أرشيف أسئلة الاختبار
اختبار شهادة الشبكات CompTIA Network+
هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.
تنبيه مهم
هذه الصفحة للأرشفة فقط. إذا كنت تريد التجربة الحقيقية للاختبار والدخول إلى واجهة الاختبار الأصلية فانتقل إلى صفحة الاختبار من الرابط التالي.
الانتقال إلى صفحة الاختبار الفعلية
الأسئلة
748 سؤال- Which of the following should be configured so users can authenticate to a wireless network using company credentials?
- A VoIP phone powers up, but it is unable to receive or place calls. After connecting to another switchport, the issue is resolved. Which of the following was mo ...
- Which of the following is the most likely benefit of installing server equipment in a rack?
- A help desk technician receives a report that users cannot access internet URLs. The technician does some ping tests and finds that sites fail when a URL is use ...
- A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following document ...
- A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines ...
- Which of the following routing protocols is most commonly used to interconnect WANs?
- A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after a ...
- A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the fo ...
- Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should th ...
- Which of the following should be included in an SLA?
- A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?
- Which of the following VPN types provides secure remote access to the network resources through a web portal?
- Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
- A network administrator needs to disable all inbound and outbound telnet traffic in the network. Which of the following ports should the administrator disable?
- An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization’s website. Which of the foll ...
- A company recently rearranged some users' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all ...
- Which of the following diagrams would most likely include specifications about fiber connector types?
- A user's desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following confi ...
- A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?
- A network engineer implements a 192.168.100.0/25 subnet for a building without obtaining sizing requirements. It is later determined that the building will hous ...
- A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the follo ...
- A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall de ...
- A company is installing network cables above the ceiling tiles. The cables must be fire rated. Which of the following cable types should the company use?
- A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of ...
- A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global ...
- A network engineer wants to implement a secure solution that provides authentication and encryption to gather and monitor logs within the company network. Which ...
- A network engineer is setting up a new VoIP network for a customer. The current network is segmented only for computers and servers. No additional switch ports ...
- A network architect is implementing an off-premises computing facility and needs to ensure that operation will not be impacted by major outages. Which of the fo ...
- A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for thi ...
- A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the d ...
- A network administrator is setting up a firewall to protect the organization's network from external threats. Which of the following should the administrator co ...
- Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos ...
- A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Whi ...
- A technician is designing a cloud service solution that will accommodate the company’s current size, compute capacity, and storage capacity. Which of the follow ...
- A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first ...
- Which of the following network ports is used when a client accesses an SFTP server?
- Which of the following could provide a lightweight and private connection to a remote box?
- A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the followin ...
- A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the followin ...
- A technician wants to experiment with NAC in a wireless environment. Which of the following NAC techniques should be implemented for wireless networking if ease ...
- Which of the following protocol ports should be used to securely transfer a file?
- Which of the following protocol ports should be used to securely transfer a file?
- A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees ...
- A company is building a new campus that will have wired and wireless devices. The network will be designed to support casual internet usage for guests and break ...
- A network engineer is implementing a solution by which on-premises servers are migrated to a cloud service provider. Which of the following service models will ...
- A technician is implementing a new SD-WAN device with a default configuration. The technician receives a URL via email and connects the new device to the intern ...
- While conducting a network audit, an administrator notices the spanning tree root in VLAN 300 does not match the configuration baseline, which could cause netwo ...
- A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?
- A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following a ...
- An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?
- Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?
- A VoIP phone powers up, but it is unable to receive or place calls. After connecting to another switchport, the issue is resolved. Which of the following was mo ...
- Which of the following is the most likely benefit of installing server equipment in a rack?
- A help desk technician receives a report that users cannot access internet URLs. The technician does some ping tests and finds that sites fail when a URL is use ...
- A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents s ...
- A network administrator changed an external DNS to point customers to a new server. Which of the following tools should the administrator use to test the new se ...
- A firewall administrator is mapping a server's internal IP address to an external IP address for public use. Which of the following is the name of this function ...
- A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two).
- Which of the following typically uses compromised systems that become part of a bot network?
- Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?
- A server administrator deploys a new web server with an IP address of 192.168.16.100. The security policy dictates that all non-secure connection methods should ...
- A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these por ...
- Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?
- Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these iss ...
- Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- Which of following must be implemented to securely connect a company's headquarters with a branch location?
- Which of the following does a full-tunnel VPN provide?
- In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?
- Which of the following actions happen during the first step of the troubleshooting methodology? (Select two)
- A major natural disaster strikes a company’s headquarters, causing significant destruction and data loss. The company needs to quickly recover and resume operat ...
- Which of the following explains what happens if a packet is lost in transit when using UDP?
- A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap ba ...
- Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- Which of the following is most likely the cause of the issue?
- Which of the following is the most likely reason for the errors?
- Which of the following is the most likely benefit of installing server equipment in a rack?
- A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the ...
- Which of the following is the greatest advantage of maintaining a cold DR site compared to other DR sites?
- Which of the following should an installer orient a port-side exhaust to when installing equipment?
- Which of the following does the engineer need to do to configure the network correctly? (Select two.)
- Which of the following options is the most efficient use of network addresses when assigning this network?
- A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the follo ...
- Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
- Which of the following network devices converts wireless signals to electronic signals?
- Which of the following connection methods will allow a network engineer to automate the configuration deployment for network devices across the environment?
- A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only plac ...
- Which of the following uses the longest prefix match to determine an exit interface?
- To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the imp ...
- Which of the following is best described as the capability of a cloud environment to make size adjustments in response to organizational requirements?
- Which of the following is the step that a troubleshooter should take immediately after implementing a solution?
- Which of the following typically uses compromised systems that become part of a bot network?
- Which of the following ports should a network administrator enable for encrypted login to a network switch?
- Which of the following should the engineer do to troubleshoot the issue? (Select two.)
- Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- Which of the following offers the ability to manage access at the cloud VM instance?
- A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following document ...
- Which of the following is the most likely cause of the connectivity issue?
- A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controlle. Which of the follow ...
- Which of the following services runs on port 636?
- Which of the following would be best to implement? (Select two.)
- Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has bee ...
- Which of the following configurations will prevent Layer 2 loops?
- Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?
- Which of the following describes the best reason to use jumbo frames in the storage environment?
- Which of the following should a company implement in order to share a single IP address among all the employees in the office?
- Which of the following connectors allows a singular QSFP transceiver to have several physical connections?
- Which of the following is associated with avoidance, acceptance, mitigation, and transfer?
- Which of the following allows a standard user to log in to multiple resources with one account?
- Which of the following records should the administrator use?
- A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the admi ...
- Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?
- Which of the following could provide a lightweight and private connection to a remote box?
- A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Whi ...
- A network engineer is now in charge of all SNMP management in the organization. The engineer must use an SNMP version that does not utilize plaintext data. Whic ...
- A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solutio ...
- A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?
- Which of the following routing technologies uses an attribute list for path selection?
- A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?
- Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?
- Which of the following protocols has a default administrative distance value of 90?
- An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will be ...
- Which of the following ports creates a secure connection to a directory service?
- Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?
- Which of the following network traffic types is sent to all nodes on the network?
- A systems administrator installs multiple web servers and intends to use the First Hop Redundancy Protocol to control routing to the servers. Which of the follo ...
- Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos ...
- Which of the following can protect network equipment from voltage variations?
- Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
- A tourist attempts to access an online banking site on a mobile device while in a public place. Which of the following is the tourist most likely to experience?
- After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should ...
- A network administrator is hosting a local application on a Type 2 hypervisor, but the application only has accessibility to the host machine. Which of the foll ...
- A network technician is troubleshooting an issue between a web server and computers within a LAN. The technician needs to gather information about the IP addres ...
- A network technician notices a device is at EOL. For which of the following should the technician plan?
- A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the followin ...
- Which of the following connection methods will allow a network engineer to automate the configuration deployment for network devices across the environment?
- A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access th ...
- Which of the following connector types is most commonly associated with Wi-Fi antennas?
- Which of the following does a hash provide?
- Which of the following should be configured so users can authenticate to a wireless network using company credentials?
- A network administrator is migrating the existing phone system to VoIP. The vendor requires a separate voice network for the phones to function. Which of the fo ...
- A network manager wants to view network traffic for devices connected to a switch. A network engineer connects an appliance to a free port on the switch and nee ...
- A security analyst wants to control internet access based on site reputation and categorization. The analyst needs a solution that does not require traffic flow ...
- A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best de ...
- A VoIP phone turns on, but it is unable to receive or place calls. After connecting to another switchport, the issue is resolved. Which of the following was mos ...
- Which of the following will most likely allow a network administrator to work with current data after a disaster?
- Which of the following actions should be taken as part of the first step of the troubleshooting methodology?
- Which of the following steps of the troubleshooting methodology is most likely to involve talking to a user who opens a ticket?
- A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decr ...
- Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?
- A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?
- Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth ...
- Users can usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect ...
- A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has ...
- A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the bes ...
- After a recent corporate merger, a network administrator needs to build reference documentation on multivendor infrastructure. Which of the following protocols ...
- A company uses a solution to rotate the password that engineers use to connect to critical systems. Which of the following best describes this solution?
- An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continuou ...
- A technician wants to experiment with NAC in a wireless environment. Which of the following NAC techniques should be implemented for wireless networking if ease ...
- A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or ...
- A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the follow ...
- A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the follow ...
- Which of the following protocols allows automatic routing failover for an active-passive firewall pair?
- A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following ...
- A network engineer is troubleshooting a network issue where a user is unable to communicate with a web server on port 443. Which of the following tools will the ...
- Which of the following does a full-tunnel VPN provide?
- Which of the following remote connectivity methods is used when data and management traffic use the same network infrastructure?
- Which of the following is the best way to reduce the likelihood of electrostatic discharge?
- A network administrator sets up a temporary SSID for an event without knowing the number of attendees. During the event, some attendees report that they cannot ...
- An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrat ...
- A network administrator is troubleshooting an issue with a user’s IP address. Which of the following layers of the OSI model should be considered?
- Which of the following technologies uses a VIP to provide gateway redundancy between two routers?
- A network administrator needs to securely connect to an Ubuntu server for management purposes. Which of the following protocols will most likely address this re ...
- A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which ...
- A network administrator needs to implement routing capabilities in a hypervisor. Which of the following should the administrator most likely implement?
- A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configuration ...
- During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization’s help desk. Which of the followi ...
- Which of the following is the part of a DR (Disaster Recovery) plan that identifies the critical systems that should be recovered first after an incident?
- Which of the following describes the capability of a cloud service to adjust resources on demand?
- Which of the following describes a malicious application that takes advantage of a software flaw?
- Which of the following allows a user to connect to an isolated device on a stand-alone network?
- Users in a company report that after walking from one room to another, wireless connectivity is lost. The SSID is available, but the users have to manually reco ...
- A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following ...
- A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of t ...
- A network technician is requesting a fiber patch cord with a connector that is round and twists to install. Which of the following is the proper name of this co ...
- A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of ...
- After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform ne ...
- During a VoIP call, a user notices inconsistent audio and logs an incident ticket. A network administrator notices inconsistent delays in arrival of the RTP pac ...
- An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet ...
- Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?
- A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the d ...
- A network administrator is reviewing a production web server and observes the following output from the netstat command: Which of the following actions should ...
- Which of the following is an example of a split-tunnel VPN?
- A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. W ...
- Which of the following protocols is commonly associated with TCP port 443?
- Which of the following cable types allows the use of QSFP ports without requiring transceivers?
- Which of the following best represents north-south traffic?
- Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?
- Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?
- After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery li ...
- A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web ...
- A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?
- A company’s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts c ...
- A server administrator needs to add a record to the company’s DNS server to verify ownership of a web domain. The administrator has the record’s name and value. ...
- A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator ...
- Which of the following devices can operate in multiple layers of the OSI model?
- Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?
- A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail ...
- Which of the following is enforced through legislation?
- Which of the following is the next step in the troubleshooting methodology after verifying full system functionality?
- Which of the following dynamic routing protocols is used on the internet?
- A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?
- A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this ...
- A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new applicat ...
- Which of the following attacks utilizes a network packet that contains multiple network tags?
- A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the mo ...
- Which of the following most directly secures sensitive information on a network?
- Which of the following technologies are X.509 certificates most commonly associated with?
- Which of the following layers of the OSI model is responsible for end-to-end encryption?
- A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of t ...
- Which of the following tools uses ICMP to help determine whether a network host is reachable?
- A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the n ...
- A network consultant needs to decide between running an Ethernet uplink or using the built-in 5GHz point-to-point functionality on a WAP. Which of the following ...
- Which of the following is the first step a network administrator should take in the troubleshooting methodology?
- Which of the following refers to a weakness in a mechanism or technical process?
- A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the fol ...
- A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the ...
- A network administrator recently configured an autonomous wireless AP and performed a throughput test via comptiaspeedtester.com. The result was 75Mbps. When co ...
- Which of the following does a router prioritize first in the route selection process?
- Users can usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to ...
- A company’s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts c ...
- A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of ...
- After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds. Which of ...
- Which of the following is the most secure way to provide site-to-site connectivity?
- A company’s office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate ne ...
- Clients report that phones are down. The network technicians determine that PCs and printers are online. However, the phones display the message Searching for s ...
- A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- An office network is experiencing significant lag when accessing the company’s shared drive. A systems administrator wants to investigate the cause of the probl ...
- A technician is troubleshooting a user’s connectivity issues and finds that the computer’s IP address was changed to 169.254.0.1. Which of the following is the ...
- A network engineer is installing an office intercom system, but a few of the speakers are not producing any sound. Each speaker requires 15W. The switch shows t ...
- A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitor ...
- Which of the following would an adversary do while conducting an evil twin attack?
- A network architect is implementing a smart office solution with IoT devices. Which of the following topologies offers the best coverage?
- Which of the following is a difference between EOL and EOS?
- Which of the following can also provide a security feature when implemented?
- A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following wo ...
- A user calls the help desk stating that an application successfully connects to a server, but the sync process fails when trying to sync data. Which of the foll ...
- A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the ne ...
- Which of the following does a hash provide?
- A network architect is implementing a VPN solution for remote workers. The architect wants to ensure that data transmitted through the VPN is protected from eav ...
- Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the follo ...
- A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configuration ...
- An employee connects to the company network from home using a VPN. Company data uses the VPN, while internet traffic uses the home ISP connection. Which of the ...
- A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended ...
- A network administrator needs to implement routing capabilities in a hypervisor. Which of the following would the administrator most likely implement?
- A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following: IP address: 192.16 ...
- Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?
- A company’s VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN. Which of the following sh ...
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- Which of the following Layer 1 devices is responsible for the termination of fiber-optic connections on an SFP-capable switch?
- A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user’s laptop is lost. Whic ...
- A customer calls the help desk to report that resources are no longer reachable. The resources were available before network changes were made. The technician v ...
- A company’s network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the fo ...
- A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the worksta ...
- Which of the following should a company implement in order to share a single IP address among all the employees in the office?
- Which of the following layers of the OSI model is responsible for end-to-end encryption?
- A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
- A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a recent high-traffic malware attack, narrowing th ...
- A small restaurant wants to provide free internet access to its customers. When users connect to the network, they should be asked to follow the restaurant on s ...
- Which of the following is used to estimate the average life span of a device?
- Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?
- Which of the following cables is the most appropriate to use when running bulk cables in ceilings?
- An organization has a guest network with a network IP range of 192.168.1.0/28 using a DHCP pool. One visitor reported difficulties connecting and configured a s ...
- Which of the following offers the ability to manage access at the cloud VM instance?
- A user attempts to log in to a corporate website by utilizing a shortcut. The shortcut has been used many times before. The user then notices some discrepancies ...
- Users at an organization report that the wireless network is not working in some areas of the building. Users report that other wireless network SSIDs are visib ...
- A company is migrating a data center from on premises to the cloud. Which of the following tools will help maintain consistency, reliability, and efficiency of ...
- A network administrator is redesigning a wireless network in which corporate and guest users share a single SSID that is configured with WPA2 PSK. Which of the ...
- Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help ident ...
- A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about d ...
- Which of the following should be implemented to add an additional layer of security between a corporate network and network management interfaces?
- A storage network requires reduced overhead and increased efficiency for the amount of data being sent. Which of the following would an engineer most likely con ...
- Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?
- A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the rea ...
- A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thi ...
- A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following val ...
- A server administrator needs to add a record to the company’s DNS server to verify ownership of a web domain. The administrator has the record’s name and value. ...
- A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the followin ...
- A network administrator is reviewing a production web server and observes the following output from the netstat command: Which of the following actions should ...
- Which of the following allows for interactive, secure remote management of a network infrastructure device?
- Which of the following attacks utilizes a network packet that contains multiple network tags?
- Which of the following is the next step to take after successfully testing a root cause theory?
- Which of the following ports is associated with securely managing identity across a Windows domain?
- Which of the following ports is used for secure email?
- Which of the following should an installer orient a port-side exhaust to when installing equipment?
- Which of the following functions is used to prioritize network traffic based on the type of traffic?
- A network consultant needs to decide between running an Ethernet uplink or using the built-in 5GHz point-to-point functionality on a WAP. Which of the following ...
- A network administrator needs to improve network monitoring. Which of the following should the administrator do first?
- Which of the following types of routes takes precedence when building a routing table for a given subnet?
- A network technician needs to use a private Class A RFC1918 addressing scheme for user laptops on the company’s network. Which of the following subnets should t ...
- Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has bee ...
- Which of the following record types does an IP-to-name lookup use in DNS?
- Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to pr ...
- A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations to the switches. Which of the foll ...
- A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the worksta ...
- An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes th ...
- Which of the following best explains the role of confidentiality with regard to data at rest?
- A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail ...
- Which of the following IP transmission types encrypts all of the transmitted data?
- A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this ...
- Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?
- Which of the following can support a jumbo frame?
- Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?
- A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended ...
- An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will be ...
- After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should ...
- Which of the following most likely determines the size of a rack for installation? (Select two).
- A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?
- As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is t ...
- A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?
- A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will ...
- Which of the following routing protocols uses an autonomous system number?
- Which of the following is the most secure way to provide site-to-site connectivity?
- A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled. Which of the following tools would b ...
- To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the imp ...
- A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of t ...
- Which of the following fiber connector types is the most likely to be used on a network interface card?
- A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
- A virtual machine has the following configuration: IPv4 address: 169.254.10.10 Subnet mask: 255.255.0.0 The virtual machine can reach collocated systems but can ...
- A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the follow ...
- A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web ...
- Which of the following does a full-tunnel VPN provide?
- A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician c ...
- Which of the following protocols has a default administrative distance value of 90?
- Which of the following is a cost-effective advantage of a split-tunnel VPN?
- Which of the following should be configured so users can authenticate to a wireless network using company credentials?
- Which of the following is most likely responsible for the security and handling of personal data in Europe?
- Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output: 1 3ms 2ms ...
- Which of the following attacks would most likely cause duplicate IP addresses in a network?
- A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following val ...
- Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
- Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the follo ...
- Which of the following network topologies contains a direct connection between every node in the network?
- A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fu ...
- A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web serv ...
- Which of the following devices can operate in multiple layers of the OSI model?
- A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?
- Which of the following is the next step to take after successfully testing a root cause theory?
- Which of the following network devices converts wireless signals to electronic signals?
- Which of the following connectors provides console access to a switch?
- A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired an ...
- Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
- Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?
- Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).
- A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?
- A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for ...
- A research facility is expecting to see an exponential increase in global network traffic. The offices have 2.5Gbps ISP links, but only 1Gbps connections intern ...
- Which of the following is used to estimate the average life span of a device?
- A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
- A network engineer is now in charge of all SNMP management. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is ...
- After running a Cat 8 cable using passthrough plugs, an electrician notices a lot of cross talk. Which of the following troubleshooting steps should the electri ...
- A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is ...
- A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following s ...
- Which of the following requires network devices to be managed using a different set of IP addresses?
- Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?
- Which of the following protocols provides remote access utilizing port 22?
- Which of the following attacks utilizes a network packet that contains multiple network tags?
- Which of the following describes the best reason for using BGP?
- A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same addre ...
- An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to im ...
- A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of t ...
- Which of the following is a characteristic of the application layer?
- Which of the following most likely requires the use of sub interfaces?
- Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has bee ...
- A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the ...
- Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?
- A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel ...
- Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?
- Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?
- Which of the following is the most closely associated with segmenting compute resources within a single cloud account?
- A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following ...
- A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by pla ...
- Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?
- A customer needs six usable IP addresses. Which of the following best meets this requirement?
- A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the ...
- A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the ...
- A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the netwo ...
- While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician ...
- Before using a guest network, an administrator requires users to accept the terms of use. Which of the following is the best way to accomplish this goal?
- Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?
- Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?
- Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?
- A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which o ...
- Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?
- A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is n ...
- Which of the following are the best device-hardening techniques for network security? (Select two).
- Which of the following network cables involves bounding light off of protective cladding?
- A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, users are unable to reach the ser ...
- Which of the following is a cost-effective advantage of a split-tunnel VPN?
- A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labe ...
- A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator ...
- Which of the following network traffic types is sent to all nodes on the network?
- A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two).
- A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees ...
- A company wants to implement a disaster recovery site for a non-critical appliance, which can tolerate a short period of downtime. Which of the following types ...
- A user notifies a network administrator about losing access to a remote file server. The administrator can ping the server and verifies firewall rules do not bl ...
- A technician is planning equipment installation into a rack in a data center that uses hot aisle/cold aisle ventilation. Which direction should the equipment ex ...
- Which of the following technologies are X.509 certificates most commonly associated with?
- A network administrator is planning to implement device monitoring to enhance network visibility. The solution must provide authentication and encryption. Which ...
- A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change at the registra ...
- Which of the following ports is used for secure email?
- A company is implementing a wireless solution in a high-density environment. Which 802.11 standard should be used when concerned about device saturation and cov ...
- Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?
- Which of the following is an XML-based security concept that works by passing sensitive information about users, such as log-in information and attributes, to p ...
- A network administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use cas ...
- A storage network requires reduced overhead and increased efficiency for the amount of data being sent. Which of the following should an engineer likely configu ...
- An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way fo ...
- Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?
- A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the networ ...
- Which of the following facilities is the best example of a warm site in the event of information system disruption?
- Which of the following would be violated if an employee accidentally deleted a customer's data?
- Which of the following is used to describe the average duration of an outage for a specific service?
- Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help ident ...
- Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely cau ...
- Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?
- An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?
- A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the ...
- Which of the following can also provide a security feature when implemented?
- A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting th ...
- A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the ...
- While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the fol ...
- A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directio ...
- Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?
- Which of the following allows a remote user to connect to the network?
- A network administrator needs to add 255 usable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?
- A network administrator suspects users are being sent to malware sites posing as legitimate sites. The administrator discovers user workstations have incorrect ...
- A Chief Executive Officer (CEO) purchases a new phone to use while traveling to different countries. The CEO needs to place outgoing and receive incoming calls ...
- Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that r ...
- A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?
- Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the curren ...
- An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to ...
- A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent c ...
- After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web ...
- Which of the following steps in the troubleshooting methodology comes after using a top-to-top bottom examination of the OSI model to determine cause?
- A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following docum ...
- An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continuou ...
- A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the fo ...
- Which of the following is the most likely benefit of installing server equipment in a rack?
- A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of ...
- Which of the following routing protocols is most commonly used to interconnect WANs?
- A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements ...
- A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?
- Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should th ...
- A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speed ...
- Which of the following must be implemented to securely connect a company's headquarters with a branch location?
- A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three ...
- A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following ...
- A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the d ...
- A user's home mesh wireless network is experiencing latency issues. A technician performs a speed test, reboots the devices, runs a site survey, and performs a ...
- A network administrator determines that some switch ports have more errors than expected. The administrator traces the cabling associated with these ports. Whic ...
- A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the foll ...
- In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?
- A company implements a video streaming solution that will play on all computers in a specific group, but router ACLs are blocking the traffic. Which of the foll ...
- After a company installed a new IPS, the network is experiencing speed degradation. A network administrator runs a speed test and finds lower-than-expected resu ...
- Which of the following protocol ports should be used to securely transfer a file?
- A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Whi ...
- A network administrator is configuring a network for a new site that will have 150 users, each with two IP addresses. The site will expand by 10 more users next ...
- A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command ...
- A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. W ...
- Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased ...
- While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the fol ...
- An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is res ...
- Which of the following will allow secure, remote access to internal applications?
- A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the followin ...
- Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these iss ...
- A firewall administrator is mapping a server's internal IP address to an external IP address for public use. Which of the following is the name of this function ...
- A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first ...
- A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each ...
- A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest su ...
- A technician is designing a cloud service solution that will accommodate the company's current size, compute capacity, and storage capacity. Which of the follow ...
- A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine ...
- A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenti ...
- An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization's website. Which of the foll ...
- A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to ...
- A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for thi ...
- A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on ...
- A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or ...
- An organization wants better network visibility. The organization's requirements include: Multivendor/OS-monitoring capabilities, Real-time collection, Data cor ...
- A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic movi ...
- A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take adv ...
- A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of ...
- Which of the following network ports is used when a client accesses an SFTP server?
- A network administrator is reviewing a production web server and observes the following output from the netstat command: Which of the following actions should t ...
- Which of the following allows for the interception of traffic between the source and destination?
- A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The CIO is concerned that the network might not handle ...
- Which of the following ports creates a secure connection to a directory service?
- A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best de ...
- Which of the following connector types would most likely be used to connect to an external antenna?
- An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in o ...
- Which of the following protocols is used to route traffic on the public internet?
- A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?
- Which of the following is a major difference between an IPS and IDS?
- A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company ...
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the follow ...
- Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?
- A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?
- Users can usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect ...
- Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?
- Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?
- A customer calls the help desk to report issues connecting to the internet. The customer can reach a local database server. A technician goes to the site and ex ...
- Which of the following provides an opportunity for an on-path attack?
- Which of the following allows a user to connect to an isolated device on a stand-alone network?
- After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in th ...
- A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host ...
- Users at an organization report that the wireless network is not working in some areas of the building. Users report that other wireless network SSIDs are visib ...
- Which of the following services runs on port 636?
- Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?
- An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to t ...
- A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnect ...
- A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high ...
- A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a high-traffic malware attack, narrowing the event ...
- A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high ...
- A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can s ...
- Which of the following connectors allows a singular QSFP transceiver to have several physical connections?
- A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?
- A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall de ...
- A network engineer configures the network settings in a new server as follows: IP address = 192.163.1.15, Subnet mask = 255.255.255.0, Gateway = 192.163.1.255. ...
- Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?
- Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
- A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the followin ...
- Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?
- An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company's firewall require to access ...
- A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used ...
- A company recently rearranged some users' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all ...
- During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization's help desk. Which of the followi ...
- Which of the following dynamic routing protocols is used on the internet?
- A user's desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following confi ...
- A network engineer is troubleshooting connectivity for a newly installed server on an existing VLAN. The engineer reviews the following output: C:\> ipconfig IP ...
- Which of the following could provide a lightweight and private connection to a remote box?
- A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following a ...
- A network engineer is setting up a new VoIP network for a customer. The current network is segmented only for computers and servers. No additional switch ports ...
- A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents s ...
- A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the n ...
- A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the d ...
- Which of the following VPN types provides secure remote access to the network resources through a web portal?
- A technician is implementing a new SD-WAN device with a default configuration. The technician receives a URL via email and connects the new device to the intern ...
- Which of the following typically uses compromised systems that become part of a bot network?
- Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?
- A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the ...
- A network architect is implementing an off-premises computing facility and needs to ensure that operations will not be impacted by major outages. Which of the f ...
- A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of ...
- Which of the following is the MOST appropriate solution to extend the network to a building located across the street from the main facility?
- Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has bee ...
- While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician ...
- A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the bes ...
- Which of the following technologies are X.509 certificates most commonly associated with?
- A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies woul ...
- A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended ...
- A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which o ...
- Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?
- Which of the following attacks utilizes a network packet that contains multiple network tags?
- Which of the following attacks utilizes a network packet that contains multiple network tags?
- A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configuration ...
- Which of the following ports is used for secure email?
- A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
- Which of the following is a cost-effective advantage of a split-tunnel VPN?
- A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the follow ...
- Which of the following protocols is commonly used to assign IP addresses dynamically to devices on a network?
- Which of the following wireless security protocols offers the strongest encryption for Wi-Fi networks?
- A guest must accept the terms of service when logging into a hotel's public wireless network for the first time. Which of the following features should a networ ...
- Which of the following concepts describes the maximum duration an organization's technology can be offline during a single incident?
- A network engineer is implementing an interface that will act as the default gateway for a new VLAN. Which of the following technologies should the engineer con ...
- A network administrator needs to improve network monitoring. Which of the following should the administrator do first?
- A company's servers experience a malware attack, which causes a network outage. The source of the attack is traced back to an employee's infected laptop. Which ...
- Which of the following routing protocols uses an autonomous system number?
- Which of the following ports is commonly used for DHCPDISCOVER call requests for a new machine on a network?
- A network administrator needs to verify whether a device-hardening policy was implemented properly and produce a report on the recommended remediation. Which of ...
- A network administrator is implementing dynamic routing protocols for a large enterprise network that has several vendor devices. Which of the following is the ...
- Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a ...
- A wireless administrator is setting up a small mesh network in an open-concept office space. The administrator must select a supported frequency that offers the ...
- Which of the following describes limiting access to tools or facilities based on job role?
- A network administrator is able to make changes to a network device using a specific, isolated port. Which of the following most closely describes this manageme ...
- Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for s ...
- Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?
- After a company installs a new IPS, the network experiences speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The r ...
- Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?
- Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?
- Which of the following can manage, control, and assist with conditioning power within a data center?
- A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended ...
- Which of the following ports is associated with securely managing identity across a Windows domain?
- An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from a company’s home page to a fraudulent website. Which ...
- Which of the following OSI model layers is responsible for determining the most efficient path for frame transfer?
- Which of the following is a framework that provides for remote access, site-to-site and cloud connectivity, and security?
- A company is implementing a solution for users to gain access to a critical application. The solution will verify that the machine meets requirements and that t ...
- A customer wants to cache commonly used content to reduce the number of pages fully downloaded from the internet. Which of the following should the network admi ...
- Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased ...
- Which of the following is used to estimate the average life span of a device?
- A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine ...
- A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall de ...
- A customer wants to segment the local network into eight sections with 30 devices each. A junior network technician needs to select the appropriate subnet mask ...
- Which of the following ports is used for secure email?
- An administrator is using an SFP multimode transceiver with a single-mode fiber-optic cable. Which of the following describes the expected result?
- A new wireless controller has been implemented with new security features. Clients report that some legacy devices cannot authenticate to the network. Which of ...
- Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
- Employees report that website requests are being redirected to other websites that display different content than expected. Which of the following attacks is mo ...
- Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing b ...
- Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?
- Which of the following would allow an organization to place digital services closer to the point of consumer usage in order to reduce latency and network overhe ...
- Which of the following would a network administrator most likely use to securely manage a network device on a closed network?
- Which of the following is the best reason to create a golden configuration?
- Which of the following cables is the most appropriate to use when running bulk cables in ceilings?
- A network administrator is establishing Layer 3 connectivity between Layer 2 segments. Which of the following does the administrator need to complete this task?
- A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following s ...
- A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that allows for continuous co ...
- An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes th ...
- A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following ...
- Which of the following network cables involves bouncing light off of protective cladding?
- A company lost the ability to connect to the internet at a satellite office. Logging tools capture the last recorded event as a login from the router's default ...
- A network technician needs to use a private Class A RFC1918 addressing scheme for user laptops on the company's network. Which of the following subnets should t ...
- A company has multiple branch offices that need to be connected. The network administrator needs to implement a routing protocol that provides automatic load ba ...
- Which of the following methods is used to authenticate users and devices connecting to a network?
- An employee connects to the company network from home using a VPN. Company data uses the VPN, while internet traffic uses the home ISP connection. Which of the ...
- A network engineer wants to implement a routing protocol that supports multiple vendors' routers and can be easily configured and scaled. Which of the following ...
- Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- An employee plugs a personal laptop into a network jack in a secured IDF but cannot obtain a network address. A network administrator then plugs a company-issue ...
- A company is implementing new policies for network access and management. They are considering the use of MAC filtering and ACLs for additional security measure ...
- Which of the following is the best outcome of documenting lessons learned after a complicated network issue is resolved?
- Which of the following should a company implement in order to share a single IP address among all the employees in the office?
- Which of the following is the most likely cause of the user's connection issues?
- A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following: IP address: 192. ...
- A network technician is setting up a server in an internet-accessible, screened subnet that is mimicking a production server. Which of the following has the tec ...
- Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?
- A guest must accept the terms of service when logging into a hotel's public wireless network for the first time. Which of the following features should a networ ...
- Which of the following concepts describes the maximum duration an organization's technology can be offline during a single incident?
- A network engineer is implementing an interface that will act as the default gateway for a new VLAN. Which of the following technologies should the engineer con ...
- A network administrator needs to improve network monitoring. Which of the following should the administrator do first?
- A company's servers experience a malware attack, which causes a network outage. The source of the attack is traced back to an employee's infected laptop. Which ...
- Which of the following routing protocols uses an autonomous system number?
- Which of the following ports is commonly used for DHCPDISCOVER call requests for a new machine on a network?
- A network administrator needs to verify whether a device-hardening policy was implemented properly and produce a report on the recommended remediation. Which of ...
- A network administrator is implementing dynamic routing protocols for a large enterprise network that has several vendor devices. Which of the following is the ...
- A network administrator is implementing dynamic routing protocols for a large enterprise network that has several vendor devices. Which of the following is the ...
- A wireless administrator is setting up a small mesh network in an open-concept office space. The administrator must select a supported frequency that offers the ...
- Which of the following describes limiting access to tools or facilities based on job role?
- A network administrator is able to make changes to a network device using a specific, isolated port. Which of the following most closely describes this manageme ...
- A network administrator is able to make changes to a network device using a specific, isolated port. Which of the following most closely describes this manageme ...
- Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?
- After a company installs a new IPS, the network experiences speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The r ...
- After a company installs a new IPS, the network experiences speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The r ...
- Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?
- Which of the following can manage, control, and assist with conditioning power within a data center?
- A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended ...
- Which of the following ports is associated with securely managing identity across a Windows domain?
- Which of the following ports is associated with securely managing identity across a Windows domain?
- Which of the following OSI model layers is responsible for determining the most efficient path for frame transfer?
- Which of the following is a framework that provides for remote access, site-to-site and cloud connectivity, and security?
- A company is implementing a solution for users to gain access to a critical application. The solution will verify that the machine meets requirements and that t ...
- A customer wants to cache commonly used content to reduce the number of pages fully downloaded from the internet. Which of the following should the network admi ...
- Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased ...
- Which of the following is used to estimate the average life span of a device?
- A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine ...
- A customer wants to segment the local network into eight sections with 30 devices each. A junior network technician needs to select the appropriate subnet mask ...
- A customer wants to segment the local network into eight sections with 30 devices each. A junior network technician needs to select the appropriate subnet mask ...
- Which of the following ports is used for secure email?
- An administrator is using an SFP multimode transceiver with a single-mode fiber-optic cable. Which of the following describes the expected result?
- A new wireless controller has been implemented with new security features. Clients report that some legacy devices cannot authenticate to the network. Which of ...
- Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
- Employees report that website requests are being redirected to other websites that display different content than expected. Which of the following attacks is mo ...
- Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing b ...
- Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?
- Which of the following would allow an organization to place digital services closer to the point of consumer usage in order to reduce latency and network overhe ...
- Which of the following would a network administrator most likely use to securely manage a network device on a closed network?
- Which of the following would a network administrator most likely use to securely manage a network device on a closed network?
- Which of the following cables is the most appropriate to use when running bulk cables in ceilings?
- A network administrator is establishing Layer 3 connectivity between Layer 2 segments. Which of the following does the administrator need to complete this task?
- A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following s ...
- A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that allows for continuous co ...
- An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes th ...
- A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following ...
- Which of the following network cables involves bouncing light off of protective cladding?
- A company lost the ability to connect to the internet at a satellite office. Logging tools capture the last recorded event as a login from the router's default ...
- A network technician needs to use a private Class A RFC1918 addressing scheme for user laptops on the company's network. Which of the following subnets should t ...
- A company has multiple branch offices that need to be connected. The network administrator needs to implement a routing protocol that provides automatic load ba ...
- Which of the following methods is used to authenticate users and devices connecting to a network?
- An employee connects to the company network from home using a VPN. Company data uses the VPN, while internet traffic uses the home ISP connection. Which of the ...
- Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- An employee plugs a personal laptop into a network jack in a secured IDF but cannot obtain a network address. A network administrator then plugs a company-issue ...
- An employee plugs a personal laptop into a network jack in a secured IDF but cannot obtain a network address. A network administrator then plugs a company-issue ...
- Which of the following is the best outcome of documenting lessons learned after a complicated network issue is resolved?
- Which of the following should a company implement in order to share a single IP address among all the employees in the office?
- Which of the following is the most likely cause of the user's connection issues?
- Which of the following is the most likely cause of the user's connection issues?
- A network technician is setting up a server in an internet-accessible, screened subnet that is mimicking a production server. Which of the following has the tec ...
- Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?
- Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?
- Which of the following, in addition to a password, can be asked of a user for MFA?
- A network technician is setting up 15 local IP networks with 100 hosts each and needs to choose a private IP block for subnetting. Which of the following is a v ...
- A network administrator added many new users and wired devices on the network while keeping the original cables and connections. Users are now reporting connect ...
- A network administrator added many new users and wired devices on the network while keeping the original cables and connections. Users are now reporting connect ...
- An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes th ...
- Which of the following protocols should a technician use to encrypt a site-to-site VPN?
- Which of the following network protocols establishes a reliable connection between the client and the server?
- Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
- A network technician takes an incident ticket from the queue. Which of the following is the first step the technician should take?
- Which of the following ports is used for secure email?
- Which of the following ports is commonly used for DHCPDISCOVER call requests for a new machine on a network?
- Which of the following OSI model layers is responsible for determining the most efficient path for frame transfer?
- An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from a company's home page to a fraudulent website. Which ...
- A network technician is setting up a server in an internet-accessible, screened subnet that is mimicking a production server. Which of the following has the tec ...
- A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following s ...
- A company has multiple branch offices that need to be connected. The network administrator needs to implement a routing protocol that provides automatic load ba ...
- Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?
- A company is implementing a solution for users to gain access to a critical application. The solution will verify that the machine meets requirements and that t ...
- Which of the following would a network administrator most likely use to securely manage a network device on a closed network?
- A network administrator is able to make changes to a network device using a specific, isolated port. Which of the following most closely describes this manageme ...
- A network administrator is able to make changes to a network device using a specific, isolated port. Which of the following most closely describes this manageme ...
- A customer wants to cache commonly used content to reduce the number of pages fully downloaded from the internet. Which of the following should the network admi ...
- An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that allows for continuous co ...
- Which of the following documentation sources should be consulted to determine which subnets are available for a company’s new, multidepartment office building?
- A wireless administrator is setting up a small mesh network in an open-concept office space. The administrator must select a supported frequency that offers the ...
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- Which of the following is used to stage copies of a website closer to geographically dispersed users?
- Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?
- A network administrator is implementing dynamic routing protocols for a large enterprise network that has several vendor devices. Which of the following is the ...
- An employee connects to the company network from home using a VPN. Company data uses the VPN, while internet traffic uses the home ISP connection. Which of the ...
- Which of the following routing protocols uses an autonomous system number?
- Which of the following is a secure solution in which users from a main office can establish an encrypted tunnel communication to remote locations?
- Which of the following is a secure solution in which users from a main office can establish an encrypted tunnel communication to remote locations?
- Which of the following should a company implement in order to share a single IP address among all the employees in the office?
- An administrator is using an SFP multimode transceiver with a single-mode fiber-optic cable. Which of the following describes the expected result?
- Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?
- Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?
- Which of the following is an example of a recovery point objective?
- Which of the following concepts describes the maximum duration an organization's technology can be offline during a single incident?
- Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing b ...
- Which of the following is the best reason to create a golden configuration?
- A network administrator is establishing Layer 3 connectivity between Layer 2 segments. Which of the following does the administrator need to complete this task?
- A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- Some of the 20 employees who use the wireless network report they are unable to access network resources even though the wireless network is available. An admin ...
- A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following: Which of the follo ...