B.4 Comptia Network+ N10 008 Certification Practice Exam
174 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Which of the following tools would generate this output? Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established
Netstat - displays active/ listening connections
People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue?
Reduce the wireless power levels - adjusting the power level of anAP can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network
Which protocol would be used to exchange information between different Autonomous systems?
BSP - is an EGP (external gateway protocol) and is used to exchange information between autonomous systems. autonomous systems. - A network or a group of networks owned/controlled by a single entity
Which of the following controls could be used to allow employees entry into building to be recorded by a card reader?
Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically
Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices?
TACACS+ SSO Is a tempting answer we are asking what can actually manage these accounts not the terminology used to describe having a centrally manage account
While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario?
The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running past its maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft)
While configuring a load balancer between multiple systems which of the following must be configured in order to ensure proper connectivity during a fail over?
VIP - virtual IP an essential part of configuring load balance systems as a single system
Which of the following service models would most likely be used to replace on premises servers with a could solution
IaaS - client moves whole infrastructure to the cloud minus the hardware of course which is always controlled by the CSP in cloud deployments
Which of the following best mitigate a hackers frequent attempts at brute forceing A company's password
Two factor authentication, complex passwords. — passwords are best protected with longer, more complex passwords preferably pass phrases made up of multiple words. Additionally some form of MFA is considered essential today for "password security". Multi factor authentication protects your password by preventing it from being a single point of failure now we should require another factor in addition to our password such as using a biometrics or a smart card
After configuring new firewalls with the correct configuration to be deployed to each remote branch, unneeded services were disabled, and all firewalls rules were applied successfully. Which of the following actions should be performed next to finish hardening the firewalls?
Update the firewalls with current firmware and software — Keeping a device up today is an essential step in hardening any system
Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution?
Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people
A new network was set up in order to facilitate more users in a building near your companies HQ. The new network is connected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which of the following corrections would most likely resolve this issue?
Correct the external firewall gateway address — Could be a misconfigured firewall
Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge?
Tailgating — Is the act of following somebody into a secure area without their knowledge Piggybacking is following somebody into a secure area with their knowledge
IP headers would be found under which of the following OSI layers?
Layer 3- routers, IPv4 , IPv6, and ICMP
Which of the following solutions would provide redundancy for a server if our main concern is physical port failure
NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity
Which of the following is the largest MTU for a standard ethernet frame
1500
Which of the following TCP ports is used by the windows OS for file sharing
445- NetBIOS/SMB ( sharing files/access)
Which of the following subnet mask's is the equivalent of a CIDR of /20?
255.255.240.0. - /20
A large amount of expensive equipment is being moved into a company warehouse this equipment needs to be tracked when it leaves or enters the warehouse or when it is taken to be serviced which of the following solutions would best allow us to record these changes
Asset tags— Asset tags are great for tracking inventory of any type. We can scan the tags and usually enter a note during the process to describe the actions we took during this time
Which of the following is most likely to generate sufficient East-West traffic?
A duplication of a hosted virtual server to another physical server for redundancy. East-West traffic is server to server traffic, while north-South traffic is server to client
In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement
A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router
While installing Wi-Fi for a large amount of users, we want to utilize and 802.11 Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement?
5 GHz. — 23 non overlapping channels
Which of the following would most likely be used to review previous upgrades to a system
Change management
Which of the following commands can be used to display the pass that networking traffic takes to reach other networks
Show route
While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experiencing extreme amounts of latency. Which of the following problems is most likely occurring?
A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many of the basic security controls of manage switches, such as STP
Which of the following best describes a network appliance that warns of unapproved devices that are accessing the network
IDS - intrusion detection system
Which of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity?
Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network
Which transceiver type can support up to 40 Gbps?
QSFP+ QSFP+ 10 Gbps per channel / 40 Gbps channels
When a large amount of users are remotely accessing a centralized VM hosting server, which of the following concerns are raised assuming the network can readily support this increase in traffic
CPU usage and. Memory VMs much like physical systems however do you have both CPU and RAM requirements the more systems running on the VM host the hire the requirements
Client devices cannot enter network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DH pool which of the following in the administrator perform to resolve the issue
Decrease the number of VLANs — While we would generally increase the scope of the DHCP pool that may cause other problems which is why we see this question states we want to avoid increasing the scope by reducing the least time we will cycle through IP at a quicker rate then we otherwise would allowing us to reuse IP address is much more quickly
What type of cable would likely be used to connect to the WAN Port on a cable modem
Coaxial
Which of the following would need to be configured to ensure a device with a specific Mac addresses always assigned the same IP address from DHCP
Reservation — While a static assignment would ensure a device would have a consistent IP address the question states that it Has to be from DHCP making a Mac reservation our best answer
What port enables telnet access to a device
23 Telnet
What should be reviewed on a switch in order to review physical network addresses
MAC table— Mac addresses are physical network addresses
You were troubleshooting a network switch that seem to have stopped responding to request when the login level was set to debugging which of the following should be checked to begin troubleshooting the switch
CPU utilization — If setting logging to debugging the highest level/lease severe level of logging you end up asking the device for all logs which is information on an incredible amount of traffic
What is used to track and document various types of known vulnerabilities
CVE- Common vulnerability and exposure
After a DNS record was updated some users report being unable to access the website associated with that record which of the following should be changed to fix the issue
TTL — DNS TTL keeps records cached for a certain period of time any cached do you know would point towards the wrong site if the A (IPv4) record was changed
Which of the following IEEE 802.11 standards Would be best to use for multiple simultaneous client access
CSMA/CA Carrier sense multiple access with collision avoidance allow multiple users to connect to a Wi-Fi network while minimizing collisions/interference on the network
Which system would most likely be found and a screen subnet
FTP — Screen subnets it's also known as DMZ's are areas of the network that are used to separate the Internet from our corporate network devices that need to be directly access from the Internet will be placed here such as websites email server and file sharing servers
After trying to set up a port mirror with the following configuration: Switch mirror port details: eth0:10.1.2.3 AA:BB:CC:DD:EE:FF Which of the following commands could be entered on the PC to finish this configuration?
Ifconfig eth0 promisc — Turns on promiscuous mode
Which of the following command can confirm the name of a Linux server
Nslookup— The OS of the server who's name we are confirming doesn't affect the command we run we determine the command we use based on the OS that we are actively using if we were running commands in order to query in the DNS( name) information of a device we would use nslookup on a Windows system or DIG on a Linux system
A new cabling certification is being requested every time and network technician rebuilds one end of a CAT 6 (vendor-certified) Cable to create a crossover connection that is used to connect switches which of the following will address this issue by allowing the use of the original cable
MDIX— Auto MDIX allows a cable to take the correct connection requirements. (Crossover vs straight through) and that's the opposite end of the cable becomes less important to the tech
Which of the following devices could be used to detect which devices exit on a given network?
Ip scanner A simply IP scanning tool could tell you which devices exist on your network and what their IP addresses are a port scanner would be a close second but it would provide more information in the question is asking for making an IP scanner a better answer ( it would should open/close ports as well as services running)
After investigating reporter for network performance and network admin finds hundreds of CRC Errors on an interface which of the following is the most likely cause of these errors
A bad wire on the Cat 5e cable CRC Errors can because by a multitude of issues these issues can range from corrupt data to noise (interference) On the cable to just plain bad cabling
Considering that hubs are vastly outdated in terms of network hardware you've decided to replace all hubs on your network with their devices of the following devices which are you most likely to replace your hubs with
A layer 3 switch Herbs were used to move traffic ( poorly) threw out a network so some form of switch would be the best choice for replacing them
A company has an access layer switch in the lobby of their headquarters which of the following security technology should we consider first given the placement of the switch
Port security - Considering physical access is provided to the switch we need to lock it down to the best of our abilities. Portsecurity attempts to do justice by limiting who and how many devices can plug into an individual switch port though in general you need to be careful allowing anybody untrustworthy to have physical access to your network equipment
The technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building several APs are mounted in this office that users report that the network connections frequently disconnect and reconnect throughout the day which of the following is the most likely cause of this issue
Channel overlap is occurring A high-rise building is likely to have many AP's set up by various businesses which is likely to cause considerable interference resulting in an unstable connection
The network device is configured to send critical events to a syslog server but severity five alerts are not being received from networking devices
The network device is not configured to log that level to the syslog server. Whenever a particular syslog level is configured A system returns all events from that level and more severe
When assigned 196.168.1.0/26 as a network, an admin gave a router the following up configurations Ip address: 192.168.1.30 Subnet mask: 255.255.255.224 Gateway: 192.168.1.1 Users on the network immediately lost connectivity what is the most likely reason as to why?
The incorrect IP address was configured A CIDR of /26 is the equivalent of the subnet mask 255.255.255.192
Which of the following features would allow us to condense multiple SSID into a single SSID
Seamless roaming Seamless roaming allows you to dynamically connect to different APs as your room through building all of these APs would have the same SSID in order to signify they are the same network
Which of the following techniques will help aid with congestion reported by users on networks was large amounts of video and VoIP traffic
Quality of service QoS gives delay sensitive traffic( such as streaming video and voice) A higher priority you are moving through the network this generally works by delaying other sets of traffic slightly in order to give considerable increases to prioritize traffic
Which of the following technologies provide a failover for mechanisms for the default gateway
FHRP When multiple routers are used on a LAN you need a protocol which manages a single VIP ( virtual IP) The enables clients to connect to redundant routers as FHRP protocols fill this job perfectly
Which of the following devices would be used to manage a corporate WLAN?
A wireless controller
A workstation is configured with the following information IP :172.20.5.25 Mask: 172.20.5.0/27 Gateway: 172.20.5.1 Which of the following addresses would represent the broadcast address of this network
172.20.5.31 A /27 network could contain 32 IP address (5.0-5.31) the first address (5.0) is the network ID the last address (5.31) is the broadcast address and all addresses between those are valid assignable hosts (5.1-5.30)
And network is experiencing a number of CRC errors during normal operations which of the following layers of the OSI model will likely need troubleshooting?
Layer 2 CRC errors are contained within an ethernet header ( layer2)
A network tech is reviewing the interface counters on a routers interface the tech is attempting to confirm a cabling issue given the information below which of the following metrics confirms that there is a cabling issue? CRC's :170 Giants :0 Runts :0 Multicast:12
CRC's CRC's Measure the number of frame errors detected over an interface which could be caused by corrupt data noise ( interference) on the cable or just plain bad cabling
Which of the following records can be used to track the number of changes on a DNS zone
SOA Start of authority ( admninstrative DNS info/ for zone transfers)
Are use her in a branch office reports that access to all files has been lost after receiving a new PC all other users in the branch can access file shares the IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router but the machine cannot ping the router which of the following is most likely the cause of the incident?
Incorrect subnet mask The machine cannot access files or ping the router which illuminates DNS (which isn't required unless contacting by device name) and TCP port( which would affect a single service) Past that you are more likely to sign the wrong mask which could be a simple typo rather than a different class which would be an entirely different IP range
Which of the following ports is commonly used by VoIP phones?
5060 Sip - VoIP setup Process of elimination can be your best friend
Which of the following topologies would have the highest number of connections compared to other topologies
Mesh- A mesh network is designed to allow most devices to have redundant connections with most other devices in order to provide a highly available network
Which of the following protocols would allow you to install and manage a Windows server in a different building than the one you're currently in
RDP
Which of the following is a physical topology for an ethernet LAN?
Star
After installing and connecting the on premise equipment for a DSL connection you noticed the modem will not sync which of the following processes should be followed first to troubleshoot the issue
Use a toner probe to identify the circuit Checking the hardware issues is common during any installation you just need to know the right tool for the job
Which of the following documents would you help ensure proper versioning is followed and unnecessary upgrades are not made to the equipment
A change management policy
Which of the following protocols would be used to resolve an IPv6 address to a MAC address
Neighbor discovery protocol Neighbor discovery serves a purpose the ARP did on IPv4 networks
Our new server farm is being set up somewhere in California that are a higher base business plans to migrate to however there will be a years period of time we're both server firms are in use and the sensitivity of our data is a concern which of the following technologies could alleviate our concern
Site to site VPN When going from one physical location to another without a physical connection between the two locations it is always a good idea to utilize encrypted VPN when security is a concern
Which of the following tools could be used to detect the exact break point of a fiber optic link
OTDR Optical time domain reflectometer
Which of the following DNS records works as an alias to another record
CNAME Alias record
Which of the following best represents the concept of connecting to a secure server in order to securely access a second server
A jump box A secure system which is used as a single access point for other systems this hardens remote management of the remote system since access is limited
To comply with an industry regulation all communications Dustin to secure server should be logged in archived on a storage device which of the following can be configured to for fill this requirement
Port mirroring Port mirroring allows all traffic to be copied and sent to another device such as secure secure storage device
Which of the following IP ranges falls between 169.254.0.0 and 169.254.255.255
APIPA
After installing a fiber optic link between routers and using a tool to verify the cable the link does not connect which of the following would explain the issue
They used the wrong type of fiber transceiver Incorrect TX/RX Polarity exists on the link
After pulling a new stitch and adding it to the existing network monitoring software do you want to determine which metrics can be gathered from a given switch which of the following should be utilized from the switch
MIB Contains a string of possible metrics that the switch contract
Which of the following step should be done after confirming the cause of a problem
Establish a plan of action to resolve the issue and identify potential effects
An IT director is setting up a new disaster and HA policies for a company limited downtime is critical to operations to meet corporate requirements for the director set up two different data centers across the country that will stay current on data and applications in the event of an outage the company can immediately switch from one data center to another which of the following does this best describe
Hot site According to comp Tia a hot site is a back up site that can fail over almost immediately and is working with a live data set
Which of the following types of devices can provide content filtering and threat protection and manage multiple IPSec site to site connection
Next generation firewall Next generation firewall are firewalls with many capabilities beyond that of a regular firewall they are very similar to UTMs ( many controls in one) that mini allow a company to customize their solution while UTMs are generally bundled products
When configuring redundant network links between switches which of the following should be enable to prevent network stability issues
STP Isn't technology which detect potential loops on the network which would otherwise cause broadcast storms. Broadcast storm which is an infinitely repeating broadcast can bring the network down or at least slow it down considerably
Which of the following factors should be considered when evaluating a firewall to protect a data center is east west traffic
Replication traffic between an on premise server and a remote back up facility East west traffic is server to server traffic while north south traffic is server to client
Despite confirming that all devices are connected to the network throughout the entirety of the day some of your users are reporting intermittent Internet connectivity some users report connectivity and contemporarily re-establish a connection by disconnecting and reconnecting through the web authentication process which of the following steps and most likely determine the cause of this issue
Verify the session time and configuration on the captive portal settings Despite being connected to a wireless network you may not be allowed to access certain networking resources or the Internet depending on the access granted to you by the network many networks are protected by captive portals which are webpages that may ask for additional credentials or knowledge may have a user agreement before you can access the network
A use reports being unable to access the network resources after making changes in the office which of the following should be done first
Ask which changes were made Ask for details on the changes made first so that going forward we can make more informed decisions on how to troubleshoot the network
Layer 1
Physical Layer
Layer 2
Data Link Layer
Layer 3
Network Layer
Layer 4
Transport Layer
Layer 5
Session Layer
Layer 6
Presentation Layer
Layer 7
Application Layer
You Want to have separate Wi-Fi networks for your employees and your guests. Which of the following features should be configures to allow different wireless access through the same equipment
SSID Most modern WAPs can support multiple frequencies/SSIDs in order to facilitate multiple networks. So here we can simply assign on SSID to the corporate network and another SSID for the guest network
Which would be the best use to detect MAC spoofing?
Internet Control Message Protocol
the chain of connections from a device to a switch on your network is as follows: Device> LC/LC patch cable> Patch Panel> Cross-connect fiber cable> Patch Panel> LC/LC patch cable> Switch Despite using known working patch cables, the connection isn't working and the device has been tested and was working before being installed. Which of the following if the most likely cause of a problem in this connection?
TX/RX was reversed simply reverse the TX/RX on the connector
Which of the following types of authentication technologies will allow a single account to be used to access multiple services/applications?
SSO One account that gives access to various/applications
Which of the following OSI layers do TCP and UDP operate within?
Transport
The length of an IPv6 address is?
128 bits
A network admin wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?
192.1.0.124/30
What best describes the function of OSI layer 3
Provides connectionless communication using logical addresses
You are reviewing a network diagram and are looking for the edge router. What is MOST likely symbol used for a router?
a Circle with 4 outward arrows
A company is implementing IPv6 addressing and wants to ensure there are consistent addresses for printers and servers that will not change. However, the company does not want to use static addresses. Which of the following IPv6 schemes will provide the same address for the devices?
EUI-64
the length of a MAC address is?
6 bytes 48 bits, aka 6 bytes (1B=8b)
what is the default mask for the IP address 190.25.250.10?
/16 since the first octet is 190 this is a class B address. Class B addresses use a default of /16 (aka 255.255.0.0)
class A address
1-126
class b address
128-191
class c address
192-223
class d address
224-239
class e address
240-255
Which of the following CIDR matches the IPv4 VLSM? Choose all that apply
/21 is 255.255.248.0 /30 is 255.255.255.252
which of the following OSI model layers is responsible for ensuring proper transmission of frames using a frame-check-sequence value?
Layer 2- Data Link Frames are found on Layer 2
the length of an IPv4 address is?
32 bits
what best describes the function of OSI Layer 2?
provides error detection through the FCS for frames transmitted
host alpha has an IP address of 192.168.35.209 and is part of the 19.2168.35.192 subnet. If the options below, which mask would be correct?
255.255.255.224 explanation is on PowerPoint 100 if needed
a network tech is reviewing a network diagram and is looking for Layer 2 switch. What symbol should they be looking for?
a rectangle with 2 horizontal arrows
a senior engineer has asked you to create several subnet out of the provided/25 network. Each department will need their own subnet and they should be no larger than necessary. What CIDR notations would be needed for each department? Ops: 52 Hosts, Marketing: 28 host, Admin:13 hosts, IT: 7 hosts
Ops/26, Marketing/27, Admin/28, IT/28
Which of the following OSI model layers is responsible for compression and data encoding?
Presentation
of the devices listed which will provide a high number of interfaces and offer routing services for a LAN?
Multilayer Switch
Which of the following would act ad a standalone star network with a layer 1 network device?
4 PCs all connected to a single hub, and nothing else. a hub is a layer 1 device
a firewall as configures with a role that forwards FTP traffic to an internal server that is listening on a non-standard port. What best describes the rule configured on this firewall?
PAT They are describing a process known as ' port forwarding' which is considered a component of PAT
To support redundancy at Company A, all care switches are connected to each other. What type of network topology is being utilized?
Mesh
what is the best reason for using wireless mesh topology to support IoT sensors?
It creates various paths to a particular destination
in the event of WAN outage, or configuration error, you may be required to remotely reconfigure a company router. What method would best provide access in this situation?
Out-of-band The WAN connection would be considered 'in-band' because WAN traffic passes through the router. If we want to access this router even when the WAN connection is down, we will need an out-of-band connection
a new device transmits data into a stich for the first time. Which of the statements below is true?
Data is flooded out of every port in that VLAN, except the one it came in on
A network engineer has been assigned the replace a failed router. The network already has a switch, cable modem and static IP assignments. furthermore, there is a web server running on this network that should remain available to the internet. What is the correct configuration and placement for the devices above?
The modem is places in bridge mode, the router is places behind the modem and the web server is places behind the router.
A network engineer is reviewing a network statistics and notices a nigh level of collisions between a switch and a PC. What is the most likely source of this issue?
The PC's NIC and/or the switchport are set to half-duplex
Which addresses are routable over the internet without using any form of NAT?
172.35.10.250 this is a public address!
Which of the following would a network tech most likely connect to power wireless access points in drop ceilings?
Power-over-ethernet switch
A nearby city offers wireless internet access throughout the public areas. What type of network is this?
MAN
Data has been stored locally on a subnet for access by several employee devices. What is being described in this situation?
NAS
A network engineer is adjusting the network settings on a server. They issue the following command: route add 0.0.0.0 mask 0.0.0.0 10.1.5.1 metric1 what setting has the engineer attempted to alter?
They have set a default gateway
A switch without and VLANs receives a frame with a destination address of FF:FF:FF:FF:FF:FF. What will the switch do with this frame?
Flood the frame out all interfaces except the one it was received on
Which of the following technologies should be used in high-throughput networks to reduce networks overhead?
Jumbo Frames
A network engineer is asked to create a solution that will serve the data needs of the entire company. There are 3000+ users and the data must remain onsite. What option listed below would meet these conditions
SAN
You receive a switch that has VLANs configured on all of its ports. At what layer is the switch operating?
Layer 2
What protocol uses BPDUs to detect loops on Layer 2 of the OSI model?
STP
A network technician needs to monitor the traffic going into a mission-critical in the datacenter. Which of the following is the best method to perform this?
Use port mirroring
You've been tasked with connecting two hubs together. To avoid problems that would arise from increasing the size of the collision domain, what device should you use to connect the hubs together?
Bridge
After a broadcast storm that brought down the corporate network a technician has ben asked to install hardware to mitigate this risk in the future. What could be installed to accomplish this assignment? ( pick 2)
Gateway Bridge
A switch is to be configured so that it can carry five VLANs over a single physical link. What type of port can facilitate this?
a trunk port
An eight port switch was configures to have three VLANs. Of the eight ports on the back of the switch, one was designates a trunk port, while the other seven where each assigned to only one LVAN. What type of port is only assigned to a single VLAN?
An Access port
Users report the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?
Layer 3 Switch
The corporate network consists of 3 switches, a router, and a hub. The switches are connected together in a chain, to a single port on the router. Each of the switches had 8 ports. coming off the second switch is a hub, which has 4 computers attached to it. How many broadcast domains exist in the corporate network?
1
A manager wants to deploy a syslog server on the network. What benefit would a syslog server provide to the company?
Aggregates switch logs for easier review and correlation
A new server has ben deployed in the cloud that does not support a GUI. Which of the following could be used to star a secure remote console session with this server?
SSH- is encrypted
You discover that an employee's PC is not receiving an IP address via DDHCP. An change log outlines that the PC'S had its OS Patches and a new NIC installed (1Gbps), to replace an older slower card (100Mbps) The user is a member of a group that accesses a server hidden behind a firewall. Other group members are not having a problem and the switchports are up and set for auto negotiate. What is the MOST likely problem?
The PC had DHCP reservation which is invalidated by the new NIC.
Of the options below, What could be used translate and tie in legacy phones into a VoIP solution?
VoIP Gateway Is used to bridge (connect) legacy phones into a VoIP deployment, Typically this gateway is connected to the physical (legacy) PBX.
Your organization just moved to a cloud based email service. Many email recipients are complaining that any email sent from the organization is going into the junk folder because the sends identity cannot be confirmed. Which of the following DNS record should be modified to minimize this problem?
TXT
You already have a DNS record that resolved ABC.123.net to your company's webserver. You would like a new DNS record to allow DEF.123.net to point to the same IP as ABC.123.net. What type of DNS record needs to be created to facilitate this?
CNAME Is a type of DNS record that maps an alternative name to a true or 'canonical' domain name.
Over the summer a college has been hosting one dat training exercises, from Monday to Friday, with guests and students. Each day there are 250 attendees, most of which are new, and they all need access to the guest Wi-Fi. The guest network uses a /24 subnet. On Tuesday several users complain that the Wi-Fi is unavailable, The complaints increase the following day. What could be done to prevent this issue from occurring in the future?
Reduce DHCP lease time form 8 days to 8 hours
To prevent outgoing emails as being categorized as spam, which of the DMS records below should be updated with the organization's SPF information?
TXT SPF allows the receiving mail server to check during mail delivery that a mail claiming to come from a specific domain is submitted by an IP address authorized by that domains administrators. This mechanism helps detect spam! The list of authorized sending hosts and IP addresses for a domain is published in the DNS-TXT record for that domain.
Which protocol is used to send out emails across a network infrastructure or between email servers?
SMTP
When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?
MIB
What ports can be used for email ( pick 3)
25- smtp 143- imap 110-pop SMTP= Simple Mail Transfer Protocol. emails coming into an email server, or going between servers. IMAP= Instant Messaging Access Protocol. for viewing emails as they exist on the email server. POP= Post Office Protocol For downloading emails from the email server
Which of the following cloud service models would best support an organization looking to have a hosted database, such as SQL or Oracle?
PaaS ( Platform as a Service): typically used to provide development and database platforms for developers or database admins
A cloud storage server has been brought online that is intended to serve hospitals exclusively. Several hospitals, all owned by different entities, have begun using this highly secured cloud server. What type of cloud deployment model matches this type of server?
Community A community cloud is shared by a group of similar organizations that all have similar needs. In this example, it is a server built only to serve hospitals.
Which of the following is configured on a network device to enable hosts to receive the proper DHCP configuration if the server is on a different subnet
IP helper
Which of the following is the most likely cause for network PC to have an APIPA address?
DHCP failure APIPA stands for Automatically Procured IP Address . In Windows, APIPA addresses are 169.54.X.X unless configured otherwise. An APIPA is the address a computer will give itself if the DHCP server is unreachable. Windows will retry to contact the DHCP server every five minutes until it gets a response.
Several computers in a factory need to be connected together. What medium would be acceptable for short distances and also the most cost effective?
BNC and a RG-59 cable RG-59 cables (coaxial) are only good for short distances, and can have BNC connectors! Plenum cables are expensive! ST, a fiber connector, shoulder be put on a UTP cable (copper) RJ11 is for terminating phone lines and shoulder be attached to a Cat 6 cable
At IT company is installing WAPs in a new business complex. Some of the network cables must run above the drop ceiling and through or near are condition ducts. What type of cable would be best suited for this need?
Plenum
To connect the new serve to the switch a pair of Cat5e cables had to be coupled together. By themselves, each cable was 200 feet (61 Meters) long. Users have been reporting an intermittent loss of connectivity to the server. What is the most likely cause of this problem?
Attenuation
Where is an office building would a network tech find the entry point for the ISP?
Demarc
The company has deployed a network storage solution to support future growth. What types of connections can be used that will not require new network cables and dedicated switches? ( pick 2)
FCoE, PATA
An organization is moving into an office that was unused for several years. While continuing to use the infrastructure already in place, several employees report that the network connections, workstations, and switches are rated for 100Mbps, and set to auto-negotiate. What is most likely the issue with the slow speeds?
Employees are connected to a hub
Two Cat5e cables need to be connected together to tie in a new workstation. Each cable is 200 feet (61 meters) long. Instead of using a coupler, what should be used to connect the cables together to avoid attenuation?
Bridge
A technician is installing a remote call box that requires a single copper ethernet connection. The uplink rom the business network is over single-mode fiber. Which of the following devices should be installed to bet facilitate the connection?
Media Converter
Tyler connected his laptop directly to Joe's laptop that has a gigabit Ethernet port, using a straight-through cable. Through this connection he successfully transferred several large files. Later, Tyler directly connected to a desktop that has a 10/100 ethernet port, but was unable to establish a connection using the same cable. What best describes the cause of this problem?
Tyler's laptop does not support auto- MDIX We don't know what type of NIC is in Tyler's Laptop. What we do know: when one side is a non-gigabit standard, like when Tyler connected to the desktop, we need to use a crossover cable. Alternatively is one side of the connection supports auto- MDIX that device can reconfigure itself to support a straight-through cable even when it should be crossover. The only answer then is that both Tyler's laptop, and the desktop, lack auto-MDIX. Lastly, auto-MDIX is built into the gigabit ethernet standard, so its safe to assume gigabit ethernet ports have auto-MDIX
a PoE phone is not receiving power at the employees desk. A network engineer tests the network components with a PoE injector at the switch and this resolves the issue. Which of the following was the most likely cause of the problem?
Bad Switchport
A series of WAPs are being deployed around the corporate campus to provide better Wi-Fi coverage. The placement of one of the APs required the network cable to be run alongside power cables that pass through a conduit. What type of cable would be the best fit for this situation?
STP
A company requires an ethernet cable capable of providing 1Gpbs for the lowest possible cost. Of the options below, what cable standard should they select?
Cat 5e 1 Gbps (older and cheaper than CAT 6)
What type of cable would most likely be terminated with an F connector?
RG-6 A coaxial cable, such as RG-6, can be terminated with either a BNC or F connector.
Which of the following cable types should be used to connect a cable modem to a SOHO router?
Ethernet
which of the following connector types is used to terminate household telephone cabling?
RJ-11 used for phones RJ-11 had 4 copper wires.
Of the internet connections below, which is the fastest?
Cable. Cable can support up to 10 Gbps down, 1 Gbps up when running the latest version of DOCSIS. The others max out before they even reach 1 Gbps
Joe needs a WAP that can support speeds of at least 1Gbps.Which of the following standard will meet Joe's needs?
802.11ac
Which Wi-fi security mode utilizes TKIP for its encryption?
WPA
The organization WLAN offers complete 2.4 and 5.0 Ghz network, are connected to the crowded 2.4 Ghz network. What technology could be deployed to better distribute more users to the faster and less congested 5Ghz network?
Band Steering
An employee is attempting to use a video conferencing app from the company's meeting room on the second floor. However, they report that the WiFi occasionally stops working during the video calls. The signal strength is reported as being -75dBm. What should be installed to resolve this issue?
A range extender With -75dBm , our signal is too weak to sustain a reliable streaming session. If we want to install something to resolve this issue, we need another access point The closer to zero the better our single
A network built in bridge mode contains 802.11g, 802.11n and 802.11 ac access points. What speeds would this wireless network perform at?
54 Mbs
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials