of the OSI model? Layer 2 Layer 3 Layer 4 Layer 5 QUESTION 304 Which of the following a network technician would use to reverse engineer malware and virus? IDS VLAN Virtual Machine Switch Answer: C Virtual Machine --- even if the VM gets infected, host machine will run as normal. QUESTION 305 Which of the following protocols uses port 3389 by default? 111

112 112 RDP TFTP IMAP DNS Answer: A QUESTION 306
Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies? A a B b C g D n Answer: D QUESTION 307 Which of the following standards can operate at 40MHz channel spacing? QUESTION 308 The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue? nslookup ipconfig ping nbtstat QUESTION 309 Which of the following would a network administrator use to scan a network for vulnerabilities? ICMP NMAP ACL TCPDUMP Answer: B 112

113 QUESTION 310 Which of the following attack types is being used if the originating IP address has been spoofed? Ping flood Trojan Smurf Worm Answer: C QUESTION 311 The BEST way to determine the next hop of a packet is to check the: link state. routing table. routing metrics. convergence. Answer: B QUESTION 312 Which of the following cable types is unshielded? STP Twinax UTP Coax QUESTION 313 Which of the following wireless standards can transmit data up to 540Mbps? A a B b C g D n Answer: D QUESTION 314 Which of the following preventative measures would BEST secure a web server from being port scanned by attackers publicly? Content filter Proxy server ACL implicit allow Firewall 113

114 Answer: D QUESTION 315 A user calls the helpdesk to report not being able to access network resources over the company's Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause? SSID mismatch Incorrect WPA key Signal bounce Antenna placement Answer: A QUESTION 316 A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet 100BaseT switch. Which of the following cabling will be needed for the installation? Multimode fiber RG-59 coaxial CAT6a CAT3 Answer: C QUESTION 317 A customer has requested that a new piece of network equipment be installed so that the customer can have multiple subnets for each department, but allow network traffic from each department to reach one another without the use of a router. Which of the following network devices would satisfy this customer's requirements? Packet filter Layer 3 switch Stateful firewall Wireless bridge Answer: B QUESTION 318 A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause? Incorrect VLAN MTU mismatch Hijacked HOSTS file Missing routes 114

115 Answer: A QUESTION 319 A user's network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause? DB loss on the cable Interference Split cable Distance limitations Answer: C QUESTION 320 Which of the following provides RSA encryption at the session layer? SSH ISAKMP SSL TLS QUESTION 321 Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only? Load balancer VPN concentrator Proxy server DNS server QUESTION 322 A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network? IPS logs Application logs IDS logs History logs QUESTION 323 115

116 The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly? 2 4 5 8 Answer: A QUESTION 324 Which of the following wireless standards can operate on the same frequency but are not compatible? A a / b B a / n C b / g D g / n Answer: B QUESTION 325 The DHCP server leases IP addresses to WBAC11 for a period of 14 days. At which of the following times would WBAC11 send an initial request to the DHCP server to renew the IP address lease? Day 4 Day 6 Day 8 Day 10 Answer: C QUESTION 326 A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs? Mirroring Trunking Authenticating Bonding QUESTION 327 A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this? 116

117 117 Network sniffer Syslog SNMPv3 System logs Answer: A QUESTION 328
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this? nslookup ifconfig dig ipconfig Answer: D QUESTION 329 Which of the following would be used to run an instance of a Layer 2 device within an application? Virtual switch Virtual router Virtual PBX NaaS QUESTION 330 A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future? Change management Cable management Asset management Setting baselines Answer: B QUESTION 331 Which of the following syslog severity codes indicates an emergency and that the system is unusable? 1 6 7 117

118 Answer: A QUESTION 332 Using source port numbers as a way to keep track of connections is a characteristic of which of the following protocols? TCP UDP NAT PAT Answer: D QUESTION 333 A consultant is installing new WAPs for an office using wall mounts. Which of the following is the BEST location for the new boxes for signal strength and coverage? Above the suspended ceiling with antennas positioned upward. Close to the floor level to allow the signal to traverse the floor laterally. Close to the suspended ceiling, but not above. Above the suspended ceiling with antennas positioned downward. Answer: C QUESTION 334 A technician has narrowed down the cause of a problem to two possible sources. Which of the following should the technician do NEXT? Implement a solution for both causes to be sure all possibilities are covered. Choose the more likely cause and test to confirm. Establish a plan of action for each. Choose the less likely cause and test to eliminate. Answer: B QUESTION 335 A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended? Change the SSID to be unique for each WAP. Change the antenna direction to be unique for each WAP. Change the encryption method to be unique for each WAP. Change the channel to be unique for each WAP. 118

119 QUESTION 336 Which of the following can be used to prioritize network streams to optimize performance for certain traffic types? VLAN VPN QoS PoE Answer: C QUESTION 337 An administrator is attempting to troubleshoot a program that is unable to resolve IP addresses from FQDNs. Which of the following commands is used to check reverse DNS settings? dig ifconfig nbtstat route Answer: A QUESTION 338 Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector? BNC GBIC MT-RJ SC QUESTION 339 A user arrives at a new house and the Internet provider states the connection will run through the cable. If the user wants to install multiple PCs, which of the following will the user need in order to establish a connection? (Select TWO). Router T1 card WEP Modem Answer: BE QUESTION 340 A user reports that they are unable to connect to the network. Upon further investigation, a 119

120 technician notices that the user has an IP address/subnet mask combination of /24. The default gateway for the network is Which of the following could the user's IP address be changed to so that they could connect to the network? A /27 B /27 C /24 D /24 Answer: C QUESTION 341 A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause? Signal strength Interference AP placement Incorrect SSID Answer: D QUESTION 342 A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic? Router firewall Ping and traceroute Throughput tester Protocol analyzer QUESTION 343 Which of the following DNS records must be queried to resolve the IPv6 address of a website? CNAME PTR AAAA A QUESTION 344 Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the

121 following should the network administrator deploy to comply with the new collection requirements?
Network intrusion detection Traffic analysis tool Syslog server Network sniffer Answer: C QUESTION 345 Which of the following protocols is used to send time synchronization updates on a given network? NTP POP3 DNS IMAP Answer: A QUESTION 346 A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance? Caching engine Traffic shaper Network based firewall Packet sniffer Answer: B QUESTION 347 Which of the following wireless router security measures provides access to a network by allowing only devices on an approved physical address list? Port filtering MAC filtering SSID masking Port forwarding QUESTION 348 A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose? A. QoS

122 PPPoE RADIUS VPN Answer: A QUESTION 349 Which of the following network protocols is used to transport across the Internet? NTP SSH SMTP SNMP Answer: C QUESTION 350 Which of the following BEST describes a load balancer? A device that splits traffic between multiple nodes of a clustered service. A device that allows multiple computers to access the internet through a single public IP address. A device that filters internet content based on rules and ACLs. A device that separates users onto separate WAPs for even distribution. QUESTION 351 An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected? The spanning tree protocol is preventing the traffic. Port Mirroring is set up incorrectly. The switch needs to be a layer 3 switch. The traffic is in a classless IP range and not classful IP range. Answer: B QUESTION 352 An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port? Run netstat Run dig Run nbtstat Run tracert

123 QUESTION 353 The TCP/IP application layer contains which of the following OSI layers? Layers 1,5,6,7 Layers 4,7 Layers 5,6,7 Layer 7 Answer: C QUESTION 354 Which of the following is MOST commonly implemented for remote access to UNIX systems? SSL RSH SSH RDP QUESTION 355 Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer? Managed Software Hardware Wireless Answer: B QUESTION 356 A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist? Data link Network Session Physical QUESTION 357 Which wireless standard works at a MAXIMUM data rate of up to 11Mbps? A a B b

124 C g D q Answer: B QUESTION 358 Which of the following is the radio frequency and data rate for g as specified by the IEEE standards? 2.0 GHz at 33 Mbps 2.4 GHz at 54 Mbps 2.4 GHz at 128 Mbps 5.0 GHz at 54 Mbps QUESTION 359 The unit responsible for the successful shaping and transmission of a digital signal is called: demarc. T1 hub. smart jack. CSU/DSU. Answer: D QUESTION 360 Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports? Switch Hub Router Repeater Answer: A QUESTION 361 A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this? Disable the SSID. Change the broadcast channel. Lower the signal strength. Change the antennas.

125 QUESTION 362 Which of the following records allows for reverse DNS lookups? AAAA A PTR CNAME Answer: C QUESTION 363 An administrator determines that an attack is taking place on the server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network? Packet filtering Spam filtering MAC filtering CSU Answer: A QUESTION 364 In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings? CAT6a Plenum Crossover STP Answer: B QUESTION 365 Users trying to access a website using HTTPS are being blocked by the firewall. Which of the following ports needs to be allowed? A. 80 B. 143 C. 443 D. 3389 QUESTION 366 The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model? A. Layer 2

126 Layer 5 Layer 6 Layer 7 Answer: D QUESTION 367 Which of the following classifications has a MAXIMUM segment distance of 984 feet (300 meters)? 1000Base 100BaseFX 1000BaseSX 1000BaseT Answer: C QUESTION 368 A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions? Signal strength latency Bouncing signal Interference Crosstalk QUESTION 369 Which of the following is a fiber connector type? F-connector RJ-11 RS-232 MTRJ QUESTION 370 A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO). A q MAC address filtering WPA2 Personal WPA Enterprise E x

127 Answer: DE QUESTION 371 Which of the following is MOST likely used with RG-6 media? MTRJ RJ-11 RJ-45 F-connector Answer: D QUESTION 372 A small company has a single multi-layer switch. The company currently has all network devices on the same subnet but would like to switch the servers to another subnet for security reasons. The company cannot budget any more money to purchase additional hardware. Which of the following features should be used to achieve the new company requirements? PAT PoE VLAN QoS Answer: C QUESTION 373 Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers? Reservations Suffixes Leases Gateways Answer: A QUESTION 374 A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application? Network maps Traffic analysis Syslog ICMP Answer: B

128 QUESTION 375 Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO). Cable certifier Ping command Punch down tool Crimper Toner probe Answer: AC QUESTION 376 A new WAP is configured to only use g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem? Latency Incorrect encryption type EUI-64 Incompatible hardware Answer: D QUESTION 377 A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT? Escalate the problem Identify potential effects Test the theory to determine cause Establish a plan of action to resolve the problem Answer: A QUESTION 378 Which of the following should be installed to prevent inappropriate websites from being viewed? Load balancer VPN concentrator Content filter Proxy server Answer: C

129 QUESTION 379 Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack? Toner probe Cable tester Punch down Crimper Answer: C QUESTION 380 A technician can increase the bandwidth of an n cell by: doubling the channel width. enabling diversity. disabling MIMO. adding a second access point. Answer: A QUESTION 381 Which of the following is a requirement for bridging with a? WPA encryption Governmental licenses High gain yagi antennas Clear line of sight Answer: D QUESTION 382 Which of the following technologies can change channel widths? A a B b C n D. Bluetooth QUESTION 383 Which of the following is a common LAN protocol used for a SOHO? ATM DSL Ethernet HDLC

130 Answer: C QUESTION 384 Which of the following tools could attempt to detect operating system vulnerabilities? nslookup honeynet netstat nessus Answer: D QUESTION 385 A company has one public IP address, and only one device needs to be able to connect to the Internet at a time. Which of the following is the BEST option for connectivity? VLSM CIDR NAT PAT QUESTION 386 An IP address assigned from a DHCP server is said to be which of the following? Hybrid Dynamic Secure Static Answer: B QUESTION 387 A technician needs to setup an Internet connection for a small office. There are five users that need the ability to use and do online research. The office manager wants the connection to be always on and be as inexpensive as possible. Which of the following would BEST fit the needs of this office? Broadband T1 Frame Relay Satellite Answer: A QUESTION 388 The network technician needs to install fiber cabling to connect two buildings less than 984 feet 130

131 (300 meters) apart. Which of the following fiber types should be installed?
Singlemode Multimode Crossover F-Connector Answer: B QUESTION 389 Which of the following protocols does DNS utilize on port 53? TCP FTP RTP ICMP Answer: A QUESTION 390 At which of the following layers do IP addresses exist? TCP/IP model Internet layer OSI model Data Link layer TCP/IP model Transport layer OSI model Physical layer QUESTION 391 A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select? WPA enterprise TKIP WPA2 CCMP WEP 128-bit QUESTION 392 Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO). Hub Switch MAC address IP address Router

132 Answer: DE QUESTION 393 A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP from the Internet. Which of the following is the correct firewall rule? Allow ANY to port 21 Allow ANY to port 22 Allow ANY to port 80 Allow ANY to ANY port ANY Answer: B QUESTION 394 Which of the following should be mitigated by employing proper coding techniques when developing software? Distributed denial of service attacks Buffer overflows War driving Packet sniffing QUESTION 395 Which two layers of the OSI model make up the TCP/IP model Network Interface layer? Application and Transport Transport and Session Physical and Data Link Session and Presentation Answer: C QUESTION 396 Which of the following types of connectors is used with a CAT6 Ethernet cable? RJ-45 BNC RJ-11 DB-9 Answer: A QUESTION 397 Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The

133 network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information? ipconfig ping sniffer route Answer: C QUESTION 398 A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use? A 12 port unmanaged switch. A wired router with an 8 port switch and a WAN port. A wireless router with an 8 port switch, and a WAN port. A 8 port firewall with one console port. Answer: A QUESTION 399 Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server? A. 80 B. 445 C D QUESTION 400 A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause? The workstation has been removed from the domain and needs to be re-added in directory services. The workstation is configured to use the IPv4 protocol instead of IPv6. The workstation is configured with an incorrect IP address of the DNS server. The workstation's DHCP IP address has expired and has assigned itself an APIPA address. QUESTION 401 A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?

134 Adjust the signal strength of the access points with minimal coverage overlap.
Increase the pool in each of the access points to avoid running out of IPs. Configure each access point to use a different method of encryption than the others. Reconfigure each of the access points so that they broadcast different SSIDs. Answer: A QUESTION 402 Which of the following wireless standards is the only one capable of operating in either of the wireless spectrums? A B G N Answer: D QUESTION 403 Which of the following WAN technologies has the highest latency? POTS Cable Satellite DSL Answer: C QUESTION 404 Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router? FTP and basic Internet traffic HTTPS and IMAP traffic DNS and TELNET traffic VPN and RDP traffic QUESTION 405 A network administrator is tasked with blocking unwanted spam is being relayed by an internal server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? Closing off port 25 on the firewall Closing off port 53 on the firewall Turning off the SMTP service on the server Turning off the IMAP service on the server

135 Answer: A QUESTION 406 Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images? Content filter VPN concentrator Load balancer Proxy server QUESTION 407 The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue? Configure Wi-Fi Multimedia support Use only 20 MHz channel bandwidth Enable band steering to use n Configure Quality of Service Answer: B QUESTION 408 The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue? Cable tester Buttset Toner probe Cable certifier QUESTION 409 A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used? Kerberos TACACS+ RADIUS D x

136 Answer: C QUESTION 410 An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO). SSL IPSec Kerberos RDP L2TP PPTP Answer: BE QUESTION 411 An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this? An IP filtering ACL A MAC filtering ACL A port filtering ACL A class matching ACL QUESTION 412 A user has three different subnets in an office. Which of the following can be configured to allow two of the subnets to communicate directly with each other at the switch level? A af B q C x D Answer: B QUESTION 413 A technician has two wireless g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason? Channels below 9 overlap each other Channel width is set to 40MHz Channels are in the 5GHz range by mistake Channel 1 should have been set to 11 to avoid an overlap

137 QUESTION 414 A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis? Multimeter Cable tester Lineman's handset Toner probe Answer: C QUESTION 415 Which of the following uses types and codes rather than ports? EIGRP ICMP UDP IPv6 Answer: B QUESTION 416 A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address? arp nslookup ipconfig netstat QUESTION 417 A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly? traceroute nbtstat Answer: A QUESTION 418 Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the

138 following could be the cause of this failure?
Duplicate IP address Incorrect subnet mask Incorrect gateway Wrong DNS Answer: A QUESTION 419 Which of the following protocols are used to provide accurate time to network devices? SMTP FTP TLS NTP Answer: D QUESTION 420 Which of the following provides the STRONGEST security for a tunneled connection over the Internet? RDP RAS IPSec QUESTION 421 After deploying a network switch, the network administrator is unable to remotely administer the device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue? Management LAN: /24 Management interfacE Default gateway: STP is enabled VLAN assignment Wrong subnet mask Switching loop Wrong gateway QUESTION 422 Which of the following can be used to decrypt SSL packets which encapsulate internal network

139 addresses in the payload?
Proxy server Content filter Load balancer VPN concentrator Answer: D QUESTION 423 Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this? Reconfigure the access points from b to g. Establish procedures which limit user connections during peak hours. Configure the access points so that they all use different SSIDs. Move one or more access points, minimizing signal overlap. QUESTION 424 A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented? Two-factor authentication Biometric security Multi-factor authentication Single factor authentication Answer: A QUESTION 425 A technician has set up a wired network IP scheme with the following specifications: DHCP: Gateway: DNS: Which of the following is represented by this addressing scheme? Static QoS Dynamic Dynamic with static reservation Answer: C

140 QUESTION 426 A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of? Single sign-on Network access control PKI authentication Two-factor authentication Answer: D QUESTION 427 A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following? Multifactor authentication QUESTION 428 A company has a server with redundant power supplies. Which of the following is this an example of? Traffic shaping Caching engines Fault tolerance Load balancing Answer: C QUESTION 429 A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches? PoE STP NAT VTP Answer: A QUESTION 430 A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may 140

141 have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
Broadcast storm TX/RX cables reversed Mismatched MTU Incorrect routing table Answer: B QUESTION 431 Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session? SCP SNMPv3 SSL SSH Answer: D QUESTION 432 A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find? AP isolation DDoS Evil twin Rogue AP QUESTION 433 A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT? Escalate to the management team Change the IP address back to its previous state Test the theory by analyzing logs Create a plan of action to present to management Answer: C QUESTION 434 Which of the following are standard fiber cable connector types? (Select TWO).

142 RJ-11 F-connector MTRJ DB-9 ST Answer: CE QUESTION 435 A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this? Crossover Rollover Loopback Straight cable Answer: A QUESTION 436 Hubs are differentiated from switches in that between the two, only hubs have: a single collision domain. a single broadcast domain. multiple collision domains. multiple broadcast domains. QUESTION 437 The phone company has provided a channelized T1 line. Which of the following should this line be connected to? Switch CSU/DSU IDF MDF Answer: B QUESTION 438 Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector? BNC connection 110 block Plenum LC connector

143 Answer: B QUESTION 439 A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP? Man-in-the-middle DDoS Evil twin War driving Answer: C QUESTION 440 An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this? Baseline analyzer Ping Protocol analyzer Nessus Answer: D QUESTION 441 A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following? Strong RC4 encryption Shared secret keys AES encryption Key rotation QUESTION 442 A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used? Social engineering Packet sniffing Rogue access point

144 QUESTION 443 A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review? Signal strength SSID name WPA2 encryption WEP encryption Answer: A QUESTION 444 A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards? NIC bonding Proxy server Firewall ACLs VLANs QUESTION 445 Which of the following assists a network administrator in reverse engineering malware and viruses? Virtual switches Virtual machines IDS Answer: B QUESTION 446 A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step? Identify the problem Question the user Establish a plan of action Establish a theory of probable cause Answer: C QUESTION 447 Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

145 Application Physical Presentation Transport Data Link Network Answer: BE QUESTION 448 At which layer of the OSI model do MAC addresses operate? Answer: A QUESTION 449 A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments? The newly installed switch is defective and must be returned. The newly installed switch is using a different MAC address than the previous switch. The technician forgot to change the VTP mode on the new switch to server. The technician did not use the correct cable when trunking the new switch. Answer: D QUESTION 450 A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host? The network administrator should install and configure a traffic analysis server. The network administrator should install and configure a DMZ server. The network administrator should install and configure a syslog server. The network administrator should install and configure a network sniffer. Answer: C QUESTION 451 A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?

146 A. /26 B. /27 C. /28 D. /29 Answer: B QUESTION 452 A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work? Change management Asset management Access log Baselines Answer: A QUESTION 453 An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network? SNMPv3 VTP CDP IPSec QUESTION 454 Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of Mbps? DS3 E3 OC3 T3 Answer: C QUESTION 455 A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example? Packet filtering Hardware firewalls

147 Port security Stateful inspection Answer: C QUESTION 456 Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance? QoS Fault tolerance Load balancing Traffic shaping Answer: D QUESTION 457 Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted? Environmental monitor OTDR Cable tester Punch down tool Answer: A QUESTION 458 A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring? MDF VPN RDP IDF QUESTION 459 MIMO technology in the n standard provides for which of the following benefits? Channel expansion Gigabit wireless bandwidth Multipath support Channel bonding

148 QUESTION 460 A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements? Dipole Parabolic Directional Omni-directional Answer: C QUESTION 461 If a technician does not assign an IP address to a device, the DHCP server will assign the device static IP address. reservation. dynamic IP address. MAC address. QUESTION 462 A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem? Crosstalk Bad connectors Wrong DNS Duplicate IP address Answer: A QUESTION 463 Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable? QoS CARP VLAN DHCP server Answer: B QUESTION 464 Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?

149 DNS server Content filter Proxy server Load balancer Answer: D QUESTION 465 All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue? STP convergence Power failure Excessive bandwidth usage Broadcast storm QUESTION 466 Which of the following STP states indicates an inactivated port due to a loop? Disabled Learning Blocking Forwarding Answer: C QUESTION 467 Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance? T1 crossover Singlemode fiber CAT6a Coaxial QUESTION 468 A number of remote users have reported being unable to securely log on to the company's network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?

150 150 Plan to reboot the concentrator as the potential solution
Escalate the problem to management Continue to speak to users, questioning if changes have been made Test access to the concentrator to confirm the status Answer: D QUESTION 469 In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types? Peer-to-peer Point-to-multipoint Hybrid Point-to-point Answer: B QUESTION 470 A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below? Querying active state... TCP Global Parameters Receive-Side Scaling State : enabled Chimney Offload State : disabled Receive Window Auto-Tuning Level : normal Add-On Congestion Control Provider : ctcp ECN Capability : disabled RFC 1323 Timestamps : disabled net netstat nbtstat netsh QUESTION 471 Which of the following can use a third party back-end LDAP user database for authentication? ISAKMP TACACS+ PKI CHAP 150

151 Answer: B QUESTION 472 A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users' PCs with issues all have IP addresses that start with x.x. The technician completes the replacement and powers on the new DHCP server. Which of the following is the BEST way to provide the PCs with issues a new IP address? Statically assign a legitimate IP address, and then set the PCs' NICs to DHCP Inform each user to replace with Wait five minutes until the PC resends a DHCP request Run netstat on each PC and then reboot into safe mode Answer: C QUESTION 473 A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed? Honeynet Signature based IPS Behavior based IPS Host based IPS QUESTION 474 Which of the following network topologies is ONLY possible between two users? Star Client-server Hybrid Peer-to-peer Answer: D QUESTION 475 Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann's problem? Computer_ASwitch_A IP: Int VLAN10 SM: IP address /28 GW: Speed 100 Duplex Full Change the duplex on the switch interface to half Change the speed on the switch interface to 10Mbps

152 Change the subnet mask of the computer to 255.255.255.240
Change the IP address of the computer to Answer: D QUESTION 476 A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST? Traffic analyzer Network sniffer SNMPv3 System logs Answer: A QUESTION 477 Users report that they are unable to access the production server with IP address These users need to be provided access without changing any subnet to VLAN information. The VLANs configured on the network are listed below: DepartmentVLAN #Subnet used Marketing /28 Customer Service /28 Finance /28 WHSE /28 Sales /28 The users experiencing this issue need to be added to which of the following VLANs? 25 30 35 40 Answer: C QUESTION 478 A technician is installing an n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using? A a B b C g D n Answer: B

153 QUESTION 479 Which of the following firewall rules will block destination telnet traffic to any host with the source IP address /24? Deny any source host on source port 23 to destination any Deny any source network /24 to destination any on port 23 Deny source host on source port 23 to destination any Deny any source network /24 with source port 23 to destination any Answer: B QUESTION 480 Which of the following addresses is a class B private address? A B C D Answer: D QUESTION 481 A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue? Configure the main network to Class C Allow for duplicate IP addresses Allow the main network to handle DHCP Create a spanning tree to prevent switching loops Answer: C QUESTION 482 Which of the following configurations of a wireless network would be considered MOST secure? WEP using MAC Filtering WEP and hiding the SSID WPA2 WPA TKIP and hiding the SSID QUESTION 483 Which of the following is the minimum subnet mask to allow and to be on

154 the same subnet? A. /19 B. /21 C. /22 D. /24 Answer: B QUESTION 484 DHCP uses which of the following ports by default? 21 23 68 D. 443 Answer: C QUESTION 485 Which of the following describes a manually entered route? Static Dynamic Multicast Unicast Answer: A QUESTION 486 Which of the following is the unit used to transfer information at Layer 2 of the OSI model? Packet Socket Session Frame Answer: D QUESTION 487 A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used? Virtual switch Virtual server Virtual desktop Virtual PBX

155 Answer: D QUESTION 488 A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client's wireless network to help ensure that interference from other wireless networks is at a minimum? WPA encryption key selection Channel selection Antenna types Disable SSID Answer: B QUESTION 489 A MAC address is a part of which of the following OSI model layers? Network Data Link Physical Transport QUESTION 490 Which of the following is the reason why a company's network may contain a DHCP server? To assign IP addresses to devices on the network To convert IP addresses to fully qualified domain names To provide POP3 and IMAP functionality To allow secure remote access Answer: A QUESTION 491 A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue? dB loss Distance Incorrect connector type EMI Crosstalk

156 QUESTION 492 Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated? Cable tester Punch down tool Crimper Multimeter Answer: A QUESTION 493 An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using? Telnet RADIUS SSH SNMP Answer: D QUESTION 494 Which of the following characteristics allows an g WAP to have transfer speeds up to 108Mbps? MIMO technology Channel bonding Encryption type Frequency Answer: B QUESTION 495 The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this? Allow VLAN routing Enable packet filtering on the switch Allow remote administration of the switch Enable MAC filtering on the switch Answer: C QUESTION 496 Ann, a technician, installs a wireless router in a network closet in a large office. She then configures all workstations in various offices on that floor to use the wireless connection.

157 Maximum connection speed at each workstation is 54 Mbps
Maximum connection speed at each workstation is 54 Mbps. Some users complain that their network connection is very slow. Which of the following is MOST likely the problem? Workstations were configured with the wrong connection speed on the wireless adapter. Users with a slow connection are too far away from the wireless router. Users that cannot connect are configured on the wrong channel. Wireless network SSID is incorrect. Answer: B QUESTION 497 Which of the following dynamic routing protocols selects routing paths based upon hop count? BGP RIP OSPF IGRP QUESTION 498 A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST? Determine if anything has changed Once a theory is confirmed determine the next step is to resolve the problem Implement the solution or escalate as necessary Question the obvious Answer: A QUESTION 499 A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements? Use two combined Internet/router/wireless devices, one in each house. Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house. Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house. Use a single combined Internet/router/wireless device at the guest house. Answer: C QUESTION 500 Which of the following cable types is MOST commonly used with POTS? A. CAT3

158 Multimode CAT6 Coaxial Answer: A QUESTION 501 Which of the following is used to determine whether or not a user's account is authorized to access a server remotely? VPN RDP LDAP Encryption Answer: C QUESTION 502 A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following? Signature based IDS Behavior based IPS Host based IPS Network based IDS Answer: B QUESTION 503 Which of the following technologies prevents network collisions to maximize safe delivery of network data? CSMA/CA DWDM RADIUS SONET QUESTION 504 Which of the following are authentication methods that can use AAA authentication? (Select TWO). Kerberos PKI TKIP/AES MS-CHAP TACACS+

159 Answer: EF QUESTION 505 A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc? Premise router ISP router Smart jack CSU/DSU Answer: C QUESTION 506 Which of the following are considered AAA authentication methods? (Select TWO). Kerberos Radius MS-CHAP TACACS+ E X Answer: BD QUESTION 507 An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory? Toner probe Loopback plug Protocol analyzer Multimeter Answer: D QUESTION 508 A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch? ISAKMP Port forwarding Port security Port mirroring

160 QUESTION 509 A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring? Layer 1 Layer 3 Layer 5 Layer 7 Answer: A QUESTION 510 The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following? APIPA MAC IPv4 IPv6 Answer: D QUESTION 511 An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design? Ring Star Bus Mesh Answer: C QUESTION 512 A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability? Honeypot Butt set Spyware Blue jacking Answer: B QUESTION 513 160

161 Which of the following is used to explain guidelines for users while using network resources?
Network cut sheet Baselines Acceptable use policy Regulations Answer: C QUESTION 514 Standards such as JPEG and ASCII operate at which of the following OSI model layers? Presentation Data link Session Application Answer: A QUESTION 515 Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern? STP RG-6 Fiber RG-59 QUESTION 516 Which of the following is true of a client/server topology? Virtual servers are used to stream data to other remote servers Servers are used to connect to centralized clients Remote clients connect to a centralized server Remote clients connect to each other via a virtual server QUESTION 517 Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO). TFTP SNMP POP3 IMAP4

162 E. SFTP Answer: CD QUESTION 518 Which of the following is a common connector used on a coaxial cable? RJ-45 DB-25 BNC LC Answer: C QUESTION 519 Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination? route netstat traceroute D. ping QUESTION 520 A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this? Content filter Packet filter IPS IDS Answer: A QUESTION 521 Which of the following differentiates a layer 3 switch from a layer 2 switch? Routing Bridging Switching Repeating QUESTION 522 A multi-layer switch operates at which of the following OSI layers?

163 Layers 1 and 5 Layers 2 and 3 Layers 4 and 5 Layers 5 and 6 Answer: B QUESTION 523 Which of the following is a link state routing protocol? RIPv2 BGP IS-IS RIP Answer: C QUESTION 524 A technician needs to make a web server with a private IP address reachable from the Internet. Which of the following should the technician implement on the company firewall? DOCSIS NAT CIDR VPN QUESTION 525 Which of the following defines an IP address that is NOT routed on the Internet? Multicast Public Private Classful QUESTION 526 Drag and Drop Question Under each network device, drag and drop the associated broadcast and/or collison description. Objects may be used multiple times, as needed.

164 Answer: QUESTION 527 A network administrator has been assigned the /26 network and assigns the following computer's IP addresses:

165 When the administrator tries to ping the other computers from , an ECHO REPLY is not received. Which of the following must the network administrator do? A. Change the IP of to B. Change the IP of to Change the default gateway of accordingly. Reconfigure the switch for the right VLAN. Answer: B QUESTION 528 Which of the following authentication solutions use tickets that include valid credentials to access additional network resources? Kerberos RADIUS Multi-factor authentication TACACS+ Answer: A QUESTION 529 Which of the following protocols is used to provide secure authentication and encryption over non- secure networks? TLS PPTP HTTP QUESTION 530 Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections? Access control lists Port address translation Blocking unauthorized ports Stateful inspection Answer: D QUESTION 531 Which of the following has the LEAST amount of collisions in a domain?

166 Bridge Hub Repeater Switch Answer: D QUESTION 532 Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address? Subnet IANA prefix EUI-64 Site-local Answer: C QUESTION 533 Which of the following would be used to place extranet servers in a separate subnet for security purposes? VPN NAT DMZ IDS QUESTION 534 Which of the following WAN technologies has synchronous up/down speeds? T1 ADSL Satellite Cable broadband Answer: A QUESTION 535 Which of the following specifications would Sara, an administrator, implement as a network access control? A q B C n D x

167 QUESTION 536 Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted s? Whaling Impersonation Privilege escalation Spear phishing Answer: A QUESTION 537 Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities? XSS SQL injection Directory traversal Packet sniffing Answer: D QUESTION 538 Which of the following provides the MOST protection against zero day attacks via attachments? Anti-spam Anti-virus Host-based firewalls Patch management QUESTION 539 Which of the following access controls enforces permissions based on data labeling at specific levels? Mandatory access control Separation of duties access control Discretionary access control Role based access control QUESTION 540 A username provides which of the following?

168 Biometrics Identification Authorization Authentication Answer: B QUESTION 542 Use of group accounts should be minimized to ensure which of the following? Password security Regular auditing Baseline management Individual accountability Answer: D QUESTION 543 Privilege creep among long-term employees can be mitigated by which of the following procedures? User permission reviews Mandatory vacations Separation of duties Job function rotation Answer: A QUESTION 544 Which of the following wireless standards is capable of ONLY operating on 5.8GHz? A a B b C g D n QUESTION 545 Which of the following protocols are used to connect devices in a secure manner? (Select TWO). TELNET SSH RDP HTTP DNS FTP

169 Answer: BC QUESTION 546 Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software? RDP SSL VPN ISAKMP TLS 2.0 Answer: B QUESTION 547 Which of the following is based ENTIRELY on using ICMP packets? Social engineering NMAP Buffer overflow attack Smurf attack Answer: D QUESTION 548 Which of the following could be used to stop unknown threats? DMZ Signature based IPS Behavior based IPS Honeypots Answer: C QUESTION 549 Which of the following describes a DNS server? Translates an IP address to a name Caches commonly viewed web pages Assigns IP addresses to network devices Provides port security for a network Answer: A QUESTION 550 A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the technician do NEXT? A. Implement the solution

170 170 Question users Test the theory Escalate the problem Answer: C
A company has just installed wireless in their office. In one corner of the office building users are not able to establish a connection. Which of the following can be changed on the AP to help resolve this issue? SSID Channels Signal strength Encryption QUESTION 552 Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps? CAT3 CAT5 CAT5e CAT6 Answer: B QUESTION 553 A company has installed an access point and configured it to broadcast at n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect? Incorrect channel Weak encryption Incompatible NICs Incorrect SSID QUESTION 554 Which of the following will allow multiple frequencies to be combined? WiMAX MPLS MIMO Channel bonding Answer: D 170

171 QUESTION 555 Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP? NAT RIP PAT ACL Answer: A QUESTION 556 Which of the following allows a technician to gather information about the operating system? Domain services Fingerprinting Countermeasures Reconnaissance Answer: B QUESTION 557 Which of the following is indicative of an FTP bounce? Arbitrary IP address Reverse DNS lookups Same Port Number File Transfer Success QUESTION 558 The software that allows a machine to run multiple operating systems at once is called the: server manager hypervisor boot loader partition manager QUESTION 559 Which of the following routing protocols relies on hop count as its ONLY metric? BGP EIGRP OSPF

172 D. RIP Answer: D QUESTION 560 A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: Subnet Mask: Default Gateway: DNS address: Broadcast address: DNS address Subnet mask Default gateway Broadcast address IP address Answer: C QUESTION 561 A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following? Phishing Social engineering Man-in-the-middle Shoulder surfing QUESTION 562 Which of the following is the BEST way to mitigate security threats on a network? User training Incident response Answer: B QUESTION 563 Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks? A. An IPS

173 A protocol analyzer A traffic shaper An IDS Answer: A QUESTION 564 Which of the following is an IPv6 address? A. 00:14:38:05:7B:E5 B C D. 2001:cdba::3257:9652 Answer: D QUESTION 565 A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access? Site-to-site VPN Network-based firewall SSL VPN Host-based firewall Answer: C QUESTION 566 Which of the following is a routed protocol that functions at layer 3 of the OSI model? IP Frame relay PPP ADSL QUESTION 567 Something you have, something you are, and something you know are the three tenets of: social engineering change management remote access access control QUESTION 568

174 A firewall that operates at Layer 7 of the OSI model is known as a(n):
circuit gateway packet filter application level redundant firewall Answer: C QUESTION 569 Which of the following allows a central point to simultaneously address other points without addressing all of them? Multicast Subnetting Unicast Broadcast Answer: A QUESTION 570 Which of the following technologies is used on cellular networks? Ethernet CDMA CSMA/CA POTS Answer: B QUESTION 571 Which of the following WAP security features offers the STRONGEST encryption? WPA WPA2 WEP Hidden SSID QUESTION 572 Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies? A a B b C g D n Answer: D

175 QUESTION 573 Which of the following mediums is circuit switched? PSTN ATM Frame relay MPLS Answer: A QUESTION 574 Which of the following is true about tunneling and encryption? SIP encrypts all data going through the tunnel. PPTP creates a secure tunnel. SSL VPN provides a secure tunnel. RAS is a secure way to create a tunnel. Answer: C QUESTION 575 Which of the following is a secure way to connect to a device? RSH TFTP SNMPv2 SFTP Answer: D QUESTION 576 Which of the following connector types would Sandy, a network technician, use to connect a serial cable? RJ-11 BNC LC DB-9 QUESTION 577 Which of the following are network topologies? (Select TWO). Ethernet Duplex Star

176 Circular Bus Answer: CE QUESTION 578 Which of the following uses eight groups of characters for addressing? MAC IPv4 IPv6 DHCP Answer: C QUESTION 579 A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress? Phishing Social engineering Man-in-the-middle Smurfing Answer: B QUESTION 580 Which of the following is the MOST economical way for Sandy, a technician, to implement Gigabit Ethernet at a datacenter? 10GBaseLR 10GBaseSR 10GBaseX 10GBaseT Answer: D QUESTION 581 Which of the following is the network topology in which computers connect in a closed circle? Mesh Ring Star

177 QUESTION 582 Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server? RTP NTP TFTP ARP Answer: B QUESTION 583 An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be installed? A a B b C g D n Answer: D QUESTION 584 Which of the following cables has the MOST twists per inch? CAT3 CAT5 CAT5e CAT6 QUESTION 585 Which of the following is true about an IP address if the first bit is a one and the second bit is a zero? The address is a Class A address. The address is a Class B address. The address is a Class C address. The address is a Class D address. QUESTION 586 Which of the following cables is MOST likely to be terminated into a patch panel? Serial RG-6 RG-59

178 D. CAT6 Answer: D QUESTION 587 Which of the following MUST be kept synchronized in order for Kerberos to work? Certificate Ticket Time Token Answer: C QUESTION 588 Which of the following MUST be used when securing a VoIP network consisting of private IP addresses? IPS Application layer firewall IDS An unmanaged switch Answer: B QUESTION 589 Which of the following uses certificates as a form of security? Kerberos LDAP PKI CHAP QUESTION 590 Which of the following cables will MOST likely be used to connect to a satellite dish? RG-6 CAT5e Fiber CAT6 Answer: A QUESTION 591 A VoIP line will MOST likely have which of the following connectors?

179 RJ-11 DB-25 BNC RJ-45 Answer: D QUESTION 592 Which of the following is a proprietary routing protocol? RIP EIGRP OSPF BGP Answer: B QUESTION 593 Which of the following is an invalid MAC address? A. AA:CE:58:FD:90:08 B. 44:98:3E:F8:33:23 C. 56:AD:BX:89:55:54 D. 94:9E:FE:EE:8C:DF Answer: C QUESTION 594 Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network? Star Mesh Bus Ring QUESTION 595 A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage? netsh lan netsh interface netsh wlan netsh winsock

180 QUESTION 596 Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO). Cable modem Layer 2 switch Router NIDS Layer 3 switch Answer: CE QUESTION 597 Which of the following operates at OSI layer 2 to forward traffic based on the MAC address? Switch Proxy Server VPN Concentrator Answer: A QUESTION 598 The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? 1 3 4 5 Answer: C QUESTION 599 Which of the following is used to provide hot standby capabilities using paired routers? CARP L2TP PPTP ISAKMP QUESTION 600 Which of the following is used to assign an IP address to a device? A. DHCP 180

181 NTP DNS RADIUS Answer: A QUESTION 601 Which of the following protocols is used to transmit outgoing ? RDP POP3 SMTP Answer: D QUESTION 602 A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting? Channel SSID Firewall rule Encryption QUESTION 603 A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue? Identify the problem. Establish a plan of action to resolve the problem. Establish a theory of probable cause. Implement preventative measures. QUESTION 604 Which of the following is a purpose of a VLAN? Decreases bandwidth on a network Segments broadcast traffic Increases port speed Allows another connection to the router Answer: B

182 QUESTION 605 Which of the following would Sandy, a technician, find in a network map? QoS standards MDF/IDFs System logs Firewall rules Answer: B QUESTION 606 Which of the following protocols would be used to send to an server? NTP FTP SNMP SMTP Answer: D QUESTION 607 Which of the following default ports would need to be open on a firewall to allow remote desktop access? A. 143 B. 443 C D Answer: C QUESTION 608 After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly? Punch down tool Cable certifier Loopback plug Toner probe QUESTION 609 Which of the following DNS records would allow for a website to have more than one FQDN? TXT PTR MX

183 D. CNAME Answer: D QUESTION 610 A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment? PoE Layer 3 switching STP VLAN Answer: A QUESTION 611 Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem? The channels are overlapping with other wireless networks and should be changed. The SSIDs are incompatible and should be renamed. The users have incompatible wireless network cards and should upgrade. The default idle period for logoff is too short and should be changed to a longer limit. QUESTION 612 A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot? Scope Reservation Option Lease Answer: C QUESTION 613 Which of the following network topologies would be the BEST choice in providing network redundancy for an organization? Star Hybrid Mesh Point to Point

184 Answer: C QUESTION 614 Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements? Load balancing Traffic policing Caching engines Traffic shaping QUESTION 615 A network technician suspects that there is an issue with the routing table on a Windows- based server. Which of the following commands will enable the technician to validate this hypothesis? route print route ipconfig tracert Answer: A QUESTION 616 During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage? Wrong gateway Failed router Bad switch module Incorrect VLAN Answer: B QUESTION 617 A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements? A firewall A router A hub A Layer 2 switch

185 QUESTION 618 Matt, an administrator, notices a flood fragmented packet and retransmits from an server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue? Spam filter Protocol analyzer Web application firewall Load balancer Answer: B QUESTION 619 Which of the following BEST describes how a layer 2 switch functions? Switches packets within the same subnet based on MAC addresses Switches packets between different subnets based on IP addresses Switches packets between different subnets based on MAC addresses Switches packets within the same subnet based on IP addresses Answer: A QUESTION 620 Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified? FastEthernet 0/0 AUX 0 Console 0 Serial 0/0/0 QUESTION 621 Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue? Incorrect VLAN tagging Missing helper addresses Wrong default gateway Improper routing protocols QUESTION 622 Which of the following subnet masks would allow for and to be in the

186 same subnet? A B C D Answer: A QUESTION 623 Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address Jeff is able to ping the router at from the switch. Which of the following is the MOST likely cause of the problem? The subnet mask is incorrect. A routing loop has occurred. Jeff used a crossover cable to connect the switch to the gateway. The server is missing default-gateway information. Answer: D QUESTION 624 Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? Incorrect DNS Incorrect subnet mask Duplicate IP address Incorrect SSID QUESTION 625 Which of the following is the default subnet mask for a Class B address? A B C D Answer: B

187 QUESTION 626 Which of the following default ports would need to be disabled to block TFTP traffic? 20 21 69 D. 123 Answer: C QUESTION 627 Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? 22 23 QUESTION 628 Which of the following ports is the default telnet port? Answer: D QUESTION 629 Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). C. 143 D. 161 E. 162 F. 8080 Answer: DE QUESTION 630 Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?

188 A a B b C g D n Answer: A QUESTION 631 Kim, a network technician, is installing an n network. Which of the following should Kim enable to ensure that the network only allows n clients? Name the SSID on the n network only Limit the DHCP address pool Disable b and g Only use WPA encryption Answer: C QUESTION 632 Zach, a technician, is installing an n network. Which of the following should he disable to stop broadcasting the network name? Channel WEP SSID WPA QUESTION 633 Which of the following default services uses TCP/UDP port 88? LDAP IGMP HTTP Kerberos Answer: D QUESTION 634 Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? 20 53 80 D. 3389 Answer: B

189 QUESTION 635 Which of the following uses port 53 by default? RDP QoS DHCP DNS Answer: D QUESTION 636 Which of the following ports does DHCP use? (Select TWO). 22 23 67 68 69 Answer: CD QUESTION 637 Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO). 25 53 80 E. 443 Answer: DE QUESTION 638 Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? 21 Answer: A QUESTION 639 Which of the following ports are MOST commonly used to interactively configure a networking

190 190 device? (Select TWO). 21 22 23 53 67 Answer: BC QUESTION 640
In order to reduce spam , Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587? 20 25 Answer: D QUESTION 641 A company would like all HTTP traffic to filter through a proxy server on port Which of the following port numbers needs to be redirected through the proxy server to accomplish this? 80 C. 143 D. 443 Answer: B QUESTION 642 A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO). E. 8080 Answer: BD QUESTION 643 An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (Select TWO). 190

191 Allow UDP port 21 outbound
Allow TCP port 21 outbound Allow TCP port 22 outbound Allow TCP port 80 outbound Answer: EF QUESTION 644 An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured? Allow TCP port 3389 outbound Allow UDP port 3389 inbound Allow UDP port 3389 outbound Allow TCP port 3389 inbound Answer: D QUESTION 645 An organization recently installed a firewall on the network. Employees must be able to send and receive from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO). Allow TCP port 23 Allow TCP port 25 Allow TCP port 110 Allow UDP port 25 Allow UDP port 110 Answer: BC QUESTION 646 Which of the following protocols uses port 3389? IMAP DHCP SSH RDP QUESTION 647 Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank

192 website. Which of the following rules would BEST allow access to the bank website?
Allow UDP port 53 Allow TCP port 80 Allow UDP port 340 Allow TCP port 443 Answer: D QUESTION 648 A network technician has configured a new firewall to allow TCP port 80 traffic and deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies by attempting to access a popular website. Which of the following will MOST likely correct the error? HTTP uses UDP DNS port 23 needs to be allowed HTTP needs port 443 allowed UDP port 53 needs to be allowed QUESTION 649 A network technician needs to address bandwidth issues on the wireless network. There are currently four n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution? Disable SSID Channel bonding MIMO Increase the signal Answer: B QUESTION 650 An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on the executive's desk. The office contains four other n access points. Which of the following would MOST likely correct interference problems in the executive's office? Turn off SSID broadcasting for the executive's access point. Replace the n access point in the office with an a access point. Change the channel on the access point to channel 11. Turn off as many lights in the executive's office as possible to reduce interference. Answer: C QUESTION 651 A network technician needs to install an additional access point to the company's wireless

193 network. The network has two 802. 11b access points
network. The network has two b access points. Which of the following channels should be used to allow the access point's coverage areas to overlap? A. 1, 6, 11 B. 2, 5, 10 C. 3, 13, 23 D. 4, 8, 16 Answer: A QUESTION 652 Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue? Change the security method Reduce the transmission power Change the SSID Change the frequency Answer: B QUESTION 653 An g wireless access point was configured as follows: AP encryption forced to WPA2-AES mode only MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40 Which is true about the above configuration? Any b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. An a compatible client can connect to the wireless network only if its MAC address is ab-29-da-c3-40 and the encryption key is known by the client. An n compatible client can connect to the wireless network only if its MAC address is ab-29-da-c3-40 and the encryption key is known by the client. Any g compatible client can connect to the wireless network if the encryption key is known by the client. Answer: C QUESTION 654 Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks? PPPoE authentication MAC filtering WPA encryption

194 D. Wireless channel Answer: D QUESTION 655 A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured? SSID disable ACL rules WPA encryption MAC filtering QUESTION 656 company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? Content filtering on the wireless access point Allow traffic from the wireless access point Block traffic from the wireless access point Packet filtering on the wireless access point Answer: C QUESTION 657 Which of the following occurs when antenna gain is increased on an access point? Connection speeds decrease Throughput decreases Cell size increases Attenuation increases QUESTION 658 Which of the following technologies allows more than two transceivers with an access point? MIMO FIFO C x D. WPA Answer: A QUESTION 659

195 Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). WPA encryption Changing wireless channels MAC filtering Changing wireless speed standards SSID disable Answer: AC QUESTION 660 Kim, a technician, is configuring an n access point. Other WAPs on the network use b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? Enable mixed mode Disable SSID Disable encryption Enable `n' only mode Answer: A QUESTION 661 Lisa, an administrator, has set up an n wireless network. Users with n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at g speeds. Which of the following would MOST likely fix this issue? Enable wireless multimedia (WMM) for QoS Use the 40MHz channels in the 2.4GHz band Enable access point antenna isolation Limit the clients to g compatible laptops QUESTION 662 Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support? PoE and QoS LACP and OSPF C x and n D. NAT and VTP

196 QUESTION 663 Which of the following would Kim, a technician, do to monitor remote traffic through an access point? Enable an SNMP agent Enable network mapping Set monitoring SSID Select WPA2 Answer: A QUESTION 664 Which of the following solutions will detect and disable a rogue access point? Port scan Packet sniffer IPS IDS Answer: C QUESTION 665 When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? ping arp route dig Answer: B QUESTION 666 Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution? Private IP Addressing Wireless Access Points Wide Area Networking Virtual Local Area Networks QUESTION 667 A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would

197 BEST improve connectivity?
Disable SSID broadcast Increase the signal strength Move the access point Change the broadcast channel Answer: C QUESTION 668 A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO). Router Wi-Fi Access point Cable modem Ten WiMAX adapters Ten CAT6 patch cables Answer: AB QUESTION 669 Which of the following security threats relies primarily on user deception and misinformation? Rogue access points DoS attacks Man-in-the-middle attacks Phishing Answer: D QUESTION 670 A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario? Protocol analyzer Punch down tool Multimeter Toner probe QUESTION 671 Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO). Dialup DSL

198 SONET Cable WiMAX LTE Answer: AB QUESTION 672 Which of the following connector types is MOST commonly used for serial connections? MTRJ RJ-11 RS-232 RJ-45 Answer: C QUESTION 673 A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration? Port filtering WEP MAC address filtering PoE QUESTION 674 Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF? Unicast MAC address. Invalid MAC address. Multicast MAC address. Broadcast MAC address. Answer: D QUESTION 675 Which of the following standards can operate at both 2.4Ghz and 5.0Ghz? a b g n

199 QUESTION 676 A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT? Test the theory Question the user Document the outcome Verify functionality Answer: D QUESTION 677 A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup? (1) 1000 foot CAT6 spool (1) crimper (1) 16 port gigabit switch (20) RJ-45 connectors (12) RJ-45 wall jacks (1) Compression tool Punch down tool Network map Multimeter Answer: B QUESTION 678 A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this? A. 143 B. 443 C D Answer: C QUESTION 679 A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT? Question users to determine if anything has changed Re-establish theory of probable cause Escalate problem to upper management

200 D. Document replacement of power supply
Answer: B QUESTION 680 Based on the packet capture below, which of the following services is the client requesting? 08:30: > : S : (0) win 8096 08:30: > : S : (0) ack win 8096 08:30: > : ack 1 win 8096 ARP SMTP DHCP DNS Answer: D QUESTION 681 A user receives a phone call at home from someone claiming to be from their company's IT help desk. The help desk person wants to verify their username and password to ensure that the user's account has not been compromised. Which of the following attacks has just occurred? Evil twin Phishing Man-in-the-middle Social engineering QUESTION 682 Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots? War chalking WPA cracking Packet sniffing QUESTION 683 Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive? Coaxial Crossover

201 Multimode fiber Straight-though Answer: D QUESTION 684 Which of the following wireless standards has a maximum rate of less than 50 Mbps? A a B b C g D n Answer: B QUESTION 685 A technician is tasked with replacing some older RS-232 serial printers. Which of the following ports would the technician most likely find on these printers? BNC DB-9 LC RJ-11 QUESTION 686 An office has an a access point. A technician has been asked to identify devices that are compatible with this AP. Which of the following devices is MOST likely compatible? An 802.1q SOHO router An b tablet computer An g laptop An n smartphone QUESTION 687 A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this? Stateful inspection WEP WPA Open with EAP Answer: C

202 QUESTION 688 The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators? Asset management System baselines System logging Change management Answer: D QUESTION 689 A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator's account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack? Network maps Log analysis Protocol analyzer Answer: C QUESTION 690 Which of the following exist at layer three of the OSI model? (Select TWO). NIC Switch Frame Packet Router Cable Answer: DE QUESTION 691 Which of the following transmission methods do DHCP enabled devices use to request an IP address? Broadcast Directed broadcast Unicast Multicast Answer: A QUESTION 692 Which of the following operate at the Data Link layer of the OSI model? (Select TWO).

203 MAC address Router Hub Switch IP address Answer: AD QUESTION 693 Which of the following devices acts as a gateway between clients and servers? WINS server Proxy server Content filter DNS server Answer: B QUESTION 694 Which of the following routing protocols can be utilized as both an IGP and EGP? EIGRP RIP IGRP RIPv2 Answer: A QUESTION 695 Which of the following is used to describe trunking VLANs on a network? A a B i C q D x Answer: C QUESTION 696 An administrator notices that a computer on the network is unable to reach any of the servers by hostname. The computer has connectivity to the network and is able to ping all the devices by IP address. Which of the following can cause the error? The workstation has a duplicate IP address. The workstation has been assigned to the wrong VLAN. The workstation has the wrong gateway configured. The workstation has the wrong DNS configured.

204 Answer: D QUESTION 697 Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer? 2 3 4 5 Answer: C QUESTION 698 Users are contacting the internal helpdesk, stating that they are having difficulty staying connected to the wireless network. When the technician investigates, it is discovered that the users are having a problem using the wireless network in the company break rooms. Which of the following should the technician do FIRST? Install a new access point in each break room to provide adequate coverage. Remount the access points to a place on the ceiling closer to the break rooms. Unplug appliances (e.g. microwaves) to see if they are causing interference. Change the encryption on the access points from WPA2 to WEP. QUESTION 699 A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change? Access Point 1Access Point g802.11b Encryption: WPA2Encryption: WEP Channel: 1Channel: 7 SSID. CompanyWiFiSSID. Visitor Change the SSID on Access Point 2 to OPEN. Disable SSID broadcasting on Access Point 1. Change the encryption on Access Point 2 to WPA2. Remove the WEP encryption from Access Point 2. QUESTION 700 An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality? A. Layer 3 managed switch

205 VPN concentrator Load balancer Content filter Answer: D QUESTION 701 A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements? HIDS NIDS NIPS HIPS Answer: B QUESTION 702 A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose? WEP WPS WPA WPA2 Answer: A QUESTION 703 A technician needs to verify the time of a power outage. Which of the following may be used to determine this information? Network baseline Tracert System logs Protocol analyzer Answer: C QUESTION 704 A network administrator needs to ensure there is no same channel interference for an n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels? A. 36, 40, 44, 48 B. 36, 44, 52, 60

206 C. 36, 44, 48, 52 D. 36, 48, 60, 64 Answer: B QUESTION 705 The protocol SNMP uses which of the following ports by default? 53 61 67 D. 161 Answer: D QUESTION 706 A technician notices that guests have plugged their laptops into a network wall jack located in the conference room. Which of the following could the technician implement in order to ensure that ONLY employees are able to access network resources? Port mirroring VTP configuration MAC address filtering Traffic filtering Answer: C QUESTION 707 Which of the following IP address/CIDR combinations represent public address space? (Select TWO). A /8 B /16 C /16 D /16 E /24 F /32 Answer: BE QUESTION 708 Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates? PKI Kerberos TACACS+ RADIUS

207 Answer: A QUESTION 709 A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions? MAC filtering Port filtering IP filtering ACL filtering QUESTION 710 When dealing with high bandwidth applications such as VoIP and VTC, which of the following network performance optimization tools should be implemented to ensure BEST performance? Fault tolerance Load balancing Caching engines QoS Answer: D QUESTION 711 A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible? Traffic shaping High availability QUESTION 712 Which of the following contains the SYN and ACK flags? UDP header IP header TCP header ICMP header Answer: C QUESTION 713

208 Which of the following remote access protocols is commonly used for command line access to a device?
RAS VPN RDP SSH Answer: D QUESTION 714 A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used? SNMPv3 FTP TFTP Telnet Answer: A QUESTION 715 An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this? Network Address Translation Stateful Inspection Port Address Translation Demilitarized Zone QUESTION 716 An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this? Stateful Packet Inspection QUESTION 717 Which of the following would be considered a Class C private address? A

209 B C D Answer: B QUESTION 718 Which of the following protocols is used to detect and eliminate switching loops within a network? Spanning Tree Protocol EIGRP OSPF Dynamic routing Answer: A QUESTION 719 A technician is attempting to set up a new laptop for a user. The user's old laptop connects to the corporate wireless network "CompanyWiFi" automatically. However, when the technician looks for the "CompanyWiFi" network on the new laptop, he does not find it in the list of available networks. Both laptops have g wireless network adapters and are sitting next to each other on the user's desk. Which of the following would MOST likely be the reason that the new laptop cannot see the "CompanyWiFi" network? Loss of signal strength Incorrect WEP key was input RFID interference from other electronic devices SSID broadcasting is disabled on the WAP Answer: D QUESTION 720 A technician is troubleshooting a network connectivity issue on a laptop. The technician wants to verify the NIC is functioning on the laptop. Which of the following commands should the technician use? A. ping B. ping C. tracert D. nslookup QUESTION 721 A technician is upgrading the wiring in an older office building. The building currently contains some CAT3, CAT5, and CAT6 cables. The technician cannot visually distinguish between the cables because they are all the same color. Which of the following tools would help the technician determine which wires are the CAT3 and CAT5 cables needing to be replaced with CAT6 ones?

210 210 Cable certifier Toner probe Cable tester Crimper Answer: A
QUESTION 722 Which of the following are valid hosts for the Private IP Address range x /23? (Select TWO). A B C D E Answer: AC QUESTION 723 Which of the following is the wireless encryption standard associated with WPA2? AES-CCMP EAP WEP D x QUESTION 724 An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO). TCP 23 TCP 53 TCP 123 UDP 23 UDP 53 UDP 123 Answer: BE QUESTION 725 An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use? Ping Nessus 210

211 IMAP Telnet Answer: B QUESTION 726 An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using? MIMO AP isolation Channel bonding Burst mode Answer: C QUESTION 727 There has been an increase in Help Desk tickets related to web portal user accounts being locked out. Which of the following resources would be used to analyze the issue? Router logs Protocol analyzer Firewall logs Application logs Answer: D QUESTION 728 The MAC address of a network device is used to communicate at which of the following OSI layers? Layer 1 Layer 2 Layer 4 Layer 5 QUESTION 729 Which of the following is the default authentication method for a Windows client using PPP over a dialup connection? TACACS+ WINS Kerberos MS-CHAP

212 QUESTION 730 /8 notation denotes which of the following IPv4 subnet masks? A B C D Answer: A QUESTION 731 An attack used to find unencrypted information in network traffic is called: WEP cracking packet sniffing ping sweep social engineering Answer: B QUESTION 732 Which of the following OSI model layers is used to order packets which may have arrived out of order? Transport Presentation Network Session QUESTION 733 Which of the following describes the amount of time it takes for a packet to transmit from one switch to another? Hop count Latency MTU limit Distance vector QUESTION 734 Which of the following tools would a technician use to determine if a CAT6 patch cable has an open or short? A. OTDR

213 Cable tester Toner probe Protocol analyzer Answer: B QUESTION 735 A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone? Toner Probe Punch Down Tool Protocol Analyzer Butt Set Answer: D QUESTION 736 An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed? Proxy Server Load Balancer VPN Concentrator Web-Application Firewall Answer: C QUESTION 737 A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed? Behavior based IPS Signature based IDS Antivirus software Access Control Lists Answer: A QUESTION 738 Which of the following should the last line of an ACL normally contain? Explicit allow Statically routed Random access Implicit deny

214 QUESTION 739 A technician grabs a network cable and connects two switches together. However, the ports fail to come up as indicated by the link lights. Which of the following is MOST likely the issue? Wrong subnet mask on the interfaces Mismatched MTU size Straight through instead of cross over cable SSID mismatch between the switches Answer: C QUESTION 740 A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following? Interference Configuration Incorrect MTU size Incorrect IP Answer: A QUESTION 741 Which of the following allows n higher transfer speeds than the previous wireless standards? Dual frequency Enhanced encryption MIMO technology Backwards compatibility QUESTION 742 A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use? Loopback plug Multimeter Punch down Crimper QUESTION 743 A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST?

215 Upgrade the existing computers
Purchase a new ac access point and install. Install CAT6 wiring for the SOHO network Verify the network cards can support 1Gbps Answer: D QUESTION 744 A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider? CAT5e Cable CAT5 Cable Plenum Single mode fiber QUESTION 745 A technician is installing a wireless access points in an open warehouse 300 feet ( meters) long and 200 feet (60.96 meters) wide. Which of the following would be the LEAST number of devices needed to provide coverage to the entire building? 1 2 3 4 Answer: B QUESTION 746 A computer configured by DHCP has a listed DNS server and gateway. Which of the following allows these settings to be configured? Reservations Leases Scopes Options QUESTION 747 Which of the following do DHCP servers provide to requesting devices on the network? (Select TWO). Encryption SSID

216 Channels Suffixes VLAN assignments Answer: BE QUESTION 748 An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall. Using the default port numbers, which of the following should the administrator configure? (Select TWO). Allow port 443 Deny port 53 Deny port 20 Deny port 80 Allow port 23 Answer: AD QUESTION 749 Which of the following configuration management documents is used to describe how a computer performs after initial installation onto a network? Baseline Network map Asset management Installation guide Answer: A QUESTION 750 Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network? 10GBaseER 10GBaseSR 10GBaseTX 10GBaseT Answer: B QUESTION 751 A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing? Virtual desktops Virtual servers NaaS

217 D. SaaS Answer: C QUESTION 752 A technician is sorting patch cables into four bins labeled coaxial, crossover, straight- through, and fiber. The technician has a cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of the cable start with a green wire. Into which of the following bins should this cable be placed? Crossover Fiber Straight-through Coaxial Answer: A QUESTION 753 Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer? STP Port Mirroring VLANs PoE Answer: B QUESTION 754 Joe, a vendor, walks into a customer's site with a laptop. While waiting for his contact to arrive, he wants to check his . He discovers the SSID for the site's wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem? The customer's wireless router uses WPA encryption. The wireless router at the customer's site is configured with MAC filtering. The customer's WAP uses WEP encryption. The customer's IT department blocks all visitors from connecting to their network. QUESTION 755 Joe, a technician, is attempting to connect two hubs to add a new segment to his local network. He uses one of his CAT5 patch cables to connect them; however, he is unable to reach the new network segment from his workstation. He can only connect to it from a workstation within that segment. Which of the following is MOST likely the problem? One of the hubs is defective. The new hub is powered down.

218 The patch cable needs to be a CAT6 patch cable.
The technician used a straight-through cable. Answer: D QUESTION 756 An a wireless network is functioning at which of the following frequencies? 1.0 GHz 1.5 GHz 2.4 GHz 5.0 GHz QUESTION 757 An b wireless network has a maximum data rate of: 11 Mbps. 20 Mbps. 28 Mbps. 54 Mbps. Answer: A QUESTION 758 A technician is troubleshooting a printing issue where some users in an office are unable to print. Which of the following should be the FIRST step in troubleshooting this issue? Reboot each of the workstations Ask users if anything changed in their environment recently Advise users to move to a different office Power cycle the printer Answer: B QUESTION 759 A forward lookup zone converts which of the following? IP addresses to hostnames Hostnames to IP addresses MAC addresses to IP addresses IP Addresses to MAC addresses QUESTION 760 When implementing video streaming from the Internet to an always on device, it is best to employ

219 which of the following services to minimize latency issues?
QoS EIGRP PPTP OSPF Answer: A QUESTION 761 Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO). SSH 3DES AES SSL TLS TKIP Answer: CF QUESTION 762 CAT6 has how many twisted copper pairs? 2 4 6 8 16 Answer: B QUESTION 763 A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of g and n WAPs. Users are not able to view or connect to the n WAPs. Which of the following is MOST likely the cause? The g WAPs are not setup for backwards compatibility. The n WAPs are using a 2.4 GHz frequency channel. The n WAPs are using a 5 GHz frequency channel. The g WAPs all have disabled SSID broadcast. Answer: C QUESTION 764 A technician has resolved a ticket to fix a user's printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?

220 220 Document findings and outcomes
Establish a theory of probably cause Upgrade the printer drivers Close out the service ticket Answer: A QUESTION 765 Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack? WEP cracking WPA cracking War driving Rogue access point QUESTION 766 A user authenticated to more than one website using their same credentials is an example of: Multifactor authentication User access control Two-factor authentication Single sign-on Answer: D QUESTION 767 A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use? ipconfig /a ping -t ping -a netstat Answer: C QUESTION 768 Which of the following TCP/IP model layers combines four OSI model layers? Application Layer Internet Layer Transport Layer Network Interface Layer 220

221 Answer: A QUESTION 769 Which of the following protocols would be MOST likely found to be running on a device in a SOHO environment? BGP SONET IPSec OSPF Answer: C QUESTION 770 A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following problems to occur? EMI Short Reversed TXRX dB loss Answer: B QUESTION 771 Ann, a user, connects to her company's secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats? Rogue access point ARP poisoning Replay attack Evil twin Answer: D QUESTION 772 A public website using round robin DNS is an example of: load balancing QoS Caching engines Traffic shaping

222 QUESTION 773 Which of the following is an example of asymmetric encryption? PKI SHA1 AES 3DES Answer: A QUESTION 774 Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic? Port filtering IP filtering MAC filtering Application filtering Answer: B QUESTION 775 The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following? Traffic shaping Session filtering Answer: D QUESTION 776 Encryption provides which of the following to data being transferred across the network? Confidentiality Resistance to Jitter High Availability Data Integrity QUESTION 777 Which of the following network devices is meant to actively protect against network treats and can disable connections to stop malicious traffic if necessary? DMZ IPS SSL VPN

223 D. Layer 3 switch Answer: B QUESTION 778 Linking two or more switches together so that they can share VLAN information is known as which of the following? Port replicating Filtering Trunking Spoofing Answer: C QUESTION 779 Which of the following tools will scan a network for hosts and provide information on the installed operating system? DOCSIS NMAP IMAP BERT QUESTION 780 The company's main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following? VPN concentrator Content filter Proxy server Load balancer Answer: D QUESTION 781 Which of the following attacks is spread by attaching themselves to files? Worms Botnet DDoS FTP bounce Answer: A QUESTION 782

224 A company has a remote access VPN and wants to ensure that if a username and password are compromised, the corporate network will remain secure. Which of the following will allow the company to achieve its security goal? Posture assessment Kerberos TACACS+ Two-factor authentication Answer: D QUESTION 783 A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition? Incorrect VLAN assignment Bad or missing routes Switching loop Wrong subnet mask Answer: B QUESTION 784 A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following? QoS Caching engines Traffic shaping Load balancing QUESTION 785 A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method? High availability Quality of Service

225 QUESTION 786 An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions? Asset management Baselines Network maps Change management Answer: D QUESTION 787 A workstation on the third floor of the company building is having connectivity issues. The NIC and patch cable have been tested and found to be working properly. Which of the following would MOST likely have the information the administrator would need to locate and test the remaining cabling and connections? Network baseline Answer: A QUESTION 788 Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO). Data Link Transport Network Session Presentation Answer: DE QUESTION 789 Which of the following is a value that can be received from a DHCP server? Bootp server address SMTP server address WWW server address VPN server address QUESTION 790 Which of the following connector types would require a punch down tool to attach a network cable

226 to it? F-connector ST 110 block RJ-45 Answer: C QUESTION 791 Which of the following connectors is used for coaxial copper cable? BNC DB-9 RJ-11 Answer: A QUESTION 792 Which of the following network media connectors can use a MAXIMUM of two copper wire pairs? MTRJ Answer: B QUESTION 793 Which of the following devices allows for multiple web servers to host the same web page and for traffic to be distributed between them according to some metric? Proxy server VPN concentrator Load balancer Content filter QUESTION 794 Which of the following is the MAXIMUM data transmission rate of a? 8Mbps 11Mbps 54Mbps 107Mbps

227 QUESTION 795 An administrator can use packet tags to configure which of the following? VLAN NAT PoE QoS Answer: D QUESTION 796 Joe, a network technician, is asked to install a couple new WAP's inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP's to use? Conduct a wireless survey of the back warehouse. Ask the vendor that provided the WAP's for the main warehouse for recommendations. Ask the systems administrator which WAP's are preferred. Only order WAP's that support 5GHz channels. Answer: A QUESTION 797 Joe, a network technician, is tasked with setting up a new wireless network in an office for office laptops and desktops only. The surrounding offices already have many wireless networks. Joe discovered that over 30 wireless networks were showing up as he completed a wireless survey of the office. Every single one of the networks that Joe was able to see while conducting the wireless survey were b/g networks. Which of the following should Joe consider before purchasing/installing the new wireless access points? Move the WAP so that it is close to the interior walls. Determine which wireless channels and bands to use to mitigate as much interference as possible. Turn the SSID broadcasts off to decrease interference. Determine if the business should relocate to a building with a lot less surrounding wireless networks. Answer: B QUESTION 798 A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO). IDS Repeater Switch

228 WAP UTM device Answer: CD QUESTION 799 A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed? Man-in-the-middle Evil Twin Packet Sniffing IV attack Answer: C QUESTION 800 A technician is tasked with adding an ACL to the host-based firewall of a PC. The ACL should allow the Development Server to only connect to the PC's HTTP server on the default port. Given the IP addresses below, which of the following ACLs would accomplish this goal? Development Server: PC Source ; Source Port: Any; Destination: ; Destination Port:80; Action: Permit Source ; Source Port:80; Destination: ; Destination Port:80; Action: Permit Source ; Source Port:80; Destination: ; Destination Port: Any; Action: Permit Source ; Source Port:80; Destination: ; Destination Port:80; Action: Permit Source ; Source Port: Any; Destination: ; Destination Port: Any; Action: Permit Answer: A QUESTION 801 An administrator has been experiencing slower than normal performance on a server. The administrator suspects that a developer is currently uploading large files to it from an internal network PC. Which of the following will display established connections to the server on the FTP port? ifconfig nslookup netstat arp QUESTION 802 A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy b TKIP

229 printers. Which of the following configurations should the technician use?
802.11a with WPA2-Enterprise 802.11n with WPA-PSK 802.11n with WPA2-PSK 802.11g with WPA-Enterprise Answer: D QUESTION 803 Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop? Enable the host-based firewall on each of the laptops Use a VPN after connecting to the coffee shop wireless Edit the SSID connection information and change 'open' to 'shared' Connect to the open SSID then switch on WPA2 encryption Answer: B QUESTION 804 An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal? Set the VLAN preferences on the host's NIC Create each VLAN on the host's virtual switch Change the virtual machine NIC settings from private to bridged Create each VLAN on the host's gateway router QUESTION 805 Which of the following would be considered a Demarc extension? A patch cable connecting a cable modem with a wireless router Patch panel wiring Punch down block wiring Copper wire connecting the main PSTN point of entry to a wall data outlet QUESTION 806 Dynamic DNS provides which of the following services? Automatic registration of host records Translates public host names to private host names Provides round robin load balancing for web servers

230 230 D. Provides aliases for additional search suffixes Answer: A
QUESTION 807 A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following? Signal strength SSID mismatch Channel mismatch Encryption mismatch QUESTION 808 A technician has determined that calls placed over a wireless connection are breaking up and the speaker's voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues? Latency Bad GBIC Bad SFP QUESTION 809 A technician wants to configure multiple switches to support all of the corporate VLANs. Which of the following will allow configuration of the switches and have the information propagate automatically to the other switches? FTP server VTP server Virtual PBX NTP server Answer: B QUESTION 810 A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue? Increase the number of reservations Increase exclude list Decrease lease times Decrease the scope 230

231 Answer: C QUESTION 811 Malicious users have used multiple workstations to target a single server with the intent of preventing legitimate users from accessing the server. This server suffered which of the following types of attack? DDoS Trojan Cross-site scripting Man in the middle Replay attack Answer: A QUESTION 812 A content filter is MOST likely installed on which of the following servers? Proxy server TACACS+ server DNS server DHCP server QUESTION 813 A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred? The public IP address of the network has changed. The camera has received a new firmware update. The camera's secure shell has been disabled. The router has changed the IP of the mobile device. QUESTION 814 A VoIP system running over a wireless network link is continually being reported as choppy. Which of the following is the cause of this issue? Frequency Latency Interference Encryption type Answer: B

232 QUESTION 815 Which of the following OSI model layers is used to frame packets that are sent over a medium? Session Data link Physical Transport Answer: B QUESTION 816 Which of the following are considered unsecure access methods? (Select TWO). FTP IPSec RCP SCP SFTP Answer: AC QUESTION 817 Frame relay occurs at which of the following layers of the OSI model? Layer 1 Layer 2 Layer 4 Layer 6 QUESTION 818 Which of the following protocols occurs at Layer 4 of the OSI model? ISDN IPX GRE UDP Answer: D QUESTION 819 A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using? RS-232 Rollover cable Loopback

233 D. Point to point cable Answer: C QUESTION 820 Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification? Multimeter OTDR Link state Protocol analyzer Answer: B QUESTION 821 Which of the following tools allows an administrator to identify a cable? Cable stripper Toner Punch down tool QUESTION 822 An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed? Load balancing VPN concentrator Caching server Fault tolerance QUESTION 823 Which of the following network topologies is MOST likely used in remote access VPN? Point to Point Bus Ring Mesh Answer: A QUESTION 824 Which of the following uses a 128-bit addressing scheme?

234 MAC DHCP IPv4 IPv6 Answer: D QUESTION 825 Which of the following protocols exchange the latest information that has changed in the routing table? TFTP BGP OSPF IGMP Answer: C QUESTION 826 An advertised route learned from one protocol over a different protocol is called: Co-location Reallocation Redundancy Redistribution QUESTION 827 Drag and Drop Question Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

235 Answer:

236 QUESTION 828 Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model? Transport Application Internet

237 D. Network Interface Answer: B QUESTION 829 Drag and Drop Question Drag and drop the following maximum speeds to their corresponding wireless standards. Tokens can be used more than once. Answer:

238 QUESTION 830 Which of the following commands can be used on a server to display IP information for a given interface? nbtstat dig ifconfig msconfig Answer: C QUESTION 831 Which of the following protocols is the BEST choice for retrieving on multiple devices? IMAP4 SMTP FTP SNMPv3

239 Answer: A QUESTION 832 At which of the following locations does the responsibility of a Telco provider cease? IDF CSU Demarc MDF Answer: C QUESTION 833 A technician has been tasked to set-up a managed switch. Which of the following will the technician need to accomplish this task? IP address Switch serial number VLAN tag Loopback plug QUESTION 834 Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires? Coaxial CAT3 CAT5 CAT6a Answer: D QUESTION 835 After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process? Implement the solution to the problem. Establish a plan of action. Identify the problem. Implement preventative measures. Answer: B QUESTION 836 A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the

240 240 firewall is responsible for blocking RDP? Stateful inspection
NAT/PAT Port security Implicit deny Answer: D QUESTION 837 Which of the following connectors is used on a coaxial cable? F LC RJ-11 ST Answer: A QUESTION 838 Which of the following can determine the last time an address lease was renewed on a network device? System log Packet sniffer Time domain reflectometer Stateful packet filter QUESTION 839 When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis? Denial of service attack MTU black hole Switching loop Defective patch cable Answer: C QUESTION 840 A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols? HTTPS POP3 SSH SMTP 240

241 Answer: A QUESTION 841 Frequency, channel bonding, and MIMO configuration are all characteristics of which of the following networking technologies? Wi-Fi SONET T1/E1 Internet Satellite Internet QUESTION 842 A small office needs to connect one new system to their network in a distant office, but does not have the resources to install a new Ethernet wall jack, and does not want to use wireless. Which of the following is a simple, cost effective option for providing connectivity? Multimode fiber C n D. Broadband over Power Line Answer: D QUESTION 843 Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks? RIP STP VLAN MTU Answer: C QUESTION 844 Which of the following protocols is used to transfer files over the Internet? SNMP NTP FTP SIP QUESTION 845 241

242 Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port? A. 123 B. 143 C. 153 D. 163 Answer: A QUESTION 846 Which of the following would allow for a specific device to receive the same IP address from a DHCP server? Scope Reservation Suffix Lease Answer: B QUESTION 847 Which of the following TCP/IP model layers does the OSI model Data Link layer map to? Application Transport Internet Network Interface Answer: D QUESTION 848 Which of the following protocols provides a secure connection between two networks? L2TP IPSec PPP PPTP QUESTION 849 Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable? 568B RJ-11 RJ-45 RS-232 242

243 Answer: A QUESTION 850 Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause? Encryption strength SSID mismatch Interference Incompatible NIC Answer: C QUESTION 851 Which of the following WAN technologies has a MAXIMUM speed of Mbps? OC-3 T3 OC-12 E1 QUESTION 852 On which of the following layers of the OSI model does IP operate? Session Transport Network Data link QUESTION 853 A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check? Attenuation Latency Crosstalk External interference QUESTION 854 A technician has installed a group of layer 2 switches with multiple VLANs. The VLANs cannot talk to each other. Which of the following network devices could correct this problem? (Select TWO). 243

244 244 Hub DNS server DHCP server Layer 3 switch Router Answer: DE
QUESTION 855 A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO). Channel Encryption Diversity SSID broadcast Frequency Answer: BD QUESTION 856 A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed? The network address translation IP range. The signal strength of the router. The DCHP lease time. The number of allowable MAC addresses. Answer: D QUESTION 857 Which of the following ports is used by Telnet? 21 23 80 D. 143 Answer: B QUESTION 858 A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT? Open shorts Excessive DB loss TXRX reversed 244

245 245 D. Split cables Answer: C QUESTION 859
Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router? ACLs Static routing Trunking SNMP strings Answer: B QUESTION 860 A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used? VPN ACL DMZ VLAN QUESTION 861 After a power failure, several users are unable to connect to network devices at the remote office. Which of the following is the MOST likely cause of the issue? Bad cable Missing route Duplicate IP address Switching loop QUESTION 862 Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics? Protocol analyzer Syslog server Packet sniffer IPS logs 245

246 QUESTION 863 When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving? Implement multiple wireless encryption techniques. Implement PoE on each WAP. Decrease signal strength. Increase signal strength. Answer: C QUESTION 864 Which of the following switches is used with ARP to display the cache entry for a specific IP address? -a -d -g -s Answer: A QUESTION 865 Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses? A B C D QUESTION 866 A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on? WPA2 enterprise WEP Stateful firewall PAT QUESTION 867 Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector? BNC FSMA 246

247 247 MT-RJ ST Answer: C QUESTION 868
The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used? Multi-factor authentication Two-factor authentication Biometrics Single sign-on Answer: A QUESTION 869 Which of the following wiring distribution is used to connect wiring from equipment inside a company to carrier cabling outside a building? 66 block IDF MDF Patch panel QUESTION 870 A technician is troubleshooting a host name being directed to the wrong system. The `arp -a' command line utility is used to identify and display which of the following? All TCP/IP connections and listening ports Internet-to-adapter translation tables Information to help diagnose DNS issues Active sockets and connections Answer: B QUESTION 871 Which of the following protocols can be implemented to provide encryption during transmission between gateways? TLS PPTP SSH HTTPS 247

248 QUESTION 872 Which of the following protocols could the below packet capture be from? Port: 161 msgVersion: <masked> msgUsername: <masked> msgAuthenticationParameters: <masked> msgPrivacyParameters: <masked> msgData: data: get-request request-iD. <masked> error-status: noError (0) error-index: 0 variable-bindings: 0 items SNMPv3 SSH HTTP SNMPv1 Answer: A QUESTION 873 Which of the following network protocols would be used to transmit traps across a network to a log server? SMTP PPPoE POP3 SNMP Answer: D QUESTION 874 A technician would like to connect two separate LAN networks at a small business for a short period of time, to share files. The connection needs to be temporary, and is physically impossible using standard network cabling. Which of the following is the BEST way to connect the networks in this situation? Wireless repeater Wireless bridge Bluetooth RADIUS server Answer: B QUESTION 875 A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO). 248

249 249 Toner probe Cable certifier Butt set Crimper Network analyzer
Answer: BD QUESTION 876 Which of the following is an advantage of dynamic routing? It can reroute connectivity in the event of failure. It is the simplest form of routing. The routes do not change. The setup and configuration are done manually. Answer: A QUESTION 877 is an example of which of the following network classes? Class A Class B Class C Class D Answer: C QUESTION 878 An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used? ifconfig nslookup netstat ipconfig Answer: B QUESTION 879 Which of the following is used for SONET connections and requires a wavelength of 1310nm? 10GBASECX4 10GBASELX4 10GBASELW 10GBASESR 249

250 Answer: C QUESTION 880 An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity? Forwarding proxy Port address translation DMZ port security Application inspection Answer: B QUESTION 881 A user reports lack of network connectivity on their desktop. Which of the following is the FIRST step of the network troubleshooting methodology that the technician should perform? Establish a plan of action to resolve the problem. Establish a theory of probable cause by questioning the obvious. Test the theory to determine the cause. Question the user to determine if anything has changed. Answer: D QUESTION 882 Which of the following port numbers needs to be open on a firewall to allow FTP traffic? 21 22 23 25 Answer: A Which of the following protocols is used by Windows to securely access a remote computer? RAS Telnet PPP RDP QUESTION 883 A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin 250

251 troubleshooting by checking which of the following?
The IDS server logs The DNS resolution time The firewall's blocked logs The patch cable Answer: D QUESTION 884 Which IEEE protocol is used with VLAN technology? A a B b C m D q QUESTION 885 Which wireless standard works at a MAXIMUM data rate of up to 54Mbps? A b B g C n D q Answer: B QUESTION 886 If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network? Device placement Wireless standard Encryption type MAC filtering QUESTION 887 A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information? Event viewer History logs Network sniffer System logs

252 Answer: B QUESTION 888 Which of the following network topologies describes a network where each node is connected to multiple devices? Mesh Bus Star Ring Answer: A QUESTION 889 The components of a NIC function at which of the following layers of the OSI model? (Select TWO). Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Answer: AB QUESTION 890 An IP address is encapsulated at which of the following layers of the OSI model? Transport Data link Network Application Answer: C QUESTION 891 The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this? Switch the channel Change frequencies Channel bonding Increase the signal

253 QUESTION 892 The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI? CAT6 UTP Coaxial Crossover Answer: C QUESTION 893 The term virtual switch refers to which of the following? A switch that has not yet been implemented in the local network Migrating an entire environment to virtualization A computer component that controls environmental elements, such as lights and thermometers A logical, rather than a physical switch device Answer: D QUESTION 894 Which of the following is rated for speeds over 800Mbps? DB-9 CAT5e QUESTION 895 Which of the following authentication methods is MOST secure? NTLM CHAP MS-CHAP Kerberos QUESTION 896 A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches? Turn down the signal strength Replace the WAP and enable WEP Change both the SSID and WEP key

254 D. Enable WPA2 encryption
Answer: D QUESTION 897 It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user's network port. Which of the following devices would be used to monitor the network activity? Port analyzer Multimeter Network sniffer Cable certifier Answer: C QUESTION 898 Which of the following is a packet switching WAN technology? Frame relay T1 Asynchronous transfer mode ISDN Answer: A QUESTION 899 Which of the following wireless standards has a MAXIMUM speed of only 1Mbps? A. IrDA B b C. Bluetooth D g QUESTION 900 During a blizzard, a technician decides to work from home but is unable to connect to the company's network. Which of the following is MOST likely taking place at the office? Switching loop Wrong DNS Power failure Duplicate IP address QUESTION 901

255 A technician has noticed that the RJ-45 connector on the end of a user's patch cable was stripped too far back from the connector allowing for cross talk. Which of the following tools would a technician use to attach a new connector to eliminate this issue? Crimper Cable certifier Loopback plug Punch down tool Answer: A QUESTION 902 A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch? VLAN PoE VTP QoS Answer: D QUESTION 903 Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company's network? IDS Nessus NMAP Firewall Answer: B QUESTION 904 A network administrator needs to deploy seven equally spaced WAPs along an underground tunnel. Which of the following is the BEST channel design to avoid interference? A. 1, 3, 5, 7, 9, 11, 1 B. 1, 6, 11, 1, 1, 6, 11 C. 1, 11, 1, 11, 1, 11, 1 D. 11, 1, 6, 11, 1, 6, 11 QUESTION 905 A technician is installing a PoE switch for VoIP phones. Which of the following is the technician MOST likely going to configure on the switch?

256 NAT QoS PAT DHCP Answer: B QUESTION 906 Which of the following connector types is only used with copper media? ST SC MTRJ DB-9 Answer: D QUESTION 907 Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances? RADIUS DNS IDS Answer: C QUESTION 908 A new SOHO wireless network is set up using two access points with separate SSIDs on the same frequency. However, the users are experiencing intermittent connectivity on both SSIDs. Which of the following is the problem? Wrong DNS SSID mismatch Encryption type Incorrect channel QUESTION 909 A server that filters traffic between a WAN and a LAN is which of the following? Proxy server RAS server Default gateway server Answer: A

257 QUESTION 910 Which of the following is MOST commonly used with a fiber-optic network backbone? 100BaseFX 100BaseT 100BaseTX 1000BaseCX Answer: A QUESTION 911 Which of the following technologies has more non-overlapping channels to utilize in a wireless LAN? A a B b C i D. Bluetooth QUESTION 912 Which of the following is considered a routing metric? Hop count QoS Subnet size IP address QUESTION 913 A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use? Loopback plug Crimper tool Punch down tool Cable tester Answer: C QUESTION 914 Which of the following is used to allow multiple sources on a single optical cable? HSPA+ MIMO

258 DWDM SONET Answer: C QUESTION 915 At which of the following layers of the OSI model is the Logical Link Control found? Layer 2 Layer 3 Layer 4 Layer 5 Answer: A QUESTION 916 After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO). UDP 53 UDP 67 UDP 68 TCP 53 TCP 67 TCP 68 Answer: BC QUESTION 917 At which of the following layers of the OSI model do packets exist? Network Session Data Link Transport QUESTION 918 A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity? VLSM NAT CIDR PAT

259 Answer: D QUESTION 919 Which of the following DNS records is used in conjunction with 192:168::1:10? AAAA MX TXT PTR Answer: A QUESTION 920 Which of the following ports does IMAP use by default? A. 110 B. 123 C. 143 D. 443 Answer: C QUESTION 921 Which of the following is a public class C IP address? A B C D Answer: B QUESTION 922 Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running? CAT5 CAT6 Coaxial Fiber QUESTION 923 Which of the following wiring components is used as a central point of termination for all network jacks through a building area? A. Demarc

260 260 CSU Patch Panel Smart Jack Answer: C QUESTION 924
A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause? Duplicate IP addresses Bad GBIC Wrong gateway Switching loop QUESTION 925 Which of the following network topologies is MOST commonly used by online file sharing websites? Point to multipoint Peer-to-peer Ring Hybrid Answer: B QUESTION 926 Which of the following antenna types has a flat circular radiation pattern? Diversity Yagi Omni Patch QUESTION 927 Which of the following is associated with DNS reverse lookup zones? CNAME TXT PTR MX 260

261 QUESTION 928 Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is with a subnet mask of The default gateway is and the DNS server is A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of Which of the following is MOST likely the problem? Default gateway Duplicate IP address Wrong DNS Subnet mask Answer: D QUESTION 929 A new employee was given the following information to connect to the corporate wireless network for the first time: SSID:CorporateWiFi Encryption:WPA2 Password:SuperSecret! The user enters the correct SSID and notices that encryption type or password are not required when configuring the laptop in the office, and the laptop successfully connects to the Internet. When the user brings the laptop to the conference room, a pop-up asks for the CorporateWiFi password. Which of the following is the MOST likely cause of this behavior? The laptop wireless network card is incompatible with the conference room WAP. The office walls prevent the employee from making a full connection. A rogue access point was installed by a company employee. MAC filtering is only enabled in the conference room. Answer: C QUESTION 930 Which of the following correctly lists the layers of the OSI model starting at Layer 1? Data Link, Physical, Network, Transport, Presentation, Session, Application. Physical, Data Link, Network, Transport, Presentation, Session, Application. Physical, Data Link, Transport, Network, Session, Presentation, Application. Physical, Data Link, Network, Transport, Session, Presentation, Application. QUESTION 931 A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch? Implement i on all switches in the network. Implement port security on all computers in the company.

262 Implement port security on all switches in the network.
Implement rules on the firewall to block unknown devices. Answer: C QUESTION 932 The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem? Clear the ARP table Add host entries on the user's computer Configure 802.1x trunks on the switches Configure 802.1q trunks on the switches Answer: D QUESTION 933 A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented? MAC filtering Digital signatures MS-CHAP CHAP Answer: B QUESTION 934 A network technician is configuring a new firewall for placement into an existing network infrastructure. The existing network is connected to the Internet by a broadband connection. Which of the following represents the BEST location for the new firewall? The firewall should be placed between the Internet connection and the local network. The firewall should be placed inside the local network. The firewall should be placed between the broadband connection and the Internet. The firewall should be placed in the Internet cloud. Answer: A QUESTION 935 At which layer of the OSI and TCP/IP model would HTTP and FTP be found? Application Network Session Data Link

263 Answer: A QUESTION 936 At which layer of the TCP/IP model would cabling exist? Network Interface Internet Application Transport QUESTION 937 A network administrator needs to configure a port on the switch that will enable all packets on a particular switch to be monitored. Which of the following would BEST complete this objective? Traffic shaping MAC filtering Port mirroring VLAN trunking Answer: C QUESTION 938 Which of the following VPN technologies uses IKE and ISAKMP for key exchange? SSL IPSec L2TP PPTP Answer: B QUESTION 939 When a loop occurs, which of the following STP components determines which port to disable? Convergence Root bridge BPDU guard MAC address QUESTION 940 Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network? A. Host based IPS

264 Network based firewall
Signature based IDS Behavior based IPS Answer: C QUESTION 941 A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause? User's IP: Server IP: Firewall rules: Permit / /28 Permit / /24 Permit / /24 Deny / /28 Deny / /28 Deny / /24 A. Deny / /24 B. Deny / /28 C. Deny / /28 D. Implicit Deny rule Answer: B QUESTION 942 A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user's office. Which of the following would MOST likely cause them to lose their connection? Encryption type Disabled wireless adapter SSID mismatch Interference Answer: D QUESTION 943 Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue? Wrong default gateway Wrong DNS Switching loop Power failure

265 Answer: D QUESTION 944 A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method? WEP CCMP TKIP CHAP Answer: B QUESTION 945 A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue? NET USE IPCONFIG TRACEROUTE TELNET QUESTION 946 Which of the following security protocols would BEST protect a connection to a remote server and ensure full integrity of all transmitted communication? TLS 1.2 SNMPv3 WPA2 SMTP Answer: A QUESTION 947 A SOHO company just installed new a wireless APs. All company laptops have gigabit LAN ports along with wireless-g cards. Which of the following is the issue with this setup? The laptops will have a max wireless speed of 300Mbps The wired network is likely not backwards compatible with the gigabit LAN ports on the laptops The wireless system will only function at a slow 11Mbps The laptops are only capable of functioning on 2.4GHz spectrum

266 QUESTION 948 A network administrator is tasked with blocking unwanted spam which is being relayed by an internal server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? Closing off port 25 on the firewall Closing off port 53 on the firewall Turning off the SMTP service on the server Turning off the IMAP service on the server Answer: A QUESTION 949 Which of the following can a technician use when a company implements redundant WAN links? Content filter Load balancer Proxy server VPN concentrator Answer: B QUESTION 950 A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night's power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT? Escalate by following change procedures Establish a plan of action to resolve the problem Document findings, actions, and outcomes Question the user Answer: C QUESTION 951 A user at a small business states that they cannot connect to the Internet via the company's wireless network every time their cordless phone rings. Which of the following is MOST likely occurring? Interference Incorrect encryption type Latency SSID mismatch QUESTION 952

267 A technician installs a new CAT6 cable from one end of the office building to another, a total distance of 600 feet ( meters). When a laptop is connected to the cable, it cannot connect to the Internet. Which of the following is MOST likely the cause of this problem? Bad connectors Crosstalk DB loss TXRX reversed Answer: C QUESTION 953 Which of the following can be configured on a managed network switch to send real time alerts to a technician? SSID SMTP SNMP Syslog QUESTION 954 In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO). VLAN configuration error Cables too short Cable crosstalk Incorrect channel EMI Wrong subnet mask Answer: CE QUESTION 955 Which of the following wireless parameters may need to be modified when a new cordless telephone is installed? Encryption type IP address Channel Answer: D QUESTION 956 Which of the following requires congestion to occur before enabling traffic prioritization?

268 Quality of Service IGMP snooping Flow control WAN optimization Answer: A QUESTION 957 A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer's NIC? Cable certifier Throughput tester Loopback plug Multimeter Answer: C QUESTION 958 In order for switching loops to be automatically disabled, which of the following needs to be implemented? Routing tables Collision domains Port mirroring Spanning-tree protocol Answer: D QUESTION 959 A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request? MAC filtering IP filtering Port filtering Content filtering QUESTION 960 Which of the following do networks use to handle packet collisions from multiple nodes? CSMA/CA CSU/DSU Ethernet Tokens CSMA/CD

269 Answer: A QUESTION 961 A user enters a password into a logon box on a PC. The server and the PC then compare one- way hashes to validate the password. Which of the following methods uses this process? PKI Kerberos Single sign-on CHAP Answer: D QUESTION 962 A user needs maximum distance in a wireless connection. Which of the following should be configured to meet this goal? 802.11a at 54Mbps 802.11b at 1Mbps 802.11g at 11Mbps 802.11n at 130Mbps Answer: B QUESTION 963 An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario? Phone communications Web site downloads Streaming video clients Client bittorrent abilities QUESTION 964 A network administrator is planning to install wireless access points across the enterprise. Which of the following should be considered when installing at remote locations? PoE BSSID MAC filtering NAT QUESTION 965

270 Which of the following types of cables would be used to connect a hub to a patch panel?
Straight-through cable Crossover cable T1 Crossover cable Rollover cable Answer: A QUESTION 966 Crimp out a T568B. Answer: White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown. QUESTION 967 Lab Simulation Alter recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs. Instructions: Verify the settings by using the command prompt, after making any system changes. Next, restore connectivity by making the appropriate changes to the infrastructure. When you have completed these steps, select the Done button to submit. 270

271

272

273

274

275 Answer: On PC3, change the subnet mask to When it is set to , then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to It has been incorrectly set as QUESTION 968 Hotspot Question Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.

276 Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. Instructions: When the simulation is complete, please select the Done button to submit.

277

278 All Networks have the range form /0 to/32
Answer:

279 Explanation: Sales network-/26-This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP) HR network - /27-This will provide for up to 30 usable IP's (32-2) IT - /28-This will provide for up to 14 usable IP's (16-2) Finance - /26-Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP's and can't be used for hosts. Marketing - /28 If we add up how many IP blocks are used that is =192. A /24 contains 256 IP addresses, so =64. So the last unused box should be a /26, which equates to 64 addresses QUESTION 969 A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall? Cable certifier Multimeter Cable tester

280 280 D. Toner probe Answer: D QUESTION 970
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO). OSPF VTP trunking Virtual PBX RADIUS E x Answer: DE QUESTION 971 Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones? PAN LAN WLAN MAN Answer: A QUESTION 972 Which of the following would be used in an IP-based video conferencing deployment? (Select TWO). RS-232 56k modem Bluetooth Codec SIP QUESTION 973 Which of the following helps prevent routing loops? Routing table Default gateway Route summarization Split horizon 280

281 QUESTION 974 Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? Multilayer switch Access point Analog modem DOCSIS modem Answer: C QUESTION 975 An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches? The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings. The administrator should configure each vSAN participant to have its own VLAN. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL). The administrator should set the MTU to 9000 on the each of the participants in the vSAN. Answer: D QUESTION 976 A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? Star Ring Mesh Bus Answer: A QUESTION 977 A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames? HTTPS Fibre channel iSCSI MS-CHAP QUESTION 978

282 The network install is failing redundancy testing at the MDF.
The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service? Layer 3 switch Proxy server Layer 2 switch Smart hub Answer: A QUESTION 979 A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down? Load balancer VRRP OSPF BGP Answer: D QUESTION 980 A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup? DHCP Split horizon CIDR TRUNK QUESTION 981 Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths? DWDM SONET ADSL LACP

283 QUESTION 982 Which of the following WAN technologies is associated with high latency? T1 Satellite Cable OCx Answer: B QUESTION 983 Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption? Multifactor authentication ISAKMP TACACS+ Network access control Answer: C QUESTION 984 Which of the following is used to define how much bandwidth can be used by various protocols on the network? Traffic shaping High availability Load balancing Fault tolerance Answer: A QUESTION 985 Which of the following network topologies has a central, single point of failure? Ring Star Hybrid Mesh QUESTION 986 A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST? Compatibility requirements Environment limitations

284 Cable length Equipment limitations Answer: B QUESTION 987 When convergence on a routed network occurs, which of the following is true? All routers are using hop count as the metric All routers have the same routing table All routers learn the route to all connected networks All routers use route summarization Answer: C QUESTION 988 A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which of the following environmental conditions should be considered when deciding whether or not to use plenum-rated cables? Workstation models Window placement Floor composition Ceiling airflow condition Answer: D QUESTION 989 A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following? Public SaaS Private SaaS Hybrid IaaS Community IaaS QUESTION 990 Which of the following refers to a network that spans several buildings that are within walking distance of each other? CAN WAN PAN

285 D. MAN Answer: A QUESTION 991 An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable? A. RS-232 B ATM Token ring QUESTION 992 Which of the following describes an IPv6 address of ::1? Broadcast Loopback Classless Multicast Answer: B QUESTION 993 A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup? iSCSI SAN FCoE SAN NAS USB flash drive Answer: C QUESTION 994 A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured? Leases Helper addresses Scopes Reservations Answer: D

286 QUESTION 995 Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN? Access switch UC gateway UC server Edge router Answer: B QUESTION 996 A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24 : current value " Which of the following is being monitored to trigger the alarm? Speed and duplex mismatch Wireless channel utilization Network device CPU Network device memory Interface link status Answer: E QUESTION 997 A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? PoE Port bonding VLAN Trunking Answer: A QUESTION 998 Which of the following protocols must be implemented in order for two switches to share VLAN information? VTP MPLS STP PPTP

287 QUESTION 999 After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used? Event log Syslog SIEM SNMP Answer: C QUESTION 1000 A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future? Configure an automated patching server Virtualize the servers and take daily snapshots Configure a honeypot for application testing Configure a test lab for updates Answer: D QUESTION 1001 A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? Utilize a FTP service Install recommended updates Send all log files through SMTP Configure the firewall to block port 22 Answer: B QUESTION 1002 The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain? Vendor documentation Recent backups Physical IP address Physical network diagram

288 Answer: B QUESTION 1003 A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design? A g B ac C b D a QUESTION 1004 A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages? Network analyzer Packet analyzer Protocol analyzer Network sniffer Answer: A QUESTION 1005 A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an n network infrastructure. Which of the following allows n to reach higher speeds? MU-MIMO LWAPP PoE MIMO Answer: D QUESTION 1006 It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following? Network device power issues Network device CPU issues Storage area network issues

289 D. Delayed responses from RADIUS
Answer: B QUESTION 1007 After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible? Reformat and install the compatible drivers. Reset Ann's equipment configuration from a backup. Downgrade the PC to a working patch level. Restore Ann's PC to the last known good configuration. Roll back the drivers to the previous version. Answer: E QUESTION 1008 A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed? Implement an environment to test the enhancements. Implement ACLs that only allow management access to the enhancements. Deploy an IPS on the production network. Move the software team's workstations to the DMZ. Answer: A QUESTION 1009 An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions? Network map Asset management Change management Baselines QUESTION 1010 Company policies require that all network infrastructure devices send system level information to

290 a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location? TACACS+ server Single sign-on SYSLOG server Wi-Fi analyzer Answer: C QUESTION 1011 A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner? S/MIME SYSLOG PGP SNMPv3 RSH Answer: D QUESTION 1012 Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting? The VoIP phone would request a new phone number from the unified communications server. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls. The VoIP phone would request a different configuration from the unified communications server. Answer: B QUESTION 1013 A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? 802.11ac with 2 spatial streams and an 80MHz bandwidth 802.11ac with 3 spatial streams and a 20MHz bandwidth 802.11ac with 3 spatial streams and a 40MHz bandwidth 802.11ac with 4 spatial streams and a 160MHz bandwidth Answer: A 290

291 QUESTION 1014 A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison? Regression test Speed test Baseline Statement of work Answer: C QUESTION 1015 When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement? A. Port mirroring B w LACP VTP QUESTION 1016 A VLAN with a gateway offers no security without the addition of: A. An ACL. B w. C. A RADIUS server. D d. Answer: A QUESTION 1017 Network segmentation provides which of the following benefits? Security through isolation Link aggregation Packet flooding through all ports High availability through redundancy QUESTION 1018 A network technician must create a wireless link between two buildings in an office park utilizing the ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?

292 Yagi Omni-directional Parabolic Patch Answer: A QUESTION 1019 The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is up Int ip address is /25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Half duplex, 100Mb/s, 100 Base Tx/Fx Received broadcasts 0 input errors packets output, bytes 0 output errors, 0 collisions, 0 resets Set the loopback address Change the IP address Change the slash notation Change duplex to full Answer: D QUESTION 1020 An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item? Ensure patches are deployed Install an IDS on the network Configure the firewall to block traffic on port 443 Implement a VPN for employees QUESTION 1021 A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST? Remove all user accounts on the server Isolate the server logically on the network

293 Block all HTTP traffic to the server
Install the software in a test environment Answer: D QUESTION 1022 Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue? Increase installed memory and install a larger flash module. Increase the number of VLANs configured on the switch. Decrease the number of VLANs configured on the switch. Increase the number of virtual terminals available. QUESTION 1023 A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based? A cloud-based antivirus system with a heuristic and signature based engine A network based firewall which blocks all inbound communication A host-based firewall which allows all outbound communication A HIDS to inspect both inbound and outbound network communication Answer: C QUESTION 1024 Which of the following physical security controls prevents an attacker from gaining access to a network closet? CCTVs Proximity readers Motion sensors IP cameras Answer: B QUESTION 1025 A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats? A. Bluesnarfing

294 DDoS Brute force Rogue AP Answer: D QUESTION 1026 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure? Hardware firewall Proxy server Software firewall GRE tunneling Answer: C QUESTION 1027 Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO). Redundancy Implementing acceptable use policy Offsite backups Uninterruptable power supplies Vulnerability scanning Answer: AC QUESTION 1028 A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted? DWDM MIMO TEMPEST DOCSIS QUESTION 1029 Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers? Quarantine network Core network

295 Guest network Wireless network Answer: C QUESTION 1030 A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements? Add a router and enable OSPF. Add a layer 3 switch and create a VLAN. Add a bridge between two switches. Add a firewall and implement proper ACL. Answer: B QUESTION 1031 An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks? Smurf attack VLAN hopping Bluesnarfing Spear phishing QUESTION 1032 A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy? Install host-based anti-malware software Implement MAC filtering on all wireless access points Add an implicit deny to the core router ACL Block port 80 outbound on the company firewall Require users to utilize two-factor authentication Answer: A QUESTION 1033 An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with the fewest security issues?

296 Consent to monitoring Business continuity measures Vulnerability scanning End-user awareness training Answer: D QUESTION 1034 A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points? Port forwarding MAC filtering TLS/TTLS IP ACL Answer: B QUESTION 1035 Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform? Erase the files created by the virus Stop and escalate to the proper authorities Check the remaining directories for more .mp4 files Copy the information to a network drive to preserve the evidence QUESTION 1036 Which of the following describes a smurf attack? Attack on a target using spoofed ICMP packets to flood it Intercepting traffic intended for a target and redirecting it to another Spoofed VLAN tags used to bypass authentication Forging tags to bypass QoS policies in order to steal bandwidth Answer: A

297 QUESTION 1037 Which of the following technologies is designed to keep systems uptime running in the event of a disaster? High availability Load balancing Quality of service Caching engines Answer: A QUESTION 1038 Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario? Compromised system Smurf attack SQL injection attack Man-in-the-middle QUESTION 1039 A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed? Document the scene Forensics report Evidence collection Chain of custody Answer: D QUESTION 1040 During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE). RSA Passwords Man traps Biometrics Cipher locks VLANs 3DES Answer: CDE

298 QUESTION 1041 A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform? Disable the network based firewall Implicit deny all traffic on network Configure a VLAN on Layer 2 switch Add the system to the DMZ Answer: D QUESTION 1042 A firewall ACL is configured as follows: Deny Any Trust to Any DMZ eq to TCP port 22 Allow /16 to Any DMZ eq to Any Allow /8 to Any DMZ eq to TCP ports 80, 443 Deny Any Trust to Any DMZ eq to Any A technician notices that users in the /16 network are unable to SSH into servers in the DMZ. The company wants /16 to be able to use any protocol, but restrict the rest of the /8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives? A. 11, 10, 12, 13 B. 12, 10, 11, 13 C. 13, 10, 12, 11 D. 13, 12, 11, 10 Answer: A QUESTION 1043 A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using? DNS poisoning ARP poisoning Reflection SYN attack Answer: B QUESTION 1044 Which of the following is a security benefit gained from setting up a guest wireless network? Optimized device bandwidth Isolated corporate resources

299 Smaller ACL changes Reduced password resets Answer: B QUESTION 1045 A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences? ARP inspection Intrusion detection system Web content filtering Port filtering Answer: C QUESTION 1046 Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following? SOP BEP AUP SLA QUESTION 1047 A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch? Use TFTP for tested and secure downloads Require biometric authentication for patch updates Provide an MD5 hash for each file Implement a RADIUS authentication QUESTION 1048 A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices? WPA2 IPv6

300 SNMPv3 RIPv2 Answer: C QUESTION 1049 A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem? Damaged cable Duplex mismatch Incorrect VLAN assignment Speed mismatch QUESTION 1050 A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology? Document the findings and action taken. Establish a plan to locate the rogue DHCP server. Remove the rogue DHCP server from the network. Identify the root cause of the problem. Answer: B QUESTION 1051 Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches? Via SSH using the RADIUS shared secret Via HTTP using the default username and password Via console using the administrator's password Via SNMP using the default RO community QUESTION 1052 When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?

301 Transport layer Physical layer Network layer Session layer Answer: B QUESTION 1053 A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue? The gateway is misconfigured on the new router. The subnet mask is incorrect on the new router. The gateway is misconfigured on the edge router. The SSID is incorrect on the new router. Answer: A QUESTION 1054 While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? Maximum cable length exceeded Dirty connectors RF interference caused by impedance mismatch Bend radius exceeded Answer: D QUESTION 1055 A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue? EMI RFI Cross-talk Bad wiring QUESTION 1056 An organization requires a second technician to verify changes before applying them to network

302 devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following? The OSPF not-so-stubby area is misconfigured Reduced wireless network coverage Spanning tree ports in flooding mode BGP routing issues Answer: D QUESTION 1057 When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly? Load balancer FTP server Firewall DMZ Mail server QUESTION 1058 A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? Host-based intrusion detection systems Acceptable use policies Incident response team Patch management QUESTION 1059 A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? Does the printer have toner? Are there any errors on the printer display? Is the user able to access any network resources? Is the printer powered up? Answer: C

303 QUESTION 1060 A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT? Establish a theory of probable cause. Document actions and findings. Determine next steps to solve the problem. Determine if anything has changed. Answer: D QUESTION 1061 A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address? Configure NAT on the firewall Implement a split horizon DNS Place the server in the DMZ Adjust the proper internal ACL Answer: B QUESTION 1062 A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue? Update the DNS server with the proxy server information. Implement a split horizon DNS server. Reboot the web proxy and then reboot the DNS server. Put the proxy server on the other side of the demarc. Answer: A QUESTION 1063 While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is /16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem? Default gateway address Misconfigured DNS DHCP server NIC failure Answer: C

304 QUESTION 1064 A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem? Distance limitation Electromagnetic interference Cross talk Speed and duplex mismatch Answer: B QUESTION 1065 A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem? Username is misspelled is the device configuration file IDS is blocking RADIUS Shared secret key is mismatched Group policy has not propagated to the device Answer: C QUESTION 1066 A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause? The wrong wavelength was demuxed from the multiplexer. The SFP in the multiplexer is malfunctioning. There is a dirty connector on the fiber optic cable. The fiber optic cable is bent in the management tray. Answer: A QUESTION 1067 A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: * * * Request timed out.

305 The technician would like to see the results of the tracert command.
Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? Enable split horizon to allow internal tracert commands to pass through the firewall Enable IGMP messages out and block IGMP messages into the network Configure the firewall to allow echo reply in and echo request out of the network Install a backdoor to access the router to allow tracert messages to pass through Answer: C QUESTION 1068 Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider? 110 block MDF DSU CSU Answer: B QUESTION 1069 A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO). 1000Base-LR 1000Base-SR 1000Base-T 10GBase-LR 10GBase-SR 10GBase-T Answer: BE QUESTION 1070 A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output: SRC MAC SRC IP DST MAC DST IP 00:1D:1F:AB:10:7D : :BE:9F:AB:10:1D :1200 05:DD:1F:AB:10: : :C7:2F:AB:10:A :1300 Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring?

306 Network Application Data link Transport Answer: A QUESTION 1071 Which of the following requires the network administrator to schedule a maintenance window? When a company-wide notification must be sent. A minor release upgrade of a production router. When the network administrator's laptop must be rebooted. A major release upgrade of a core switch in a test lab. Answer: B QUESTION 1072 Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks. QUESTION 1073 The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used? A a B b C g D x QUESTION 1074 Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?

307 CSMA/CD OSPF DOCSIS BGP Answer: A QUESTION 1075 A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the: MLA. SLA. SOW. MOU. Answer: B QUESTION 1076 A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened? A. 445 B C D QUESTION 1077 Which of the following is an example of an IPv4 address? A. 192:168:1:55 B C. 00:AB:FA:B1:07:34 D. ::1 QUESTION 1078 Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window? Configuration procedures Stakeholder notification Impact analysis

308 D. Rollback procedure Answer: D QUESTION 1079 Which of the following is the main difference between TCP and UDP? TCP data flows in two directions, while UDP data flows from server to client. The TCP header implements flags, while the UDP header does not. The TCP header implements checksum, while the UDP header does not. TCP connections can be secured by stateful firewalls, while UDP connections cannot. Answer: B QUESTION 1080 Which of the following PDUs is used by a connectionless protocol? Frames Segments Streams Datagram QUESTION 1081 When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO). Layer 2 Layer 3 Layer 5 Transport layer Data link Physical layer Answer: AE QUESTION 1082 A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram? Building layout Patch panel labeling Packet sniffing Naming conventions

309 Answer: D QUESTION 1083 In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO). Rack monitoring Device placement Wall plate labeling Room numbering Patch panel labeling Answer: CE QUESTION 1084 Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols? Firewall Router C AP D. Switch Answer: C QUESTION 1085 A user with a n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network? A a B ac C b D g QUESTION 1086 A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect? Confirm the new host is using 10GBaseSR due to the manufacturing environment Confirm the new host is compatible with 10BaseT Ethernet Confirm the existing 10Base2 equipment is using the proper frame type

310 310 D. Confirm that CSMA/CD is disabled on the Ethernet network
Answer: B QUESTION 1087 A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes? MLA MOU SOW SLA Answer: C QUESTION 1088 A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error? Only FTP can be used to copy configurations from switches Anonymous users were not used to log into the TFTP server An incorrect password was used and the account is now locked Port 69 is blocked on a router between the network segments Answer: D QUESTION 1089 An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing? Fire suppression Mantraps at the entry HVAC UPS and battery backups Answer: A QUESTION 1090 A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? A 310

311 B C D Answer: B QUESTION 1091 A host has been assigned the address This is an example of which of the following address types? APIPA MAC Static Public Answer: A QUESTION 1092 An F-connector is used on which of the following types of cabling? CAT3 Single mode fiber CAT5 RG6 Answer: D QUESTION 1093 After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked? Server host file Subnet mask Local hosts file Duplex settings Answer: C QUESTION 1094 A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this? A x B p Single sign-on Kerberos

312 Answer: A QUESTION 1095 A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet? A. /24 B. /32 C. /28 D. /29 E. /30 Answer: E QUESTION 1096 Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE). Default gateway Subnet mask Reservations TFTP server Lease expiration time of 1 day DNS servers Bootp Answer: ABF QUESTION 1097 An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP? tracert ping dig ipconfig netstat Answer: D QUESTION 1098 Which of the following protocols uses label-switching routers and label-edge routers to forward traffic? A. BGP

313 OSPF IS-IS MPLS Answer: D QUESTION 1099 A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline. Which of the following is a reason why the media department is not connecting? Wrong SSID Rogue access point Placement Channel mismatch Answer: C QUESTION 1100 A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user? The user is connected using the wrong channel. The user is connected to the wrong SSID. The user is experiencing an EMI issue. The user is connected to the wrong RADIUS server. Answer: B QUESTION 1101 Which of the following network devices use ACLs to prevent unauthorized access into company systems? IDS Firewall Content filter Load balancer QUESTION 1102 Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue?

314 Signal-to-noise ratio
AP configuration Incorrect SSID Bounce Answer: D QUESTION 1103 A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility: Network DestinationNetmask Gateway Interface eth0 eth0 On-Link lo On-Link lo eth0 Which of the following is the reason for the computer issue, given the above output? Wrong default gateway netmask Incorrect default gateway address Default gateway on the wrong interface Missing default gateway QUESTION 1104 A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved? Layer 1 Layer 2 Layer 3 Layer 4 Layer 7 Answer: A QUESTION 1105 A network technician has received comments from several users that cannot reach a particular website. Which of the following commands would provide the BEST information about the path taken across the network to this website? A. ping

315 netstat telnet tracert Answer: D QUESTION 1106 A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to? nbtstat-a show mac address-table show interface status show ip access-list nslookup hostname Answer: B QUESTION 1107 A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action? The normal amount of errors and the connection problem has been resolved. The interface status will indicate that the port is administratively down. The traffic will flow, but with excessive errors. The interface status will show line protocol down. QUESTION 1108 After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is /23? Use the reset button on the back of the firewall to restore it to its factory default, and then log onto Run the following command on the administrator's workstation: arp -s :4a:d1:fa:b1:0e Use an SNMP tool to query the firewall properties and determine the correct management IP address

316 D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to Answer: B QUESTION 1109 Which of the following connection types is used to terminate DS3 connections in a telecommunications facility? 66 block BNC F-connector RJ-11 QUESTION 1110 A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem? 802.1q is not configured on the switch port APIPA has been misconfigured on the VLAN Bad SFP in the PC's 10/100 NIC OS updates have not been installed Answer: A QUESTION 1111 A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation? Port mirroring Spanning tree ARP inspection VLAN QUESTION 1112 A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO). 20 21

317 22 23 67 68 69 Answer: AB QUESTION 1113 A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement? Star Bus Ring Mesh Answer: C QUESTION 1114 A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website? SSL DNSSEC WPA2 MTU Answer: A QUESTION 1115 A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan? Build redundant links between core devices Physically secure all network equipment Maintain up-to-date configuration backups Perform reoccurring vulnerability scans QUESTION 1116 A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company /28. The company gateway router has the following interface configuration facing the ISP:

318 Interface A: IP address: Subnet mask: Default gateway: Speed: 1000 Mbps Duplex: Auto State: No Shutdown None of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO). There is a duplex mismatch between the router and ISP. The router interface is turned off. The interface is set to the incorrect speed. The router is configured with the incorrect subnet mask. The router interface is configured with the incorrect IP address. The default gateway is configured incorrectly. Answer: EF QUESTION 1117 The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features? Quarantine network Persistent agents Posture assessment Non-persistent agents Answer: C QUESTION 1118 A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition. myClient$ wificard --getinfo agrCtlRSSI: -72 agrExtRSSI: 0 state: running op mode: station lastTxRate: 178 MaxRate: 300 auth: open link auth: wpa2-psk BSSID: 0F:33:AE:F1:02:0A SSID: CafeWireless Channel: 149,1 Given this output, which of the following has the technician learned about the wireless network? (Select TWO).

319 The WAP is using RC4 encryption
The WAP is using a The WAP is using AES encryption The WAP is using the 2.4GHz channel The WAP is using the 5GHz channel The WAP is using g Answer: CE QUESTION 1119 A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted? HCL MSDS SLA HVAC Answer: B QUESTION 1120 A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues? Router logs History logs Startup/bootup config logs Event Viewer logs QUESTION 1121 A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used? Cable certifier Toner probe Cable tester Protocol analyzer Answer: A QUESTION 1122 Which of the following layers of the OSI model is between the Data Link and Transport layers? Application Session

320 320 Network Physical Answer: C QUESTION 1123
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the Internet. Which of the following is the MOST likely reason? Incorrectly configured ACL Implicit allow statement SMTP requests are being denied All protocols are being allowed in Answer: A QUESTION 1124 A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection? Telephone Parallel Serial CAT6 Answer: D QUESTION 1125 Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? Loopback plug Protocol analyzer Smart jack Coupler QUESTION 1126 A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the wiring back to the patch panel? Butt set Cable certifier Toner probe Snips 320

321 Answer: B QUESTION 1127 Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured? IP address on the native VLAN interface Port security Port forwarding IP address on the fiber interface Answer: A QUESTION 1128 Which of the following devices is used to distribute network traffic equally over multiple links? Content filter DNS server Load balancer Proxy server Answer: C QUESTION 1129 Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration? Port speed Cryptokey Data VLAN NAT/PAT QUESTION 1130 Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use? Toner probe Punch down Wire tester Crimper QUESTION 1131

322 Which of the following protocols is used for remote management of devices?
SNMP TFTP Syslog SMTP Answer: A QUESTION 1132 A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings? net share hostname ipconfig tracert Answer: C QUESTION 1133 Which of the following methods limits access to a network based on characteristics of the network card? IP filtering MAC filtering Port filtering Encryption Answer: B QUESTION 1134 An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario? T1 loopback Butt set Multimeter Protocol analyzer QUESTION 1135 Which of the following protocols is used to allow multiple hosts to share a common IP address? HTTPS ARP CARP

323 D. NAT Answer: D QUESTION 1136 Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine a connection problem within a subnet? Wire mapper Protocol analyzer Cable tester SYSLOG server Answer: B QUESTION 1137 Which of the following is the prefix for a link-local IPv6 address? A. FE80::/10 B. FF00::/8 C. 2FFE::/16 D. FEEF:/12 Answer: A QUESTION 1138 Which of the following could be used to estimate RTT across a router? dig traceroute arp uptime QUESTION 1139 Which of the following does the IP address indicate? No DHCP server connectivity The DNS server is unavailable Firewall issue Duplicate IP addresses are found QUESTION 1140 Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?

324 Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace. Answer: B QUESTION 1141 Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel? Routing loop MTU black hole Framing errors SYN flood QUESTION 1142 Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable? Protocol analyzer Cable tester Toner probe Punch down tool Answer: C QUESTION 1143 Which of the following separates broadcast domains? Port mirroring Router Convergence Switch QUESTION 1144 A national cable company providing TV, telephone, and Internet service to home users over its IP network, has been tracking a large increase of network bandwidth due to P2P file sharing. Which of the following should the company deploy to ensure excellent TV and telephone service?

325 QoS Load balancing High availability Fiber optics Answer: A QUESTION 1145 Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data? SNMP v2 VPN SYSLOG SMTP QUESTION 1146 Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following? Project management Quality of service Configuration management Bandwidth shaping Answer: C QUESTION 1147 Which of the following technologies could be implemented to improve call clarity when using VoIP technology? Static IP addressing Caching engines Port forwarding QUESTION 1148 A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network? Disable the SSID WPA encryption VLAN implementation

326 D. WEP encryption Answer: B QUESTION 1149 Which of the following needs to be configured on a switch to use a packet sniffer? Port trunking Port mirroring Tagged VLAN Untagged VLAN QUESTION 1150 A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network? Wire tap Network sniffer Load balancing appliance NIPS QUESTION 1151 Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used? Butt set Toner probe Wire mapper Cable certifier Answer: A QUESTION 1152 An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality? Router Forward proxy Load balancer Firewall Answer: C

327 QUESTION 1153 Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP? Connectionless Stateful Full Duplex Quality of Service Answer: A QUESTION 1154 Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets? ifconfig ping route nbtstat Answer: B QUESTION 1155 A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check? The arp table of the new customer's router. The route table of the next-hop router. The route table of the new customer's router. The arp table of a network user. Answer: C QUESTION 1156 When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality? Establish a plan of action to resolve the problem and identify potential effects. Implement the solution. Establish a theory of probable cause. Document findings, actions, and outcomes. Answer: D QUESTION 1157 A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used? A. Protocol analyzer

328 Crimper Cable tester Punch down tool Answer: C QUESTION 1158 A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs? IPSec SSL ISAKMP SNMP Answer: D QUESTION 1159 When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area? Signal strength SSID enable Encryption Password hardening Answer: A QUESTION 1160 Which of the following should be implemented in a networked environment carrying teleconferencing packets? L2TP SSH QoS QUESTION 1161 Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use? OTDR Multimeter Temperature monitor

329 QUESTION 1162 A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for the HIGHEST level of security? WPA2 WPA WEP64 WEP128 Answer: A QUESTION 1163 A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic? STP blocking Duplicate IP addresses MTU mismatch Switching loop Answer: D QUESTION 1164 A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter? VPN Throughput tester Firewall OC3 Answer: C QUESTION 1165 Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem? Network map Environmental monitor Placement map Syslog QUESTION 1166 Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

330 330 Telnet FTP SNMP SSH RDP Answer: AD QUESTION 1167
A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength? Call the wireless provider and ask for a T3 circuit. Move the wireless router to a better location where line of sight is obtained. Reinstall the operating system to the PC to ensure the newest patches are installed. Install a hub to ensure there is a clear path for the cables to run. Answer: B QUESTION 1168 Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue? Frequency interference Low signal strength Standard mismatch Incorrect channel Answer: A QUESTION 1169 Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause? TXRX is reversed Faulty crossover cable Incorrect WEP key A short in the cable pairs Answer: C QUESTION 1170 A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used? A. SCTP 330

331 Packet sniffer DCCP SNMP Answer: D QUESTION 1171 Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO). MAC addressing IP addressing Port speed IPv6 addressing Duplex Answer: CE QUESTION 1172 Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause? Both T568A and T568B standards are being used. STP is disabled. The cable is not a crossover. The port is not trunked. Answer: C QUESTION 1173 Which of the following technologies allows for redundant links within a Layer 2 segment? OSPF RIP Port Mirroring Spanning Tree QUESTION 1174 A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue? Check for switching loops between core and distribution switches. Check whether an incorrect VLAN has been assigned to the new distribution switch. Check for inconsistent or missing routes between the core and distribution switches.

332 D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.
Answer: A QUESTION 1175 Which of the following is used to create a secure connection between a client and a host? VLAN Proxy server IIS server VPN Answer: D QUESTION 1176 A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block? Protocol analyzer Multimeter Punch down tool Toner probe QUESTION 1177 Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to the corresponding switch's SFP at the MDF. Which of the following is the MOST likely cause? A crossover cable is being used. DB loss is too high on all strands. Only TX or RX strand is working. TX and RX are reversed. Answer: C QUESTION 1178 Which of the following is the correct representation of an IPv6 address? A. :: B. 0:0:0:0:0:0:0:0:1 C. 1:2:3:4:AB:CD:EF D ::4860:800f::

333 QUESTION 1179 Which of the following n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? Channel bonding MIMO Spatial reuse 20MHz channel spacing Answer: A QUESTION 1180 Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues? Network map Cable management Change management Asset management Answer: C QUESTION 1181 The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called: CARP. QoS. Traffic shaping. Fault tolerance. Answer: B QUESTION 1182 A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to? Bad connectors Cross-talk EMI / Interference dB loss Answer: D QUESTION 1183 An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?

334 Protocol analyzer Butt set OTDR Toner probe Answer: B QUESTION 1184 A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following? LLDP VLAN tagging QoS SIP trunking Answer: C QUESTION 1185 Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation? nslookup route nbtstat arp Answer: A QUESTION 1186 Which of the following utilities would a technician use to determine the location of lost packets on a routed network? ping tracert Answer: D QUESTION 1187 A DSL modem connects to the provider's network using which of the following authentication techniques? PoE MS-CHAP PPPoE

335 D. EAP Answer: C QUESTION 1188 Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? Loopback plugs Butt set Cable certifier Toner probe Answer: B QUESTION 1189 is an IP address which would MOST likely come from which of the following? CIDR DHCP APIPA DNS QUESTION 1190 Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this? Cable tester OTDR Loopback plug Answer: A QUESTION 1191 Which of the following DNS records allows for reverse lookup of a domain? PTR AAAA A MX QUESTION 1192 Which of the following is an example of two factor authentication?

336 Password, device certificate and PIN
SSL web server certificate and password User password and administrator password Password and hardware token OTP Answer: D QUESTION 1193 Which of the following IP addresses would be classified as private? A B C D Answer: A QUESTION 1194 A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail? Network flow information SNMP traps Debug level syslog Protocol analyzer QUESTION 1195 Which of the following will prevent switching loops by selectively shutting down switch ports? RIP IGP STP VLAN Answer: C QUESTION 1196 When using high bandwidth applications over multiple WAN connections, which of the following should be used? Static IP addressing Half-duplex PoE devices Load balancing

337 QUESTION 1197 A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario? Crimper OTDR Throughput tester Punch down tool Answer: D QUESTION 1198 Which of the following media types can carry a standard Ethernet signal for network connectivity? USB Parallel Serial CAT6 QUESTION 1199 There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic? Protocol analyzer Cable tester Cable certifier Environmental monitor Answer: A QUESTION 1200 Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters? PoE settings and VTP configuration SNMP configuration only IP address and SNMP configuration QoS and PoE settings Answer: C QUESTION 1201 A Windows server has a problem after booting up. Kim, a technician, should immediately check the:

338 history logs. cron logs. application logs. system logs. Answer: D QUESTION 1202 A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable? Butt set Punch down tool Toner probe Protocol analyzer Answer: C QUESTION 1203 An administrator is setting up a secure wireless network. The administrator decides to support n and g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users' connection issues? Limit the devices to n only. Enable the SSID broadcast. Enable MAC filtering. Use a WEP 128-bit key. Answer: B QUESTION 1204 Which of the following protocols is used to securely connect to a multi-layer switch? HTTP SMTP SSH Telnet QUESTION 1205 The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the: A. hypervisor.

339 LPAR. broker. VDI. Answer: A QUESTION 1206 A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause? A missing route on the alarm device. Incorrect VLAN assignment on the router. A missing route on the network routers. Incorrect speed/duplex setting on the alarm device. Answer: D QUESTION 1207 A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch? Fiber optic Wireless CAT5e CAT3 QUESTION 1208 A network administrator suspects an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic? Syslog server Toner probe OTDR Packet sniffer QUESTION 1209 A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up? A. Port security

340 340 MAC filtering ACL NAT Answer: D QUESTION 1210
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? WPA should be enabled PKI should be turned off WAP SSIDs are matching WAPs are transmitting on same channel Answer: C QUESTION 1211 No link lights on a switch's SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of-9. Which of the following types of cable is MOST likely being tested? Fiber CAT3 CAT5e CAT6a Answer: A QUESTION 1212 An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason? WEP's IV is too small. WEP uses RC4 which is easily accessible and not secure. WEP uses plain text. WEP is not well supported. QUESTION 1213 Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? WAP placement PoE devices Encryption type 340

341 Answer: A QUESTION 1214 Which of the following devices can be used to offload outbound web server SSL encryption overhead? NIPS Proxy server Content filter VPN concentrator Answer: B QUESTION 1215 A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector? Wire tester Punch down Crimper Multimeter Answer: C QUESTION 1216 Which of the following methods for network performance optimization is used to distribute traffic among similar devices? Fault tolerance QoS Load balancing Answer: D QUESTION 1217 Lab Simulation After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are configurable. You can only change the adapter configurations to each PC.

342

343 Answer: On PC3, change the subnet mask to When it is set to , then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to It has been incorrectly set as On this simulation, you will be asked to test connectivity after fixing the issues. You MUST ping the other three computers on EACH computer (i.e. from PC1, ping PC2, PC3, PC4, and from PC2, ping PC1, PC3 and PC4, etc) QUESTION 1218 Drag and Drop Question

344 Your company recently purchased a new building down the street from the existing office. For each of the tasks below, select the appropriate antenna type and encryption object for all wireless access point (AP). Create an encrypted wireless connection between the two buildings that BEST controls signal propagation, while maximizing security. Restrict the wireless signal generated by the access points (AP's) inside Building 1, so that it minimizes broadcast beyond the building. Maximize wireless coverage inside Building 1. Building 1's internal wireless network is for visitors only and must not require any special configuration on the visitor's device to connect. Answer:

345 QUESTION 1219 Drag and Drop Question Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem. You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following exhibits and perform any necessary changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the LEAST number of devices needed to fix the issue.

346 Answer: Explanation: After you fix AP2, you must click on the switch, which will bring up the switch interface. Type in the two commands that they show there, to prove the fix. Do not worry that interface 4 is down, there is no interface 4 for you to do

347 QUESTION 1220 Drag and Drop Question Build a T-658A Connection Answer: QUESTION 1221 Drag and Drop Question Build a T-658B Connection

348 Answer: QUESTION 1222 Drag and Drop Question

349 Answer: QUESTION 1223 Drag and Drop Question

350 Answer: 350

351 QUESTION 1224 Drag and Drop Question You are tasked with creating a network that will accomplish the following requirements Requirements: The remote sales team must be able to connect to the corporate network Each department must have ONLY two PCs and a server Each department must be segmented from each other The following VLANs have been designated: VLAN 2- Finance VLAN 12- Sales VLAN 22- Human Resources (HR) Complete the network by dragging the required objects into the diagram INSTRUCTIONS: Objects can be used multiple times and not all placeholders need to be filled

352 Answer: QUESTION 1225 Lab Simulation You have been tasked with setting up a wireless network in an office. The network will consist of 3 access points and a single switch. The network must meet the following parameters.

353 The SSIDs need to be configured as corpnet with a key of S3cr3t!
The wireless signals should not interfere with each other The subnet the Access points and Switch are on should only support 30 devices maximum The access Points should be configured to only support TKIP clients at a maximum speed Instructions: Click on the devices to review their information and adjust the setting of the APs to meet the given requirements. Answer: This simulation is still under construction. On the first exhibit, the layout should be as follows Access Point Name AP1 IP Address Gateway SSID corpnet SSID Broadcast yes Mode G Channel 1 Speed Auto Duplex Auto WPA Passphrase S3cr3t!

354 Exhibit 2 as follows Access Point Name AP2 IP Address Gateway SSID corpnet SSID Broadcast yes Mode G Channel 6 Speed Auto Duplex Auto WPA Passphrase S3cr3t! Exhibit 3 as follows Access Point Name AP3 IP Address Gateway SSID corpnet Mode G Channel 11 QUESTION 1226 A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive ? CNAME MX PTR A Answer: B QUESTION 1227 The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager's inquiry, which of the following did the administrator forget to do FIRST? Submit a change request Schedule a maintenance window

355 Provide notification of change to users
Document the changes Answer: A QUESTION 1228 A network administrator noticed that when one computer goes down, all the other computers in the office will not work. Which of the following topologies is in use? Star Ring Hybrid Bus Mesh Answer: D QUESTION 1229 There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future? Helpdesk training Appropriate use policy User awareness training Personal Identifiable Information Answer: C QUESTION 1230 The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be provided, which of the following media will need to utilized? CAT6e CAT5e C n D ac QUESTION 1231 While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. Which of the following servers is MOST likely down? WINS server Domain controller

356 DHCP server DNS server Answer: D QUESTION 1232 An area to which access is controlled by retina scan is protected by which of the following security measure types? Two-factor authentication Biometric Cipher locks Optical reader Proximity reader Answer: B QUESTION 1233 Which of the following ports should be allowed to provide access to certain VoIP applications? A. 110 B. 139 C D QUESTION 1234 Which of the following should be used to ensure a specific device always receives the same IP address? IP helper Reservation Address lease DHCP scope DHCP relay QUESTION 1235 Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue? WPA2 security key SSL certificates CSMA/CA RADIUS

357 QUESTION 1236 A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk? Firewall Web filtering MAC filtering Host-based antivirus Answer: C QUESTION 1237 Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? Tagging Encapsulation Tunneling De-encapsulation Answer: D QUESTION 1238 A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback? Channel remote module Fiber optic modem Channel service unit Digital subscriber line modem QUESTION 1239 Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following? Network handle Autonomous system number Route aggregation Top level domain Answer: B QUESTION 1240

358 QoS operates at which of the following OSI model layers? (Select TWO)
Answer: BC QUESTION 1241 A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to replace it. Which of the following would be the MOST helpful in regaining connectivity? VLAN configuration Network diagram Configuration backup Router image Answer: C QUESTION 1242 Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem? Increase the maximum log size Log into the DNS server every hour to check if the logs are full Install an event management tool Delete the logs when full QUESTION 1243 Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO) OSPF RIPv2 C q D. Spanning tree E d F. QoS Answer: DE QUESTION 1244 While implementing wireless access points into the network, one building is having connectivity

359 issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues? UTP patch cables Antenna Power adapter Security standard Answer: B QUESTION 1245 A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue? Update the HOST file with the URLs for all websites Use NSLOOKUP to resolve URLs Ensure ICMP messages can pass through the firewall Enable port 53 on the firewall Answer: D QUESTION 1246 The Chief Information Officer (CIO) of an organization is concerned that the current locally- hosted, software threat solution is not agile enough. The CIO points to specific examples of zero- day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals? Stateful firewall Premise-based IDS Host-based IDS Cloud-based anti-malware Answer: A QUESTION 1247 A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP address automatically. Which of the following is the cause of the problem? DNS Wrong TCP port Split horizon DHCP scope

360 QUESTION 1248 A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers? Block all LAN to LAN traffic Block all LAN to WAN traffic Block all WAN to LAN traffic Block all WLAN to WAN traffic Answer: C QUESTION 1249 A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue? Add a honeypot to reduce traffic to the server Update the Ethernet drivers to use 802.3 Add additional network cards to the server Disable CSMA/CD on the network QUESTION 1250 A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a device failure? Vendor documentation Archives/backups Proper asset tagging and labeling Network Baseline Answer: B QUESTION 1251 A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: Client PC 1 has an IP address if /25 PC 1 can successfully ping its gateway of /25 which is an interface of router A Server A is named 'BLDGBFILESRVR01' and has an IP address of /25 PC 2 with an IP address of /25 can successfully ping server A 360

361 However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause? Link from touter A to PC 1 are on different subnets Link from router A to server A is down Link from PC 1 to router A has duplex issues Link from server A top PC 2 is down Answer: A QUESTION 1252 A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to? Core switch MDF Ethernet router IDF Answer: B QUESTION 1253 A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement? High availability MAN network Quarantine Honeynet Answer: C QUESTION 1254 Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections? OC12 POTS WiMax OC3 QUESTION 1255 A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector. Which of the following is the issue? A. Cross-talk

362 568A/568B mismatch Tx/Rx reverse Split pairs Answer: A QUESTION 1256 Which of the following can be issued from the command line to find the layer 3 hops to a remote destination? traceroute nslookup ping netstat QUESTION 1257 A administrator's network has OSPF for the internal routing protocol and has two interfaces that continue to flap. The administrator reviews the following output: Fast ethernet 0 is up, line protocol is up Int ip address is /25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100Base Tx/Fx Received broadcasts 1258 input errors packet output, bytes 1747 output errors, 0 collisions, 423 resets Which of the following problems would cause the interface flap? Wrong IP address Loopback not set Bad wire Incorrect encapsulation Duplex mismatch Answer: E QUESTION 1258 Which of the following allows a telecommunication company to test circuits to customers remotely? VLAN Toner Probe RDP Smart Jack

363 E. VPN Answer: D QUESTION 1259 A single mode fiber is no longer providing network connectivity to a remote site. Which of the following would be used to identify the location of the break? MT-RJ OTDR Media converter Cable certifier Answer: B QUESTION 1260 Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root cause of the problem? Baseline Bottleneck Utilization Link status Answer: C QUESTION 1261 A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation? Allow the contractor to reset switches to factory defaults Check the cabling on all switches for improper crossover use Document the changes that were made Downgrade firmware and restore backup configuration QUESTION 1262 An organization is involved in a civil court action and needs to ensure messages are retained. Which of the following describes the requirement to archive and retain traffic and other correspondence? Chain of custody Legal hold Divide and conquer Persistent agents

364 QUESTION 1263 In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO) Memorandum of understanding Data classification document Service level agreement Interconnection security agreement Consent to monitor Acceptable use policy Answer: AF QUESTION 1264 The Chief Information Officer (CIO) wants to improve the security of the company's data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information? Policies VPN HTTPS Standards Answer: A QUESTION 1265 A client reports that half of the office is unable to access a shared resource. Which of the following should be used to troubleshoot the issue? Data backups Network diagrams Baseline information Vendor documentation Answer: B QUESTION 1266 An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office. Which of the following did the administrator set up? CAN MAN WAN LAN

365 QUESTION 1267 Channel bonding will improve which of the following wireless characteristics? Signal strength Encryption strength Coverage area Connection speed Answer: D QUESTION 1268 Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following should the technician implement to avoid potential occurrences from happening in the future? Block all ICMP request Update all antivirus software Remove all suspected users from the network Upgrade firmware on all network cards Answer: A QUESTION 1269 A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO) Presentation Transport Session Data link Application Physical Answer: DF QUESTION 1270 A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken? Document the findings, actions, and outcomes Duplicate the problem if possible Verify system functionality Make an archival backup Answer: C

366 QUESTION 1271 An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC's, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet these requirements? The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC Answer: C QUESTION 1272 A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. Which of the following solutions should the technician design into the new network? Place each department in a separate VLAN Add a router and create a segment for all the monitoring host stations Increase the number of switches on the network to reduce broadcasts Increase the collision domain to compensate for the added broadcasts Answer: A QUESTION 1273 A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach? Create VLANs to segment the network traffic Place a network sniffer on segments with new employees Provide end user awareness and training for employees Ensure best practices were implemented when creating new user accounts QUESTION 1274 A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the

367 issue? Test a theory to determine the cause Escalate to a senior technician Identify the symptoms Establish a theory of probable cause Establish a plan of action Answer: D QUESTION 1275 Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or earthquake? UPS and battery backups Fire suppression systems Building generator Hot sites or cold sites NAS and tape backups QUESTION 1276 A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments? The internal network since it is private The admin private network allowing only admin access The DMZ only allowing access from the segment with the servers The internet connection to allow admin access from anywhere Answer: B QUESTION 1277 A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it? An SNMP GET A top listener tool An intrusion detection system A packet sniffer QUESTION 1278 A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network.

368 This describes which of the following attacks?
Social engineering Spoofing Zero-day attack VLAN hopping Answer: A QUESTION 1279 Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? Hybrid Public Community Private QUESTION 1280 A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic? Intrusion detection system Application aware firewall Stateful packet inspection Stateless packet inspection Answer: C QUESTION 1281 The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use? BPDU LACP Spanning tree Load balancing Answer: B QUESTION 1282 A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the

369 technician perform to prevent the password for the administrator account from being sniffed on the network? Use SNMPv1 for all configurations involving the router Ensure the password is 10 characters, containing letter and numbers Copy all configurations to routers using TFTP for secuirty Only allow administrators to access routers using port 22 Answer: D QUESTION 1283 A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause? Distance limitation Wavelength mismatch cross-talk EMI Macro bend Answer: B QUESTION 1284 A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) A a B ac C b D g E n Answer: AB QUESTION 1285 Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back? The browser on the server The server's NIC drivers The server's IP address The antivirus updates

370 QUESTION 1286 A network engineer is conducting an assessment for a customer that wants to implement an n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of the following? Network diagram Site survey Network topology PoE requirements Answer: B QUESTION 1287 Which of the following default ports is associated with protocols that are connectionless? A. 80 B. 443 C D Answer: C QUESTION 1288 A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of two- factor authentication? ID badge and keys Password and key fob fingerprint scanner and retina scan Username and password QUESTION 1289 A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network? Wireless bridge VPN concentrator Default WAP Wireless router Answer: D 370

371 QUESTION 1290 Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver? IPSEC SHA DES CRC Answer: A QUESTION 1291 A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to allow it to interpret the new device and control it using SNMP? TRAP GET MIB WALK Answer: C QUESTION 1292 Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices? Anycast Unicast CoS QoS Multicast Answer: E QUESTION 1293 Which of the following is a UC application? Softphone Intranet Proxy Facsimile QUESTION 1294 371

372 A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results? A TACACS+ device and a RADIUS server A TACACS and a proxy server A RADIUS server and an access point A RADIUS server and a network controller Answer: C QUESTION 1295 A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured? Content filter Firewall DNS DHCP Answer: B QUESTION 1296 A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue? Grounding bar Rack monitoring UPS Air flow management Surge protector QUESTION 1297 A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps? Block echo replies inbound to the DMZ Disable UDP on the servers Block ICMP at the firewall Disable TCP/IP on the server 372

373 QUESTION 1298 Which of the following g antennas broadcast an RF signal in a specific direction with a narrow path? Omni-direction Unidirectional Patch Yagi Answer: B QUESTION 1299 A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages. Which of the following is the MOST likely cause? Evil twin Session hijacking Distributed DoS ARP cache poisoning Answer: C QUESTION 1300 A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause? DoS Reflective DNS Man-in-the-middle ARP poisoning QUESTION 1301 A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause? VTP Driver update ESD Halon particles QUESTION 1302 An additional network segment is urgently needed for QA testing on the external network. 373

374 A software release could be impacted id this change is not immediate
A software release could be impacted id this change is not immediate. The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following is the BEST course of action for the network administrator to take? Wait until the maintenance window, and make the requested change First document the potential impacts and procedures related to the change Send out a notification to the company about the change Make the change, noting the requester, and document all network changes Answer: D QUESTION 1303 A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable? Wavelength mismatch Distance limitations Connector mismatch Attenuation/Db loss: Answer: C QUESTION 1304 Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been? Warrant Legal document Chain of custody Forensic report Documentation of the scene QUESTION 1305 QoS operates at which of the following OSI model layers? (Select TWO) Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Answer: BC QUESTION 1306 Which of the following is considered a classless routing protocol? 374

375 375 IGRP IS-IS RIPv1 STP Answer: B QUESTION 1307
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which of the following security techniques should be used? Place them behind honeypots Place them in a separate subnet Place them between two internal firewalls Place them in the demilitarized zone Answer: D QUESTION 1308 A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of its interfaces. How many broadcast domains are present in this company's network 1 2 5 16 28 QUESTION 1309 A company plan established to resume normal system operations following a disruption in business would be described as which of the following? First responders User awareness training Disaster recovery Business continuity QUESTION 1310 A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network? 375

376 376 DMZ Content Filter Botnet Honeypot Answer: D QUESTION 1311
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance? Port scanner tool Interface monitoring tool Packet capture tool Spectrum Analyzer tool QUESTION 1312 A network technician has just received an regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue? Firmware update OS update Vulnerability patch Driver update Answer: C QUESTION 1313 There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable reason the vendor made this suggestion? It is a rapid version of spanning tree that uses BPDU to detect problems It is a regular version of port mirroring that uses hellow packets to detect loops It is a simple version of spanning tree that uses BPDU to detect problems It is a rapid version of port mirroring that uses BPDU to detect problems Answer: A QUESTION 1314 A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop? A. On the DMZ network 376

377 377 On the sandbox network On the honeypot On the quarantine network
Answer: D QUESTION 1315 A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the future? Enable automatic rebooting of the pCs after patching is completed Require the patching server to update the oldest PCs off hours Disable automatic driver updates to PCs on the patching server Throttle the connection speed of the patching server to match older PCs QUESTION 1316 A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel. The technician has cabled this port to be used with which of the following? 10baseT POTS 568B 568A Answer: B QUESTION 1317 Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections? MPLS ESP GRE PPP Answer: C QUESTION 1318 A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk? Add an outbound ACL to the firewall Change the FTP server to a more secure SFTP 377

378 378 Use the implicit deny of the firewall
Move the server to the DMZ of the firewall Answer: D QUESTION 1319 A network administrator received the following from a user: From: To: Subject: Free smart phone Dear, user, please click the following link to get your free smart phone survey.php Which of of the following should the administrator do to prevent all employees from accessing the link in the above , while still allowing Internet access to the freesmartphone.it domain? Add to the browser group policy block list. Add DENY TCP ANY EQ 8080 to the firewall ACL Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter Add to the load balancer Answer: A QUESTION 1320 Which of the following types of equipment should be used for telecommunications equipment and have an open design? 2/4 post racks Rail Racks Vertical frame Ladder racks QUESTION 1321 A facility would like to verify each individual's identity prior to allowing access to the datacenter. Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of the following would BEST meet these goals? Implement a biometric reader at the datacenter entrance and require passage through a mantrap Implement a security guard at the facility entrance and a keypad on the datacenter entrance Implement a CCTV camera and a proximity reader on the datacenter entrance Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance QUESTION 1322 378

379 A network technician needs to connect two switches
A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application? CAT5e cable Coax cable Fiber Optic cable CAT6 cable Answer: C QUESTION 1323 Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives "Destination Unreachable". Which of the following issues could this be? Denial of service attack Misconfigured DNS settings Misconfigured Split Horizon RADIUS authentication errors QUESTION 1324 A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire. Which of the following is the best choice for the fire suppression system? Portable extinguishers Wet Pipe Clean Gas Dry Pipe QUESTION 1325 Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence Legal hold Chain of custody Secure copy protocol Financial responsiblity Answer: B QUESTION 1326 A network manager wants a monthly report of the security posture of all the assets on the 379

380 network (e. g. workstations, servers, routers, switches, firewalls)
network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the missing update or patch. Which of the following solutions would work BEST to present this data? Security policy Penetration scan Virus scan Vulnerability scanner Answer: D QUESTION 1327 Which of the following is a logical host on the network where unauthorized users believe they are on the production network? Virtual server VLAN Honeypot Virtual Terminal Answer: C QUESTION 1328 Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor support technician to properly set up and configure the SAN on the network. In order to begin SAN I/O optimization, which of the following would Joe need to provide the vendor support technician? Network diagrams Baseline documents Asset management document Access to the datacenter Answer: A QUESTION 1329 Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The manufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network. Which of the following should Joe perform in order to resolve this issue? Load the latest hardware drivers for his USB drive Install the latest OS on his computers Download the latest playback software for his music files Flash the latest firmware for his router 380

381 QUESTION 1330 A technician has completed a survey of a wireless network and documented signal strengths. This document is known as which of the following? Logical Network map Heat map Network baseline Bandwidth survey Answer: B QUESTION 1331 A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an example of which of the following? Dynamic DNS Virtual Private networking (VPN) Dynamic NAT Port Forwarding Answer: D QUESTION 1332 A network topology in which all nodes have point to point connections to all other nodes is known as which of the following? Mesh Ring Bus Star Answer: A QUESTION 1333 A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home. Which of the following servers should the technician implement? DNSSEC PPP RAS VLAN NAT Answer: C QUESTION 1334 While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. Which of the following should the technician use to verify if this is a concern?

382 Log management Network diagram Network baseline Real time monitor Answer: C QUESTION 1335 A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building? Use the same SSIDs on different channels and AP isolation Use different SSIDs on different channels and VLANs Use different SSIDs on the same channels with VLANs Use the same SSIDs on same channels with AP isolation Answer: A QUESTION 1336 A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened. Which of the following should be one FIRST to resolve the problem? Ensure that port 20 is open Ensure that port 161 is open Flush the DNS cache on the local workstation Validate the security certificate from the host QUESTION 1337 OFDM, QAM and QPSK are all examples of which of the following wireless technologies? Frequency Modulation RF interference Spectrum Answer: B QUESTION 1338 A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be performed to verify the security controls in place?

383 Penetration testing AAA authentication testing Disaster recovery testing Single point of failure testing Answer: A QUESTION 1339 Which of the following is a connectionless protocol? (Select TWO) ICMP SSL TCP SSH HTTP UDP Answer: AF QUESTION 1340 Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address. Which of the following is an addressing scheme that will work in this situation? Teredo tunneling Private APIPA Classless Answer: B QUESTION 1341 A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages. This is an example of which of the following network segmentation techniques? Compliance implementation Separate public/private newtorking Honeypot implementation Performance optimization Answer: D QUESTION 1342 A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?

384 Removing the AP from the classroom
ACL Jamming Firewall IPS Answer: C QUESTION 1343 A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall? HTTPS Stateless packet inspection Intrusion detection system Application aware firewall Answer: D QUESTION 1344 Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following? Multiplexing Zero-day attack Smurfing Bluejacking QUESTION 1345 A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option? SLIP SNMPv3 TKIP SNMPv2 Answer: B QUESTION 1346 A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the /24 network. Which of the following ACL should the technician configure? (Select TWO) A. PERMIT SRCIP /24 SPORT:80 DSTIP: /24 DPORT:80

385 PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
PERMIT SRCIP:ANY SPORT:80 DSTIP: /24 DPORT ANY PERMIT SRCIP: ANY SPORT:80 DSTIP: /24 DPORT:80 PERMIT SRCIP: /24 SPORT:80 DSTIP:ANY DPORT:80 Answer: B QUESTION 1347 A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the following is the MOST common connector that will be used on the switch to connect the media converter? FDDI Fiber coupler MT-RJ ST Answer: D QUESTION 1348 Which of the following protocols is considered a hybrid routing protocol? OSPF RIPv2 IS-IS BGP EIGRP Answer: E QUESTION 1349 Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address. Which of the following is the MOST likely reason why the router is not receiving a DHCP address? The administrator has enabled DHCP snooping on the network The administrator is blocking DHCP requests that originate from access points The administrator is blocking the wireless router's MAC address using MAC filtering The Administrator has implemented a feature that only allows white-listed MAC addresses QUESTION 1350 As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO) A. Layer 1

386 Layer 2 Layer 3 Layer 4 Layer 5 Answer: BC QUESTION 1351 A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST? WAP placement Encryption type Bandwidth saturation WAP SSID Answer: A QUESTION 1352 A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and it happens several times throughout the day. Which of the following troubleshooting methods should the technician perform FIRST? Test the theory Establish a plan of action Gather information Question the obvious Answer: C QUESTION 1353 A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg % Processor Time =10% Avg Pages/Second = 0 Avg Disk Queue Length = 3 Based on the results, which of the following is causing a bottleneck? Hard drive Memory Processor NIC QUESTION 1354 A technician has responded to a security issue with an employee's computer. Which of the

387 following basic forensic steps should be taken NEXT?
Secure the area Initiate Data collection Create the forensics report Verify the chain of custody Answer: A QUESTION 1355 A network technician has downloaded the latest vendor switch O/S. which includes new features and enhancements. Which of the following should the technician perform FIRST when updating the switches? Backup the current configuration for each switch Install during non-business hours to test the system Test the O/S on one of the production switches Power cycle the company's border router QUESTION 1356 Which of the following protocols is used to send mail to another server on the Internet? RTP SNMP POP SMTP Answer: D QUESTION 1357 Which of the following ports is used to provide secure sessions over the web by default? 22 25 80 D. 5004 QUESTION 1358 An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following? Social engineering Bluesnarfing Man-in-the-middle Evil Twin

388 Answer: A QUESTION 1359 After an employee connected a switch port of a home router to the wall jack in the office, other employees in the office started losing connectivity. Which of the following can be implemented on the company switch to prevent loss of connectivity in the future? Loop prevention ARP inspections DHCP snooping MAC address filtering QUESTION 1360 An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using? Community PaaS Public Iaas Hybrid Saas Private Iaas Answer: B QUESTION 1361 When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU. Which of the following was MOST likely used by the technician? Cable analyzer Toner probe OTDR Loopback plug Answer: D QUESTION 1362 A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office. Which of the following should be created? Guest network VLAN network Security network DMZ network

389 Answer: A QUESTION 1363 A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices. Which of the following will allow SNMP monitoring of the devices? SSH MIMO SYSLOG MIBS Answer: D QUESTION 1364 A network technician determines that two dynamically assigned workstations have duplicate IP addresses. Which of the following commands should the technician use to correct this problem? ipconfig /all ipconfig /dhcp ipconfig /release then ipconfig /renew ipconfig /renew Answer: C QUESTION 1365 After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected. Which of the following is the MOST likely cause? Attenuation Bad UPS Cable short Misconfigured DNS QUESTION 1366 The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. Which of the following encryption types should be implemented? WPA2 Enterprise WEP MAC filtering WPA personal

390 QUESTION 1367 A network administrator wants to logically separate web function servers on the network. Which of the following network devices will need to be configured? IPS Switch Hub HIDS Answer: B QUESTION 1368 A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office. The used has MOST likely: Installed the printer in infrastructure mode Installed the printer in the wrong subnet misconfigured the gateway on the wireless printer installed the printer in ad-hoc mode Answer: D QUESTION 1369 When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection. This creates which of the following conditions? Short Twisted pair Electrostatic discharge Crosstalk Open Answer: A QUESTION 1370 Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic? Evil twin Rogue access point WEP attack War driving 390

391 QUESTION 1371 A home user is pairing a bluetooth gaming controller with the game console. Which of the following is implemented between the console and the controller? LAN PAN WAN MAN Answer: B QUESTION 1372 A technician has attempted to optimize the network but some segments are still reporting poor performance. Which of the following issues should the technician look at? Switch incorrectly set to full duplex Conflicting IP addresses Packet bottlenecks IP address scope depletion Answer: C QUESTION 1373 Coverage analysis for a new implementation of n WLAN involves which of the following? (Select TWO) Humidity Temperature Heatmap Building material Sight lines Answer: DE QUESTION 1374 A technician is in a large room that contains a large amount of industrial equipment. The technician would like to record the usable bandwidth between devices in a wireless network and the access point. Which of the following should the technician document? Goodput EMI Latency Jitter Overhead Answer: A QUESTION 1375

392 A project manager is tasked with the planning of a new network installation for a client. The client wants to ensure that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. Which of the following should the project manager provide the client? Acceptable Use Policy Service Level agreement Statement of work Security Policy Answer: C QUESTION 1376 A technician suspects that the system is slow due to excessive incoming SPAM. Which of the following should the technician do according to the troubleshooting methodology? Verify full system functionality Block incoming Establish a plan of action Gather information Consider multiple approaches Answer: D QUESTION 1377 A home office has a dozen devices that need a class based DHCP device to assign addresses. The subnet only has one octet for the host portion of each device. Which of the following IP addresses would be assigned to the default gateway? A B C D QUESTION 1378 A network administrator needs to allow employees to securely upload files to a remote server. Which of the following should be allowed on the firewall? 20 21 22 D. 161 Answer: B QUESTION 1379 Joe, a system administrator, is troubleshooting an issue with remotely accessing a new server on

393 the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the new server. The server that he cannot remote to is located on the same LAN as another server that he can successfully remote to. Which of the following output from the command line would BEST resolve the problem? C:\windows\system32>ipconfig /flushdnsWindows IP configurationSuccessfully flushed DNS resolver cache C:\windows\system32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS resource records for all adapters has been initiated. Any errors will be reported in the event viewer in 15 minutes. C:\windows\system32>nslookupDefault server: unknownAddress: C:\windows\system32>nbtstat -RSuccessful purge and reload of the NBT remote cache table Answer: B QUESTION 1380 A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cord installed. Which of the following is MOST likely the cause of the issue? Distance limitations Wavelength mismatch Bend radius limitation Dirty connectors Answer: D QUESTION 1381 A technician is being tasked to centralize the management of the switches and segment the switches by broadcast domains. The company is currently all on VLAN1 using a single private IP address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. Which of the following options would work BEST to accomplish these requirements? Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with native VLAN 100 Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with native VLAN 100 Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100 Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100 QUESTION 1382 A new network administrator is hired to replace a consultant that has been keeping the network running for several months. After a month, the network administrator is having network issues. The problems are easily resolved and appear to be changes in the server settings.

394 The log files on the servers do not contain any error or messages related to the issues. Which of the following is a possible cause of the issues? TACAS\Radius misconfiguration is causing logs to be erased ICMP ping of death is resetting DHCP and DNS on the server A backdoor has been installed to access the network The last ACL on the router is set to Deny All Answer: C QUESTION 1383 A network administrator set up a network computer lab and discovered connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. Which of the following should the administrator perform FIRST? Check if there are link lights on the ports Checkthe ports on the switch for full duplex Check to see if port security is enabled Check to see if the uplink interface is configured correctly. Answer: A QUESTION 1384 A user receives a new computer and now is unable to connect to a database using ODBC. Other users on the network are able to connect successfully. A technician is able to successfully ping the database server but still is unable to connect. Which of the following is the issue? Missing IP routes on router Wrong default gateway address Software firewall is blocking ports Failing network interface card QUESTION 1385 A network uses a centralized server to manage credentials for all network devices. Which of the following server types are MOST likely being used in this configuration? (Select two.) DNS DHCP FTP RADIUS Kerberos TACACS Wireless controller Answer: DF

395 QUESTION 1386 A company suffers an outage due to a bad module in a core switch. Which of the following is the proper order of troubleshooting? Gather information, start at the top of the OSI model, and work down. Establish a plan of action to solve the problem. Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat. Gather information, start at the bottom of the OSI model, and work up. Answer: B QUESTION 1387 Which of the following is BEST used to perform a one-time temporary posture assessment in a NAC environment? Intrusion prevention system Host-based firewall Non-persistent agent Antivirus Answer: C QUESTION 1388 A network technician has just run a new point-to point fiber link between two local routers, however, after the fiber has been plugged in on both ends, the interface will not come up. The technician has double- checked the interface configuration on both routers, both SFPs have been hard looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient optical power. Which of the following is the cause of the issue? Wavelength mismatch Duplex mismatch Distance limitations Wrong IP address Answer: A QUESTION 1389 Two switches are connected using both a CAT6 cable and a CAT5e cable. Which of the following problems is occurring? Missing route Autosensing ports Improper cable types Switching loop Media mismatch Answer: D

396 QUESTION 1390 A network administrator has configured a new 100Mbs WAN circuit, but speed testing shows poor performance when downloading large files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the downloads speeds over time. The administrator checks the router interface and sees the following: Router01#show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000A.00BB.CC11 Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding Which of the following is MOST likely to resolve the issue? Shutdown and then re-enable this interface Reset the statistics counter for this interface Remove default 802.1q tag and set to server VLAN Apply egress port rate-shaping Answer: C QUESTION 1391 Which of the following residential Internet medias would employ the DOCSIS standard? Fiber DSL Cable 3G/LTE Cellular QUESTION 1392 Joe, a technician, terminates ends on a new copper cable for use between two legacy switches. When Joe connects the two switches together using the cable, they fail to establish a connection. Which of the following is MOST likely the issue? The cable has exceeded bend radius limitations. The cable is a straight through. The cableis a cross over. The cable has RJ-11 connectors instead of RJ-45. Answer: B QUESTION 1393 A network technician has set up a firewall and entered only three rules allowing traffic on ports 21,110, and 25 to secure the network. Users are reporting they cannot access web pages using the URLs. Which of the following can the technician do to correct the situation?

397 Add a rule to the end allowing port 80 and 53.
Answer: A QUESTION 1394 A secondary datacenter in a remote location is used by a company. The cable management and power management are handled by the datacenter staff. The building security is also handled by the datacenter staff with little oversight. Which of the following should the network administrator do to adhere to best practices? Secure the patch panels. Ensure power monitoring is enabled. Ensure rack security. Secure the UPS units. Answer: C QUESTION 1395 When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likely experiencing which of the following attacks? Bluejacking ARP cache poisoning Phishing DoS Answer: D QUESTION 1396 An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install? A host- based firewall A network-based firewall A host-based stateful firewall A stateless network-based firewall. QUESTION 1397 All scheduled work on production network equipment should be done during which of the following periods? A. Maintenance window

398 Development life cycle
Down time Business hours Answer: A QUESTION 1398 A technician is installing a media converter that connects a newly installed multimode connection to an existing CAT5e infrastructure. Which of the following media converter types should the technician use? Ethernet to coaxial Fiber to Ethernet Fiber to coaxial Multimode to single mode fiber Answer: B QUESTION 1399 Ann, a network administrator, is in the process of cleaning network switches for resale. Ann splashes the cleaning agent in her eye and needs to know the procedure of cleansing her eye. To which of the following should Ann refer? EULA MSDS SLA MOU QUESTION 1400 Which of the following transmission methods is used for network utilizing the standard? MAC Synchronous DSSS Broadband Baseband QUESTION 1401 Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability? Load balancing MPLS trunking VLAN tagging

399 D. Multiplexing Answer: A QUESTION 1402 A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. Additionally, warehouse workers must be able to scan and concurrently upload large images of items to a central server. Which of the following technologies is BEST suited in this facility? (Select TWO). A ac P2P Bluetooth IR RFID NFC Answer: AE QUESTION 1403 An administrator needs to open the default port on the firewall for DNS. Which of the following is the correct port number the administrator needs to open? 53 67 C. 110 D. 3389 QUESTION 1404 A technician wants to configure a wireless network to identify itself to visitors by including the word "Guest" in the name. Which of the following would allow users to identify a wireless network by name? ESSID broadcast ARP broadcast BSSID broadcast DHCP broadcast QUESTION 1405 Which of the following describes what occurs with the ID of a specified native VLAN when traffic passes over a trunk? It becomes the gateway of last resort for the switch or router. it becomes the default VLAN for the untagged frames. it becomes the priority ID for all the VLAN traffic across the device.

400 D. It becomes the default gateway for the port or ports.
Answer: B QUESTION 1406 A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the device. All firewalls are turned off. The streaming device appears to function properly, but the media will not stream as requested. Which of the following TCP/IP technologies is not implemented properly? Multicast Broadcasts Unicast Anycast Answer: A QUESTION 1407 When a switch has multiple paths to reach the root bridge, into which of the following states is the port with the LEAST desirable path placed by the spanning tree protocol? Forwarding Bonding Blocking Listening Answer: C QUESTION 1408 A CSU/DSU device will connect which of the following? A T1 line to a network router An analog line to a network router A cable modern to a wireless router A local network to a VPN QUESTION 1409 An administrator's router with multiple interfaces uses OSPF. When looking at the router's status, it is discovered that one interface is not passing traffic. Given the information below, which of the following would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is /25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10

401 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts
0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets Set the loopback address Enable the connecting port Put the IP address in the right broadcast domain Replace the line card Set OSPF to area 0 Answer: B QUESTION 1410 Which of the following would need to be configured to allow jumbo frames on a network? MTU NAC MIBS MAC Answer: A QUESTION 1411 Which of the following infrastructure implementations is used to connect various circuits between remote locations? WAN PAN WLAN LAN QUESTION 1412 Which of the following Ethernet features will allow increased FCoE network throughput as long as all network devices recognize its specific size? Frame relay TCP offloading Jumbo frame Quality of service Equal cost multipath Answer: C QUESTION 1413 A network administrator is configuring one distribution and five access switches, which will be

402 installed in a new building.
Which of the following is the BEST physical location for the equipment? The distribution switch in the IDF and the access switches in the MDF The distribution switch in the MDF and the access switches in the IDF All switches should be placed in the IDF to leave room in the MDF for servers All switches should be placed in the MDF to leave room in the IDF for servers Answer: B QUESTION 1414 A network technician needs to identify active services that should be disabled on the network. Which of the following tools would BEST accomplish this? Packet analyzer Content filter Interface monitoring tool Port scanner Answer: D QUESTION 1415 A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features? Firmware updates Changing to IPv6 Cloning Vulnerability patching Answer: A QUESTION 1416 Which of the following should a technician upgrade to if the existing wireless standard only allows for three non-overlapping channels and more non-overlapping channels are needed? A b B g C n D q Answer: C QUESTION 1417 Which of the following devices actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?

403 Honeypot IPS Firewall IDS Answer: B QUESTION 1418 A network technician has installed and configured a new wireless router. The clients and hosts can ping each other. The WAN is a 10Gbp/s cable connection. The wired clients have fast connections. The wireless clients are slow to ping and browse the Internet. Which of the following could be the cause of the slow wireless clients? An access point experiencing RFI from florescent light bulbs A router is on the incorrect LAN A cable connection does not support wireless A high signal-to-noise ratio on the wireless network Answer: A QUESTION 1419 Given the following requirements: Notify administrators of Advanced Packaging Tools (APTs) Allow network access forclients in the lobby with a password key Which of the following should be implemented to satisfy these conditions? (Select TWO). UTM WPA2 IPSec POP3 RADIUS Answer: AB QUESTION 1420 During a business trip a user connects to the hotel's wireless to send s to customers. The user notices the next day that s have been sent from the user's account without consent. Which of the following protocols was used to compromise the user's password utilizing a network sniffer? SSL HTTP TFTP DNS

404 QUESTION 1421 The networking concept of split horizon is designed to prevent which of the following? Large routing tables Duplicate addresses Collisions Loops Answer: D QUESTION 1422 A company needs to implement stronger authentication, by adding an authentication factor to their wireless system, which currently only supports WPA with pre-shared keys. The backend authentication system supports EAP and TTLS. Which of the following should the network administrator implement? PKI with user authentication 802.1x using EAP with MSCHAPv2 WPA2 with a complex shared key MAC address filtering with IP filtering. Answer: B QUESTION 1423 A client is concerned with theft of equipment from the datacenter. Which of the following would provide the highest level of physical security for the client? Cipher lock Proximity reader Magnetic key swipe Man trap CCTV QUESTION 1424 An administrator would like to test out an open source based phone system prior to making an investment in hardware and phones. Which of the following should the administrator do to BEST test the software? Create virtual IP phones in a lab that utilize the STP protocol Deploy an open source VDI solution to create a testing lab Deploy new SIP appliances and connect to it with the open source phone applications Create a virtual PBX and connect to it with SIP phone applications

405 QUESTION 1425 A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation? Port mirroring Spanning tree ARP inspection VLAN Answer: B QUESTION 1426 An offsite backup company involved in an investigation is not recycling outdated tapes. This is MOST likely due to: the process of eDiscovery a chain of custody breach a data transport request the notice of alegal hold Answer: D QUESTION 1427 A campus needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. Which of the following antenna types will provide the BEST coverage? High gain Bidirectional Dipole Omni-directional Answer: A QUESTION 1428 During a high availability test of a system, a fiber interruption did not re-route traffic. This is an indication of which of the following routing concepts? Static Dynamic Hybrid Routing loops QUESTION 1429 A technician has installed an n network, and most users are able to see speeds of up to 300Mbps. There are a few users who have an n network card but are unable to get speeds higher that 108Mbps. Which of the following should the technician perform to fix the issue?

406 Upgrade the OS version to 64-bit
Roll back the firmware on WLAN card Install a vulnerability patch Upgrade the WLAN card driver Answer: D QUESTION 1430 A small office has an Internet connection that drops out about two times per week. It often takes until the next day for the vendor to come out and fix the issue. Which of the following should the office implement to reduce this downtime? EULA SLA SOW MOU Answer: B QUESTION 1431 A technician installs three new switches to a company's infrastructure. The network technician notices that all the switch port lights on the front of each switch flashes rapidly when powered on and connected. Additionally, there are rapid flashing amber lights on the switches when they started up the next day. Which of the following describes what is occurring with the switches? The switches are running through their spanning tree process. The switches are having problems communicating with each other. The switches are connected and detected a spanning tree loop. The switches are not functioning properly and need to be disconnected. Answer: A QUESTION 1432 How does a DHCP reservation work? By leasing a set ofreserved IP addresses according to their category. By letting the network switches assign IP addresses from a reserved pool By assigning options to the computers on the network by priority By matching a MAC address to an IP address within the DHCPscope QUESTION 1433 A home user reports that a speed test website shows the following information: Download speed: 33.3Mbps Upload speed: 10.2Mbps

407 Which of the following is the correct interpretation of these results?
The home PCdownloaded 33.3 MB of data to the website and uploaded 10.2 MB of data from the website. The website upload bandwidth is saturated, and it does not match the download speed. The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps. The website is downloading data to its server at 33.3 Mbps and uploading data from its server at 10.2 Mbps. Answer: C QUESTION 1434 An administrator notices an abnormally high level of network traffic from a server. Upon logging into the server, the administrator runs the following command: Which of the following should the administrator use to correlate the active connection with the running service? netstat -p Open task manager route print Open services. msc Answer: A QUESTION 1435 A network technician is informed that some clients cannot connect to a critical business application. This application is hosted on a server that resides within the local VLAN. The server has a domain name of Appserver1.CorpXYZ.local. The technician notices some client machines can still connect to the application server, while others in the same office cannot. All of the office computers share similar networking hardware, and connect to the same switch. The network technician inspects an office computer that cannot establish a connection. The technician simultaneously runs a protocol analyzer on this office computer, and then attempts to ping the address Appserver.CorpXYZ.local. The technician receives a reply to the ping, but a connection to the business application still cannot be established. The following output is observed in the protocol analyzer:

408 Based on this output, which of the following is the MOST likely cause of the connectivity issues?
The DNS is not resolving Appserver1. CorpXYZ.local to the correct IP address. Responses from Appserver1 are being redirected to a different host. Another machine on the network has the same IP address as Appserver1. The office computer is connected to a trunk port, and the wrong native VLAN has been set. Answer: C QUESTION 1436 An Amplitude Modulation (AM) radio station may have a detrimental effect on which of the following services? DOCSIS Frame relay SONET Metro-Ethernet Answer: A QUESTION 1437 Which of the following will allow network traffic to travel across several switches on several VLANs? VLAN assignments Port bonding VLAN ID Trunking VLAN tagging Port mirroring Answer: D

409 QUESTION 1438 A network administrator is trouble shooting a connectivity issue on a user's workstation. The technician reviews the following packet capture: Given the above output, which of the following is the reason why the user is experiencing network connectivity issues? The MAC address for the default gateway is unknown. The ARP query is incorrectly going to instead of Name resolution is not occurring properly. The packet capture shows an IP conflict. Answer: A QUESTION 1439 A network technician has been tasked with connecting three a clients to an g access point that is configured for WEP and is within a (9m) line of sight from the client. The clients are unable to associate with the access point. Which of the following is MOST likely the cause of this issue? Interference Wrong frequency Signal loss Wrong Encryption Answer: B Explanation: 802.11a operates in the 5GHz band while g operates in the 2.4GHz band. QUESTION 1440 A web-based application is responding very slowly. The network administrator is looking at the following information from the transparent web proxy, which is configured in virtual-wire mode and is in the between the company's network and the Internet.

410 Given the above information, which of the following is the layer of the OSI model at which the issue is occurring and the MOST likely reason it is occurring? (Select two.) Layer 1 Layer 4 Layer 3 Layer 7 The application crashed NO IP addresses on interfaces Excessive TCP resets Bad cable Answer: CH Explanation: QUESTION 1441 Which of the following is used to proxy client requests for IP configurations across different network segments? DHCP relay SOCKS Teredo tunneling Reverse proxy Answer: A QUESTION 1442 Which of the following is the BEST way to prevent various types of security threats throughout the network on a routine basis? Disaster recovery planning User training and awareness Penetration testing 410

411 D. Business continuity training
Answer: B QUESTION 1443 A network administrator is assigned an approved change request with a change window of minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which of the following describes what the network administrator will do NEXT? Return the system to step four since this was the last working step. Request additional time since the change is near completion. Leave the change as is and inform users of a workaround. Return the system back to the original state before the change. Answer: D QUESTION 1444 A network administrator was told by the Chef Information Officer (CIO) to set up a new office with a network that has redundancy. Which of the following topologies would the network administrator need to administer? Hybrid Bus Mesh Partial mesh Star Answer: C QUESTION 1445 An engineer is reviewing network logs on a management switch and discovers that, compared to previous reports, a large amount of traffic is coming from a particular node. Upon further investigation, the engineer determines traffic coming from the port in question is using points that indicate NAT is occurring somewhere downstream from that point. After conferring with another network manager, the team determines a user has added an unauthorized SOHO WLAN router to the network. Among the vulnerabilities that could result from such an action is the possibility of the user inadvertently connecting the LAN interface of the SOHO router into the LAN port coming from the corporate network. This configuration would MOST likely result in which of the following scenarios? Excessive interface on the corporate LAN port DHCP scope exhaustion Evil twin stacks Competing DHCP servers on a single LAN QUESTION 1446 An organization wants to improve its ability to detect infiltration of servers in a DMZ, IPS/IDS

412 solutions are currently located on the edge between DMZ and Untrust, and DMZ and Trust. Which of the following can increase visibility inside the DMZ? Layer 7 firewall Honeypot NAC server Host-based firewalls in the DMZ Answer: A Explanation: QUESTION 1447 A technician receives a report that a user's workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user's VoIP phone is routed directly under the rolling chair and has been smashes flat over time. Which of the following is the most likely cause of this issue? Cross-talk Electromagnetic interference Excessive collisions Split pairs Answer: C QUESTION 1448 Which of the following tools would a network technician use to troubleshoot a span of single- mode fiber cable? Punchdown tool Spectrum analyzer Ethernet tester OTDR Answer: B QUESTION 1449 A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct problem. Which of the following should the company do to reduce this type of action from affecting the network? Implement a disaster recovery plan with a hot site to allow users to continue working. Segment the network and create a test lab for all updates before deployment. Verify the update hashes match those on the vendor's website. Coordinate the Internet Server update to coincide with the users' updates.

413 QUESTION 1450 A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization's internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of: session hijacking vulnerability scanning social engineering penetration testing friendly DoS Answer: D QUESTION 1451 A network technician is selection the best way to protect a branch office from as many different threat from the Internet as possible using a single device. Which of the following actions would meet the objective? Configure a network-based firewall. Configure a firewall with UTM. Configure a host-based firewall. Answer: A QUESTION 1452 A network technician has been tasked to provide a local office with wireless Internet access. The network technician had determined the users will need a wireless router that provides a maximum of 54Mbps of bandwidth while operating in the 2.4Ghz band. Which of the following wireless standards will the network technician deploy? A a B b C g D n Answer: C Explanation: 802.11g provides transmission over short distances at up to 54Mbps in the 2.4GHz bands. Incorrect Answers: A: a provides transmission at up to 54Mbps but it operates in the 5GHz band. B: b operates in the 2.4GHz band but only provides transmission at up to 11Mbps. D: n operates in the 2.4GHz band but uses spatial multiplexing to provide transmission in excess of 54Mbps. QUESTION 1453 A technician is looking at an issue with a computer connecting to the network. The technician

414 determines wire 3 of a UTP Ethernet cable run has a break in it
determines wire 3 of a UTP Ethernet cable run has a break in it. This computer was previously connected to the switch at 1Gbps throughput. This PC is a kiosk and does not need anything more than 50-60Mbps connection speed. Which of the following can the technician do to resolve the issue quickly? Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex. Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex. Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex. Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex. Answer: D Explanation: QUESTION 1454 Which of the following physical devices provides the BEST security to a datacenter? Cipher lock Thumbprint reader Video monitoring Mantrap Key pad QUESTION 1455 A network administrator need to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25. Which of the following devices will allow for deep packet inspection? Layer 7 firewall Web proxy Layer 3 switch Protocol analyzer Answer: B QUESTION 1456 An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN. Which of the following describes this methodology? PKI Federated identity

415 Two-factor authentication
Biometric authentication AAA Answer: A QUESTION 1457 A technician uses a cable tester to verify the pinout in an Ethernet cable. After testing each pin, the technician records the following output: Based on this information, which of the following identification describes this cable? Crossover cable Rollover cable Patch cable RJ-48 cable Answer: A QUESTION 1458 An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. Which of the following is the employee MOST likely using? Proxy server Least-cost routing IPv6 VPN concentrator QUESTION 1459 A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network. Which of the following should system administrator do to confirm the network is protected? Analyze packet captures. Utilize netstat to locate active connections. Use nmap to query known ports. Review the ID3 logs on the network. Explanation:

416 QUESTION 1460 A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. Which of the following is MOST likely the cause of this issue? Latency Throttling Interference Split horizon Answer: C QUESTION 1461 A client has combined the voice-data circuit from a provider and is getting the maximum download and upload speeds of 2.0Mbps. Which of the following services is being used? ADSL T1 E1 VDSL Answer: A QUESTION 1462 Joe, a network administrator, has installed an SFTP server behind a load-balancing router. He opened port 21 but was unable to establish a connection. Which of the following ports should he have opened? Port 20 Port 22 Port 162 Port 443 Answer: B Explanation: QUESTION 1463 A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and connectivity. Which of the following rules should the technician verify FIRST? All outbound traffic is blocked All inbound traffic is blocked A DMZ has been created An implicit deny is enables Answer: D

417 QUESTION 1464 Which of the following network infrastructure implementations would be used to connect two remote sales back to the main campus for all data and voice traffic? Crossover cable Multimode fiber Satellite MPLS Answer: B Explanation: QUESTION 1465 A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of: ARP cache poisoning IP spoofing amplified DNS attack evil twin Answer: A QUESTION 1466 A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. Which of the following is the MOST likely cause? An evil twin has been implemented. A successful WPS attack has occurred. The user is experiencing ARP poisoning. The user is connected to a botnet. QUESTION 1467 A user reports slow performance. A technician troubleshooting the issue users a performance monitoring tool and receives the following results: Avg. % Processor Time = 15% Avg. Pages/Second = 5 Avg. Disk Queue Length = 1 Based on these results, which of the following is causing a bottleneck?

418 Hard drive Memory NIC Processor Answer: B QUESTION 1468 A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. Which of the following will be the QUICKEST option configure a new switch? Baseline Image Archive Syslog QUESTION 1469 A technician is testing a new web-based tool capable of generating automatic teller machine (ATM) cash and service availability reports. The web-based tool was developed by a consortium of financial institutions. Which of the following cloud delivery models and technologies are being utilized? (Select two.) SaaS Public Community PaaS Private IaaS Answer: CE QUESTION 1470 Workers in a company branch office are required to click on an initial web page and agree to have web surfing mentioned. This is an example of: an end-user license agreement an SLA an AUP an MOU Answer: C Explanation:

419 QUESTION 1471 Which of the following ports does SIP use? A. 443 B. 1720 C. 2427/27/27 D. 5004/5005 E. 5060/5061 Answer: E Explanation: QUESTION 1472 A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following types of monitoring should be put in place? SNMP SMTP NIDS SMS Answer: A QUESTION 1473 After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity is intermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boiler rooms of each building. Which of the following is the MOST likely reason for the connectivity issue? The wrong SFPs are being used There is interference from the electrical room. CM1 fiber should be used instead There is heat from the boiler room modules/data_sheet_c html QUESTION 1474 Several users at an adjacent office building report connectivity issues after a new building was built in between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an ac bridge. The network technician logs into the AP and confirms the SSID, encryption and channels are all correct. Which of the following is MOST likely the cause of this issue?

420 420 Device saturation Antenna type Bandwidth saturation Interference
Answer: D QUESTION 1475 Ann, a technician, connects a pair of switches using redundant links. When she checks the status of the links, one of them is not active, even when she changes ports. Which of the following MOST likely disabled the redundant connection to the other switch? Spanning tree IGRP routing SSID mismatch Port mirroring Answer: A Explanation: QUESTION 1476 A network administrator has determined the ingress and egress traffic of a router's interface are not being correctly reported to the monitoring server. Which of the following can be used to determine if the router interface uses 64b vs 32b counters? SNMP walk Packet analyzer SYSLOG server Port Scanner QUESTION 1477 Which of the following is an example of a signaling protocol used in VoIP telephony? VRRP H 323 RTSP SIP QUESTION 1478 A network administrator is troubleshooting an issue with unstable wireless connections in a 420

421 residence hall. Students on the first and second floors are reporting the hall's SSID is not visible in the evenings. The network administrator has verified the wireless system is operating normally. Which of the following is the MOST likely cause for the problem reported by students? Internet router maintenance is scheduled. An ARP attack is underway. The SSID is set to hidden. A jammer is being used. Answer: A QUESTION 1479 Which of the following is the number of bits there are in 1024 bytes? A. 512b B. 4096b C. 8000b D. 8192b Answer: D QUESTION 1480 Policies, procedures and end-user training are effective ways to mitigate: zero-day attacks attempted DDoS attacks man-in-the-middle attacks social engineering attempts Explanation: sized-organizations-35562 QUESTION 1481 When a criminal or government investigation is underway, which of the following describes the identification, recovery or exchange of electronic information relevant to that investigation? Data transport First responder eDiscovery Encryption Answer: C QUESTION 1482 A network architect is designing a highly redundant network with a distance vector routing

422 protocol in order to prevent routing loops, the architect has configured the routers to advertise failed routes with the addition of an infinite metric. Which of the following methods has the architect chosen? Spanning tree Split horizon Route poisoning Hold down timers Answer: C QUESTION 1483 A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. Which of the following features should the engineer use in order to dynamically limit the number of devices in each broadcast domain? VLAN pooling Subnetting WPA2 LWAPP Answer: D Explanation: QUESTION 1484 A company is setting up a brand new datacenter and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. Which of the following should be installed to meet the requirements? Conduit Cable trays Patch panels Raised floor QUESTION 1485 A technician troubleshooting an area that is having difficulty connecting to a WAP. After identifying the symptoms, which of the following should the technician do NEXT? Document findings. Resolve the issue. Establish the probable cause. Implement a solution.

423 methodology.html QUESTION 1486 A network engineer is designing a wireless network that uses multiple access point for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point? Adjacent access point should be assigned channels 1, 6, and 11 with a 20MHz channel width. Adjacent access points should be assigned channels 2,6, and 10 with a 20MHz channel width. Adjacent access points should be assigned channels 7 and 11 with a 40MHz channel width. Adjacent access points should be assigned channels 8 and 11 with a 40MHz channel width. Answer: A Explanation: channels.html QUESTION 1487 A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. Which of the following options will help to quickly identify the switches connected to each port? Configure TACACs+ on each network device. Enable a discovery protocol on the network devices. Configure each uplink to send LACP discovery units. Enable a packet sniffer on each network device's uplink port. Answer: B "Neighbor discovery protocols are essential for network administrators and management tools to accurately construct a view of the network topology. Each manufacturer has its own supported mix of neighbor discovery protocols, loosely based on how standards-focused that vendor is and how much it wants to pay in royalties to use proprietary protocols. The two most widely used are LLDP (Link Layer Discovery Protocol), an IEEE standard, and CDP (Cisco Discovery Protocol)." QUESTION 1488 The BEST way to secure the most vulnerable attack vector for a network is to: Update all antivirus definitions on workstations and servers. Use biometrics and SSO for authentication. Remove unneeded services running on the servers. Provide end-user awareness training to office staff. QUESTION 1489 Which of the following encryption types would MOST likely be used for securing a client-to-server VPN connection?

424 TKIP Kerberos ISAKMP AES Answer: D QUESTION 1490 Host1's application generates a payload of 2500B of data and sends to Host2. When the application on Host2 receives the payload it will be: more than 2500B due to encapsulation. 2500B in size. less than 2500B due to decapsulation. 1500B due to the default MTU settings. Answer: B Explanation: QUESTION 1491 A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem. Which of the following should the technician do NEXT according to the network troubleshooting methodology? Remove the ARP entry the user's desktop. Identify a suitable time to resolve the issue on the affected desktop. Duplicate the issue in a lab by removing the ARP entry. Document the findings and provide a plan of action. Answer: C methodology.html QUESTION 1492 An administrator notices an abnormally high level of network traffic from a server. Upon logging into the server, the administrator runs the following command: Which of the following should the administrator use to correlate the active connection with the running service? A. netstat -p

425 Open task manager route print Open services.mac Answer: C Explanation: QUESTION 1493 A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible, in the most cost effective manner. Which of the following devices would be MOST appropriate? A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gb Layer 2 switch. A UTM should be used as a gateway device, with BGP as the routing protocol. The computers should be connected to one another using 1Gb Fibre Channel. A router should be used as a gateway device, with EIGRP as the routing protocol. The computers should be connected to one another using a single N MIMO access point. A router should be used as a gateway device, with OSPF as the routing protocol. The computers should be connected to one another using a Gb Layer 3 switch. Answer: A A Gb Layer 2 switch is the cheapest switching solution offering 1Gbps network connectivity between the computers. RIPv2 has a lower overhead as required in the question. Incorrect Answers: B: A 1Gb Fibre Channel network is expensive and is no faster than a 1Gbps network switch. Furthermore, the computers would require Fibre Channel network adapters that do not come as standard on off-the-shelf computers. C: An N MIMO access point is a wireless access point. These typically run at 300mbps which is slower than a 1Gbps network switch. Furthermore, the computers would require MIMO network adapters that do not come as standard on off-the-shelf computers. D: A layer 3 switch is more expensive than a layer 2 switch. The question states that all the computers are in the same VLAN. Therefore, there is no need for inter-VLAN routing so a layer 3 switch is not required. OSPF also has a higher overhead than RIPv2. QUESTION 1494 A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the company file server. Right now, any employee can upload and download files with basic system credentials. Which of the following would require additional credentials? Kerberos authentication MDS authentication Multifactor authentication Single sign-on authentication

426 Answer: C QUESTION 1495 A network technician replaced a faulty Ethernet cable. The technician replaced one side of the patch in the incorrect part of the patch panel. Within a few minutes, the technician was informed that users were experiencing slow or no Internet connectivity all over the building. A broadcast storm began. After removing the replacement cable, which of the following should the technician do NEXT? Replace the cable during the next maintenance window. Review labeling and logical network diagram documentation. Attempt to isolate the storm to the domain by rebooting the switch. Re-terminate all of the other Ethernet cables on the switch to isolate the issue. Answer: B QUESTION 1496 In a network that requires multilayer switches to use authentication via RADIUS/TACACS+, which of the following access control models will the switches need to utilize? A q B af C. PKI D x Answer: D Explanation: QUESTION 1497 A network administrator is comparing several different wireless technologies. To calculate the effective maximum file transfer rate instead of the theoretical, which of the following should be measured? Throughput Latency Goodput Bandwidth Answer: A Explanation: alculations_and_Limitations QUESTION 1498 An organization is required to implement a wireless network. The organization must implement wireless routers compatible with ac protocol that have maximum possible range. Which of the following wireless router frequencies is a viable option?

427 2.4GHz 3.7GHz 5.0GHz 6.0GHz Answer: A QUESTION 1499 A firewall technician has received calls stating the network is running slowly. The technician has found the firewall is functioning properly. Which of the following should the technician review to determine the cause of the slow performance? SNMP traps Heat maps Top talkers Port scanner Answer: C QUESTION 1500 A network's design includes gateways connecting an assembly-line network. The assembly-line network users specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. The IP is connecting the technician workstations with which of the following network types? CSU/DSU SCADA/ICS IS-IS LAN Answer: B Explanation: QUESTION 1501 A network administrator updated an Internet server to evaluate some new featured in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is in the works. Which of the following should the network administrator do to BEST migrate this risk? Enable the host-based firewall on the Internet server. Enable HIPS to protect the server until the patch is released. Utilize WAF to restrict malicious activity to the Internet server. Downgrade the server and defer the new feature testing. Answer: D QUESTION 1502 Which of the following anti-malware solutions should be implemented to deter attackers from

428 loading custom files onto a distributed target platform?
Cloud-based anti-malware Host-based anti-malware Network-based anti-malware Signature-based anti-malware Answer: B Explanation: QUESTION 1503 A company has decided to upgrade its legacy phone system to VoIP. The new phones will download the configurations from a TFTP server each time they boot up. Which of the following firewall ports must be opened to ensure the phones can communicate with the server? 20 53 69 D. 161 Answer: C QUESTION 1504 A technician needs to set up uplink ports for multiple switches to communicate with one another. ALL VLANs should be transferred from the designed server switch. Which of the following should be set on the uplink ports if VLAN 1 is not the management VLAN? (Select two.) STP Port mirroring Port security D x E q VTP Link aggregation Answer: AF QUESTION 1505 A technician is tasked with troubleshooting a network's slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they are able to access the sites using the web browsers. Which of the following is the MOST likely cause? ICMP traffic being blocked by the firewall VLAN hopping TACACS misconfiguration MTU black hole

429 Answer: A Explanation: can-access-them/ QUESTION 1506 A technician has terminated a cable on the datacenter with an RJ-11 connector. Which of the following applications is MOST likely being used? Ethernet for a NAS appliance Out-of-band management VRRP interconnect link Crossover patch cabling Answer: D QUESTION 1507 A company-wide audit revealed employees are using company laptops and desktops for personal gain. As a result, the company has incorporated the phrase "Company-owned IT assets are to be used to perform authorized company business only' in which of the following documents? MSA MOU SLA AUP QUESTION 1508 An administrator is upgrading the switches in the server room to support 10Gbps of throughput. The switch will need to take advantage of the existing CAT6a lines that are run to each server. Which of the following Ethernet standards should be used? 10GBaseER 10GBaseFX 10GBaseSR 10GBaseSW 10GBaseT Answer: E QUESTION 1509 A network technician is working on a large project involving the cabling of a new commercial building. The project involves working with a variety of toxic liquids, some of which require special handling. The technician wants to gain more insight into how items should be handled and stored, and what safety considerations must be made for each item being utilized on the project. Which of the following should the technician review to gather the information needed?

430 430 ESD warnings NIST publications FIPS ISO Standards IEEE Code MSDS
Answer: F Explanation: QUESTION 1510 Which of the following protocols utilizes 3DES encryption by default? GRE PPTP STP IPSec Answer: D QUESTION 1511 Various hypervisor guests are configured to use different VLANs in the same virtualization environment through which of the following? Virtual router Virtual firewall NIC teaming Virtual switch virtual-switch-for-hyper-v-virtual-machines QUESTION 1512 A technician needs to ensure green space wireless coverage. The antenna is being installed in the middle of the field. Which of the following antenna types should be installed to ensure maximum coverage? Omnidirectional Yagi Unidirectional Directional Answer: A 430

431 QUESTION 1513 A network administrator is configuring a VLAN across multiple switches. The administrator wants to configure the VLAN once and have that configuration propagate to all of the switches in the network. Which of the following should the administrator do? Configure the switches to utilize STP Implement port bonding on the switches Configure the switches to utilize VTP Configure the switches to utilize IGRP Answer: C QUESTION 1514 A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments about the rack. Which of the following is MOST likely cause of the connectivity issue and alarms? The OC2 was improperly provisioned. The cable was improperly crimped. The bend radius of the cable has been exceeded. The new OC3 cable is experiencing EMI. QUESTION 1515 A software company is meeting with a car manufactures to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer's next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company's mapping application suite. The software company can offer its enhanced mapping application to other car manufacturer but must pay the car manufacturer a royalty. Which of the following BEST describes this document? MSA SLA MOU SOW Answer: D Explanation: QUESTION 1516 A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is: ARP cache poisoning amplified DNS attacks

432 sessions hijacking creating an evil twin Answer: A QUESTION 1517 Two office buildings are connected via copper network cabling buried in the ground. During local construction, the second building suffers a permanent network outage. Which of the following are MOST likely the causes of the outage? (Select two.) Crosstalk Open circuit Short circuit Signal attenuation Electromagnetic interference Answer: B QUESTION 1518 A home user is configuring a wireless router and must decide which wireless standard to use. The user has many devices that require a lot of bandwidth and must be able to communicate at a far distance from the router. Which of the following wireless standards will BEST meet the home user's requirements? A a B b C g D n Answer: D QUESTION 1519 Patches have just need released by a third-party vendor to resolve a major vulnerability. There are over 100 critical devices that need to be updated. Which of the following actions should be taken to ensure the patch is installed with minimal downtime? Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance: Download and install all patches in the production network during the next scheduled maintenance period. Configure end points to automatically download and install the patches. Deploy the patch in a lab environment and immediately install it in the production environment. QUESTION 1520 While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily

433 removed or added due to the constantly changing environment
removed or added due to the constantly changing environment. Which of the following will BEST fulfill the requirement? Hook and loop straps Ladder trays Raised floor Cable ties Answer: B Explanation: QUESTION 1521 A network administrator is troubleshooting an issue with a newly installed web server. The web server is available to internal users but unavailable to Internet users. The server's network configuration is shown below: Which of the following is the MOST likely reason why the server is unavailable from the Internet? NAT has not been configured on the border firewall. The Layer 3 switchport connecting the web server is blocking port 80. The gateway IP has been incorrectly configured. The configured DNS server is not reachable by the web server. Answer: C


Download ppt "Vendor: CompTIA Exam Code: N10-006"

Similar presentations


Ads by Google