A disgruntled employee decides to leak critical information about a company’s new product. The employee places keyloggers on the department’s computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?
A technician is troubleshooting a workstation’s network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician?
A junior network technician receives a help desk ticket from an end user who is having trouble accessing a web application that was working the previous day. After talking with the end user and gathering information about the issue, which of the following would be the most likely course of action for the technician to perform NEXT?
A technician is observing brownout issues at a smaller office. At least once a week, the edge switch power cycles. Which of the following should the technician do to resolve the issue?
A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?
A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?
A technician has deployed an additional DHCP server for redundancy. Clients in certain subnets are not receiving DHCP leases from the new DHCP server. Which of the following is the MOST likely cause?
Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?
A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?
A network engineer at a multinational company is asked to purchase mobile phones for senior executives who often travel internationally. The executives want their phones to work with wireless carriers in multiple countries when they travel. Which of the following cellular standards should these new phones support?
A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?
Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST thing the network technician should do?
A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 220.127.116.11. Which of the following commands would allow the technician to make this determination?
A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?
Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?
A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?
Which of the following protocols is associated with a three-way handshake?
A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?
While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?
Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate. Which of the following wireless performance problem concepts defines this issue?
A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users’ devices to the company network. To complete this step, which of the following should be used to secure the remote network location?
A network technician has recently installed new VoIP phones at all employee’s desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)
Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?
Which of the following can be done to implement network device hardening? (Choose two.)
A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?
A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following recovery solutions is the appropriate choice?
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?
A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?
A network technician notices that most of the nodes in the 10.10.74.0/23 address space return either 1 or 2 node hop after running a tracert, however, some of the new servers are showing a hop count larger than 10. Which of the following is the MOST likely reason for this?
Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?
Which of the following provides two-factor authentication?
Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?
A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?
A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?
Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?
Which of the following protocols are classified as connectionless? (Choose two.)
A technician is setting up a wireless access point in a coffee shop. The shop is not concerned with security but only wants to allow customers to have access. Which of the following configurations should the technician deploy?
Your company recently purchased a new building down the street from the existing office. For each of the tasks below, select the appropriate antenna type and encryption object for all wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal propagation, while maximizing security.
2. Restrict the wireless signal generated by the access points (APs) inside Building 1, so that it minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1’s internal wireless network is for visitors only and must not require any special configuration on the visitor’s device to connect.
Instructions: When you have completed the simulation, select the Done button to submit.
See explanation below.
Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?
A network administrator frequently needs to assist users with troubleshooting network hardware remotely, but the users are non-technical and unfamiliar with network devices. Which of the following would BEST help the administrator and users during hands-on troubleshooting?
A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?
The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?
A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?
Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?
A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?
A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network.
Which of the following components should the technician check on the Windows workstations? (Choose two.)
A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?
Which of the following BEST describes the BGP routing protocol?
A technician is assigned to secure a basic wireless network. Which of the following authentication protocols should the technician use to perform this task? (Choose two.)
Which of the following would be the MOST efficient subnet mask for a point-to-point link?
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
A system administrator receives reports from users of odd behavior in regard to a recently installed server. While reviewing the server network configuration, the systems administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration.
Which of the following is the problem identified in the output above?
A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support office was able to connect to the previous router. Which of the following actions should the technician perform to enable HTTPS access for the support team?
A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure the Linux server can reach the backup location?
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
Which of the following are DNS record types? (Choose three.)
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will collect traffic. Which of the following should the technician install to BEST meet the goal?
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)
A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify in the proposal?
A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause this condition?
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?
A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections?
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
Which of the following is a vulnerable system designed to detect and log unauthorized access?
An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?
Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?
According to the OSI model, at which of the following layers is data encapsulated into a packet?
An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
Which of the following solution sets properly addresses all of the identified requirements?
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?
A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?
Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?
Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?
A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?
A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the following IP addressing scheme on each interface:
Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?
The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?
A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?
A network technician needs to visit a datacenter. To be admitted, the security officer requests to see a driver's license, and then directs the technician to a fingerprint scanner. Which of the following authentication factors is the facility requiring for admittance? (Select TWO).
A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?
A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?
A network administrator is installing the company first external-facing web server and examining where to place it on the network. In which of the following zones should the server be configured?
Which of the following allows for file-level network storage?
A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?
A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?
In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?
A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?
A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?
A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?
Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?
A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?
A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 18.104.22.168. Which of the following should the technician perform to troubleshoot the issue?
A technician receives a report that Joe. an existing user is unable to access the network. Joe confirms that he had full access the previous clay. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe Is able to access the network. Which of the following is the MOST likely cause of this issue?
Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)
A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.
Step 1: Select the tool that was used to create the cable test results.
Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.
A Cable Certifier provides “Pass” or “Fail” information in accordance with industry standards but can also show detailed information when a “Fail” occurs. This includes shorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.
A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away In the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?
Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)
First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?
Ann a customer was using a coffee shop's public WiFi and had her connection briefly interrupted, but It reconnected again Unbeknownst to Ann. the disconnection was intentional and was connected to a malicious user's device. Which of the following attacks did Ann experience? (Select TWO).
A technician needs to back up network devices to a central location to prepare for a natural disaster. Which of the following should the technician use?
Which of the following is used to purposely attack a system to exploit vulnerabilities?
According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).
A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?