Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Full Access
Question # 5

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Full Access
Question # 6

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 7

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Full Access
Question # 8

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Full Access
Question # 9

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Full Access
Question # 10

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Full Access
Question # 11

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 12

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Full Access
Question # 13

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Full Access
Question # 14

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 15

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Full Access
Question # 16

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 17

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 18

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 19

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Full Access
Question # 20

Which of the following attacks would most likely cause duplicate IP addresses in a network?

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Full Access
Question # 21

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Full Access
Question # 22

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Full Access
Question # 23

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Full Access
Question # 24

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 25

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Full Access
Question # 26

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Full Access
Question # 27

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Full Access
Question # 28

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Full Access
Question # 29

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Full Access
Question # 30

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Full Access
Question # 31

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Full Access
Question # 32

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Full Access
Question # 33

Which of the following protocols has a default administrative distance value of 90?

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 34

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

A.

4096

B.

8192

C.

32768

D.

36684

Full Access
Question # 35

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Full Access
Question # 36

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 37

Which of the following routing protocols uses an autonomous system number?

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 38

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 39

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Full Access
Question # 40

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Full Access
Question # 41

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

Full Access
Question # 42

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Full Access
Question # 43

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Full Access
Question # 44

Which of the following does a full-tunnel VPN provide?

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Full Access
Question # 45

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Full Access