0 of 99 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 99 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following is the most likely cause?
An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?
Which of the following best explains the role of confidentiality with regard to data at rest?
A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?
Which of the following IP transmission types encrypts all of the transmitted data?
A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue?
Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?
Which of the following can support a jumbo frame?
Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?
A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?
An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?
After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?
Which of the following most likely determines the size of a rack for installation?
A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?
As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?
A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?
Which of the following routing protocols uses an autonomous system number?
Which of the following is the most secure way to provide site-to-site connectivity?
A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?
To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?
A technician is troubleshooting a user’s laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?
Which of the following fiber connector types is the most likely to be used on a network interface card?
A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
A virtual machine has the following configuration: – IPv4 address: 169.254.10.10 – Subnet mask: 255.255.0.0. The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?
A network technician is troubleshooting a web application’s poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?
A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?
Which of the following does a full-tunnel VPN provide?
A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?
Which of the following protocols has a default administrative distance value of 90?
A research facility is expecting to see an exponential increase in global network traffic. The facility is currently utilizing 1Gbps connections but has a 2.5Gbps fiber connection. What should be configured to use the ISP’s connection speed?
Which of the following is used to estimate the average life span of a device?
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
A network engineer is in charge of all SNMP management in the organization. The engineer must use a version that does not transmit plaintext data. Which version of SNMP should be used?
After running Cat 8 cable using passthrough plugs, an electrician notices excessive cross talk. What is the first step the electrician should take to troubleshoot?
A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following is the best solution?
A network administrator is adding a passive IDS to the network switch. Which of the following methods should be used?
Which of the following requires network devices to be managed using a different set of IP addresses?
Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?
Which of the following protocols provides remote access utilizing port 22?
Which of the following attacks utilizes a network packet that contains multiple network tags?
Which of the following describes the best reason for using BGP?
A company’s marketing team created a new application and wants a DNS record that resolves to the same address as www.company.org. What type of record should be used?
Which of the following solutions ensures that network connections can be traced back to a user?
A network administrator wants to configure a backup route in case the primary route fails but is not using dynamic routing. Which routing feature should be used?
Which of the following is a characteristic of the application layer?
Which of the following scenarios most likely requires the use of subinterfaces?
Which troubleshooting step would involve checking through each level of the OSI model after identifying a problem?
A network administrator wants to implement security zones in the corporate network. Which of the following security zones is the best solution?
A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?
A network administrator needs to divide the 192.168.1.0/24 network into two equal halves. Which of the following subnet masks should be used?
A network administrator needs to set up a multicast network for broadcasting. Which of the following networks would be the most appropriate?
Which of the following would allow a research facility to fully utilize its 2.5Gbps internet connection?
Which of the following is used to measure the average time between failures for a device?
Which of the following is the most appropriate method for dividing network traffic between departments?
A network administrator needs to choose an SNMP version that ensures secure communication by preventing plaintext data transmission. Which version should be selected?
Which of the following should be inspected first when troubleshooting excessive crosstalk in Cat 8 cable?
Which type of network topology allows for high redundancy by connecting each node to every other node?
A company’s network administrator is tasked with installing new devices that operate on Layer 2 and need jumbo frames support. Which device should the administrator select?
A network technician notices that after an update to a routing table, external BGP routes are not properly preferred. What could be causing this issue?
Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?
A network technician needs to ensure that all wireless devices in the corporate network authenticate using company credentials. Which of the following protocols should be used?
Which of the following regulations focuses on the security and handling of personal data in Europe?
A network administrator is attempting to troubleshoot connectivity issues to an internal website. Which command-line tool is used to trace the route packets take?
Which of the following attacks can cause users attempting to access a company website to be directed to a different website?
Which of the following should a network administrator configure when adding OT devices to the organization’s architecture?
Which of the following environmental factors should be considered when installing equipment in a building?
A network administrator is configuring a wireless network with multiple access points using the same ESSID. What is the user benefit?
A network administrator needs to set up a multicast network for video broadcasting. Which IP range should be used?
Which of the following protocols provides a dedicated link to a cloud environment, potentially without encryption?
A technician troubleshooting a network notices intermittent connectivity issues when large data transfers are performed. Which type of network issue is most likely causing this?
A network administrator wants to create security zones within the company to limit access between departments. Which feature should be used?
Which of the following commands provides information about the current active network connections?
Which of the following protocols is commonly used to automate tasks such as switching VLANs for dynamic networks?
A network engineer is tasked with implementing a load balancer to improve server availability. Which of the following types of load balancing would provide the most even distribution of traffic?
Which of the following provides remote management access to a network device?
A network administrator notices unusual traffic patterns coming from a company server. Which command-line tool should be used to inspect the traffic?
A network engineer is setting up a VPN connection for secure remote access. Which of the following protocols should be used to ensure encryption of the entire data stream?
Which of the following protocols is responsible for IP address assignment within a local network?
Which of the following would be the best method to ensure network resiliency in the event of a switch failure?
A network administrator needs to reduce the impact of wireless interference in a factory environment. Which of the following should be implemented?
Which of the following security mechanisms allows or denies network access based on the MAC address of a device?
A network engineer is tasked with designing a network for a new office location. Which topology should be used to ensure that if one connection fails, traffic can still flow through alternate paths?
Which of the following protocols uses port 443 by default to secure web communications?
Which of the following is the best practice for securing a wireless network?
A company wants to improve the redundancy and reliability of its WAN connections between multiple branch offices. Which solution would best meet this requirement?
Which of the following tools can be used to measure the time it takes for a signal to travel to a destination and return?
A network administrator needs to troubleshoot a slow file transfer issue between two servers. Which of the following metrics should be examined first?
A technician is installing a new network switch and wants to prevent unauthorized devices from accessing the network. Which security feature should be enabled on the switch?
Which of the following best describes the purpose of a VLAN?
A network engineer needs to securely connect multiple branch offices to the main office using the public internet. Which of the following solutions should be implemented?
Which of the following methods helps secure the configuration of network devices by requiring a multi-step authentication process?
A network technician is troubleshooting a user’s slow connection to a remote site. The connection uses a satellite link for internet access. Which of the following is the most likely cause of the slow connection?
Which of the following protocols uses port 443 to establish secure connections for email, web browsing, and other services?
A network administrator needs to segment the network to isolate traffic between different departments. Which of the following is the most effective solution?
A company is implementing a policy to prevent employees from accessing certain websites. Which of the following solutions should be deployed to enforce this policy?
A network administrator needs to limit access to a secure server to specific IP addresses. Which of the following should be configured?
A technician is installing a wireless network and wants to use the most secure encryption method available. Which of the following should be selected?
Which of the following is a common reason for a user to experience intermittent wireless connectivity issues in a dense office environment?
