Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following protocols provides remote access utilizing port 22?

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Full Access
Question # 5

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

A.

22

B.

80

C.

443

D.

587

Full Access
Question # 6

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Full Access
Question # 7

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

A.

Theweb server Is In adifferent subnet.

B.

Therouter interface isa broadcast address.

C.

TheIP address spaceis a class A network.

D.

Thesubnet is in a private address space.

Full Access
Question # 8

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 9

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 10

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Full Access
Question # 11

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Full Access
Question # 12

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Full Access
Question # 13

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Full Access
Question # 14

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Full Access
Question # 15

Which of the following IP transmission types encrypts all of the transmitted data?

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TC

P

Full Access
Question # 16

Which of the following technologies are X.509 certificates most commonly associated with?

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Full Access
Question # 17

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Full Access
Question # 18

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Full Access
Question # 19

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Full Access
Question # 20

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Full Access
Question # 21

Which of the following network traffic type is sent to all nodes on the network?

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Full Access
Question # 22

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

A.

4096

B.

8192

C.

32768

D.

36684

Full Access
Question # 23

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Full Access
Question # 24

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

A.

Sides

B.

Top

C.

Front

D.

Rear

Full Access
Question # 25

Which of the following is a characteristic of the application layer?

A.

It relies upon other layers for packet delivery.

OB. It checks independently for packet loss.

B.

It encrypts data in transit.

C.

It performs address translation.

Full Access
Question # 26

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Full Access
Question # 27

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Full Access
Question # 28

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Full Access
Question # 29

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Full Access
Question # 30

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 31

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Full Access
Question # 32

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Full Access
Question # 33

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Full Access
Question # 34

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Full Access
Question # 35

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Full Access
Question # 36

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Full Access
Question # 37

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Full Access
Question # 38

Which of the following connectors provides console access to a switch?

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Full Access
Question # 39

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 40

Which of the following protocols has a default administrative distance value of 90?

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Full Access
Question # 41

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements?

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Full Access
Question # 42

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Full Access
Question # 43

Which of the following network cables involves bounding light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 44

Which of the following can support a jumbo frame?

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Full Access
Question # 45

Which of the following is used to describe the average duration of an outage for a specific service?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Full Access
Question # 46

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 47

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Full Access