Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Full Access
Question # 5

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Full Access
Question # 6

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Full Access
Question # 7

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Full Access
Question # 8

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Full Access
Question # 9

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Full Access
Question # 10

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Full Access
Question # 11

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 12

Which of the following allows a standard user to log in to multiple resources with one account?

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Full Access
Question # 13

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 14

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

A.

22

B.

80

C.

443

D.

587

Full Access
Question # 15

A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?

A.

One

B.

Two

C.

Three

D.

Four

Full Access
Question # 16

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Full Access
Question # 17

A technician is designing a cloud service solution that will accommodate the company's current size, compute capacity, and storage capacity. Which of the following cloud deployment models will fulfill these requirements?

A.

SaaS

B.

PaaS

C.

IaaS

D.

IaC

Full Access
Question # 18

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Full Access
Question # 19

Which of the following routing technologies uses an attribute list for path selection?

A.

BGP

B.

RIP

C.

EIGRP

D.

OSPF

Full Access
Question # 20

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Full Access
Question # 21

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Full Access
Question # 22

A data center administrator is evaluating the use of jumbo frames within a storage environment. Which of the following describes the best reason to use jumbo frames in the storage environment?

A.

To reduce device overhead

B.

To report on the current root switch in the STP

C.

To improve routing convergence

D.

To increase drive throughput

Full Access
Question # 23

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Full Access
Question # 24

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Full Access
Question # 25

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Full Access
Question # 26

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Full Access
Question # 27

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Full Access
Question # 28

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Full Access
Question # 29

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Full Access
Question # 30

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Full Access
Question # 31

Which of the following protocols has a default administrative distance value of 90?

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 32

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Full Access
Question # 33

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Full Access
Question # 34

Which of the following connectors provides console access to a switch?

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Full Access
Question # 35

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Full Access
Question # 36

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Full Access
Question # 37

Which of the following is the most likely benefit of installing server equipment in a rack?

A.

Simplified troubleshooting process

B.

Decreased power consumption

C.

Improved network performance

D.

Increased compute density

Full Access
Question # 38

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Full Access
Question # 39

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Full Access
Question # 40

Which of the following protocol ports should be used to securely transfer a file?

A.

22

B.

69

C.

80

D.

3389

Full Access
Question # 41

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Full Access
Question # 42

Which of the following requires network devices to be managed using a different set of IP addresses?

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Full Access
Question # 43

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 44

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Full Access
Question # 45

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Full Access
Question # 46

Which of the following is used to estimate the average life span of a device?

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Full Access
Question # 47

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization's website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Full Access
Question # 48

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management

Full Access
Question # 49

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 50

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Full Access
Question # 51

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Full Access
Question # 52

Which of the following ports is a secure protocol?

A.

20

B.

23

C.

443

D.

445

Full Access
Question # 53

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Full Access
Question # 54

Which of the following protocols is used to route traffic on the public internet?

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Full Access
Question # 55

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Full Access
Question # 56

Which of the following is the best way to keep devices on during a loss of power?

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Full Access
Question # 57

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Full Access
Question # 58

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Full Access
Question # 59

Which of the following is the greatest advantage of maintaining a cold DR site compared to other DR sites?

A.

Redundancy

B.

Availability

C.

Security

D.

Cost

Full Access
Question # 60

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Full Access
Question # 61

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Full Access
Question # 62

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 63

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Full Access
Question # 64

A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the following should a network technician implement to reduce the network congestion and improve performance?

A.

Load balancing

B.

Port mirroring

C.

Quality of Service

D.

Spanning Tree Protocol

Full Access
Question # 65

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator's needs?

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Full Access
Question # 66

Which of the following ports creates a secure connection to a directory service?

A.

22

B.

389

C.

445

D.

636

Full Access
Question # 67

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Full Access
Question # 68

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Full Access
Question # 69

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Full Access
Question # 70

In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?

A.

Subinterfaces

B.

VXLAN

C.

Layer 3 switch

D.

VIR

Full Access
Question # 71

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Full Access
Question # 72

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Full Access
Question # 73

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

A.

Neighbor adjacency

B.

Link state flooding

C.

Administrative distance

D.

Hop count

Full Access
Question # 74

An organization wants better network visibility. The organization's requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Full Access
Question # 75

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Full Access
Question # 76

Which of the following network devices converts wireless signals to electronic signals?

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Full Access
Question # 77

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Full Access
Question # 78

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 79

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 80

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Full Access
Question # 81

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 82

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Full Access
Question # 83

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Full Access
Question # 84

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Full Access
Question # 85

Which of the following is used to stage copies of a website closer to geographically dispersed users?

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Full Access
Question # 86

Which of the following technologies are X.509 certificates most commonly associated with?

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Full Access
Question # 87

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Full Access
Question # 88

Which of the following devices can operate in multiple layers of the OSI model?

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Full Access
Question # 89

A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Full Access
Question # 90

Which of the following network topologies contains a direct connection between every node in the network?

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Full Access
Question # 91

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Full Access
Question # 92

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Full Access