No Exams Available
0 of 90 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 90 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
When a switch port negotiates STP topology, what phases should it pass through in what order? Choose the best answer.
Why would you pick a switch with port-side intake? Choose the best answer.
A virtual appliance on your network has a “golden configuration” saved in your CMDB. What does that most likely represent? Choose the best answer.
What kind of firewall is almost always placed to protect a single host or multiple very similar hosts, rather than a an entire network? Choose the best answer.
Which of the following is a key objective of Business Continuity (BC) and Disaster Recovery (DR) planning in the context of network operations? Choose the best answer.
Which of the following is a formal definition of a service provided to or by an organization, typically including expectations for performance, reliability, and other service metrics? Choose the best answer.
What tools allow amplification of a DoS attack? Each correct answer represents a complete solution. Select all that apply.
Which of the following accurately describes how DNS over HTTPS (DoH) differs from DNS over TLS (DoT)? Choose the best answer.
When a device uses Syslog to report a problem, how does it communicate how severe it is? Choose the best answer.
What network ports does a DNS server listen on? Select all that apply.
What is the primary use case for DAC Twinax Ethernet? Choose the best answer.
Which of the following tools is most useful for discovering listening services on the network? Choose the best answer.
You found an optical patch cable in the closet. The connector has a square body, round ferrule, and snaps into place. What type of connector might it be? Select all that apply.
What kind of disaster recovery site allows the widest range of operations with the least service interruption? Choose the best answer.
Your wireless network is configured in Enterprise mode based on 802.1X. What kind of server does it most likely use as a backend? Choose the best answer.
What’s the most essential tool for segmenting broadcast domains while maintaining connectivity? Choose the best answer.
What is the defining characteristic of a private cloud? Choose the best answer.
Which of the following security features is similar to port security but used on a wireless AP? Choose the best answer.
What tool can you use to find the MAC address of a given IP address? Choose the best answer.
When using traceroute or tracert, what is the default TTL? Choose the best answer.
Which of the following describes the resolution of a problem when troubleshooting? Choose the best answer.
On an IPsec VPN, what protocol negotiates security associations? Choose the best answer.
You want to connect the systems in your AWS VPC to the internet. What advantage toes an internet gateway have over a NAT gateway? Choose the best answer.
From a security perspective, which of the following steps is least important when securely decommissioning a system? Choose the best answer.
Remote workers at your company connect to the corporate network using split tunnel VPN. What would be the biggest drawback of moving to a full tunnel configuration? Choose the best answer.
Which of the following is most likely to indicate a host is trying but failing to contact a DHCP server? Choose the best answer.
Which of the following statements about common security terms are accurate? Select all that apply.
You’re told that the address 143.28.98.111 is classfully assigned. What class does it belong to? Choose the best answer.
What kind of task is tcpdump most helpful for? Choose the best answer.
Which of the following is typically NOT part of testing a theory during a troubleshooting process? Choose the best answer.
What kind of proxy would you use to mediate communications between Internet-based clients and LAN-based servers? Choose the best answer.
What descriptive term on a modular transceiver indicates that it uses WDM to transmit both directions on a single fiber? Choose the best answer.
What distinguishes a wireless controller from a wireless access point? Choose the best answer.
A host on the network has a reserved DHCP address so that its IP address does not change. How does the DHCP server know to always assign it the same address? Choose the best answer.
Which of the following statements accurately describe DNS reverse lookup zones? Select all that apply.
All loopback addresses are in which network? Choose the best answer.
What method is most appropriate for performing health checks on network devices as part of availability monitoring? Choose the best answer.
Which of the following address ranges is NOT reserved for private IPv4 addresses? Choose the best answer.
Your organization maintains multiple production and warehousing facilities that rely on automated ICS and IIoT systems. Recent upgrades have integrated these more tightly with your data networks. What is the single most important strategy you should use to maintain their security? Choose the best answer.
What approach to high availability involves designing systems so that, if any one component fails, the system will compensate even at the cost of reduced functionality? Choose the best answer.
You want to configure an old laptop as a protocol analyzer. What application will give you a combination of broad protocol support, powerful sorting and filtering capabilities, and easy interfacing with a a scripting engine? Choose the best answer.
You’re configuring Quality of Service (QoS) rules on your network. Which of the following problems can it likely address? Select all that apply.
What is the primary advantage of agent-based content filtering over proxy-based? Choose the best answer.
Bob Smith received an email delivered to his enterprise email account. The email stressed the importance for Bob to verify the balance in his bank account and offered a link to do so. Bob hovered his mouse cursor over the link and observed a popup tag containing a URL ending in a domain that was not related to his bank. All of the logos in the email were legitimate icons for his bank. What kind of attack is Bob likely the victim of? Choose the best answer.
What is the set of rules a Layer 3 device uses to decide where to send packets? Choose the best answer.
On a WPA3 network, what is NOT an advantage of Enterprise mode over PSK? Choose the best answer.
You’ve configured your smartphone to operate as a Wi-Fi hotspot, allowing your laptop to share its cellular internet connection. What Wi-Fi topology is the resulting network? Choose the best answer.
Which of the following tools is only available for optical cables? Choose the best answer.
If you run Nmap without specifying a port range, what kind of scan will it peform? Choose the best answer.
You’ve been instructed to implement two-factor authentication for a secure system. Of the following list, which would qualify? Each correct answer represents a complete solution. Select all that apply.
You’ve set up multiple APs connected to the same wired network to allow wireless clients to roam through the entire building without reconnecting. Which of the following must be DIFFERENT for each AP? Choose the best answer.
Your data center has electrical generators and sufficient fuel to deal with an extended loss of power. Why would you still need robust UPS systems as well? Choose the best answer.
Which of the following statements about Wi-Fi guest networks are true? Select all that apply.
You’re trying to configure DHCP relay so a a DHCP server can assign addresses across multiple VLANs. Which of the following must you do? Select all that apply.
What transport protocol is most commonly used for lightweight data transfers where session establishment and reliability aren’t major concerns? Choose the best answer.
How tall is a standard server rack, in rack-units? Choose the best answer.
Which of the following protocols operates on OSI Layer 6? Choose the best answer.
What must be shared by all components on the same SNMP network? Choose the best answer.
Which of the following statements accurately describe east-west traffic? Select all that apply.
Your new cloud application has been well-received and you’re anticipating rapid growth in your user base. You’ll respond to increasing demand by allocating more redundant services behind a load balancing solution. What kind of scalability plan is this? Choose the best answer.
Which of the following statements about physical vs. logical network diagrams are true? Select all that apply.
Why would a network administrator prefer out-of-band management to in-band management of critical network devices? Choose the best answer.
A router recieves a packet directed to 10.20.1.43, but finds four conflicting rules in its routing table. Which of the following routes will it use? Each rule is in the format Network/Prefix (Administrative distance.) Choose the best answer.
In addition to carrying data, what is a common duty of Transport Layer protocols? Choose the best answer.
Which of the following status messages is most likely to indicate a port security violation on a switch? Choose the best answer.
An application you are responsible for suddenly stops providing services to users, despite no scheduled downtime or maintenance. Other applications in the same hardware cluster still work. Which of the following is a likely explanation, attack-related or not? Choose the best answer.
You suspect a couple of hosts on the network have incorrect MTU settings. What interface metrics would you watch to validate your theory? Select all that apply.
Which of the following statements are true of Spanning Tree Protocol? Select all that apply.
Which of the following is NOT good advice for hardening a typical network device? Choose the best answer.
You’re trying to avoid interference and attenuation problems when planning a wireless network. Which of the following are good advice? Select all that apply.
On a public cloud service, what is the purpose of a VPC endpoint? Choose the best answer.
You want to collect traffic metadata without complete packet capture so that you can track traffic flows based on source and destination IP addresses and ports. What standard IETF protocol could you use? Choose the best answer.
Your organization is replacing all of its WPA2 access points with WPA3. Which of the following use cases is likely to see see the MOST improved security, provided the devices are compatible? Choose the best answer.
A user reports they cannot access the company’s CRM system. What should your first step be? Choose the best answer.
What is the implied rule on a typical ACL? Choose the best answer.
You’re troubleshooting an office network and notice that performance is much lower communicating between VLANs than it is within the VLAN. Which is the first thing you should investigate? Choose the best answer.
You’re troubleshooting Spanning Tree Protocol (STP) configuration issues on the L2 network. How do switches normally determine whether a port is root? Choose the best answer.
What kind of connector does the TIA/EIA-568 termination standard apply to? Choose the best answer.
You’re using IP message types to filter VPN related traffic. What TWO types are most likely to be useful filters? Select all that apply.
Your new web application has been a success with clients around the world, but the amount of images and video it uses require massive bandwidth, leading to high latency and other performance issues particularly on distant networks. What kind of solution could help? Choose the best answer.
Roaming isn’t working properly in a wireless federation,though individual access points seem to be working properly. You’re comparing settings on each AP to make sure they match. Which of the following does NOT need to be the same on all APs to allow roaming? Choose the best answer.
Which of the following is a significant advantage a site-to-site VPN over a client-to-site VPN? Choose the best answer.
You’re experiencing a lot of dropped packets on twisted-pair Ethernet links passing through an electrical room. Which of the following solutions is most likely to correct the problem? Choose the best answer.
What is the primary purpose of a Switch Virtual Interface (SVI)? Choose the best answer.
How many steps are there in CompTIA’s Network+ troubleshooting model? Choose the best answer.
A routing table has two conflicting routes. They describe the same subnet but point to different interfaces, so the router uses the one with the lower administative distance value. What does “administrative distance” signify? Choose the best answer.
Employees in your company have encryption certificates to secure work files, particularly on BYOD devices. What practice could most effectively prevent a malicious user from destroying keys to cause data loss? Choose the best answer.
An old legacy Linux system isn’t retriving a DHCP address on boot. What command should you try first in the terminal to configure one? Choose the best answer.
Which of the following network types generally has the largest physical scope? Choose the best answer.
Key storage and rotation has become more difficult since you incorporated more virtualization and cloud technology into your network. What solution should you investigate? Choose the best answer.