Join the discussion
Question 1/427
A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period.
Which of the following should be considered FIRST?
Which of the following should be considered FIRST?
Correct Answer: D
* A network performance baseline is a set of metrics that represents the normal operating state of a network. It can be used to measure the impact of changes, identify anomalies, and troubleshoot issues12.
* A WAN technician should consider the network performance baseline first when identifying newly installed hardware that is causing outages, because it can help determine what has changed and how it affects the network performance3.
* VLAN assignments, routing table, and device configuration review are also important factors to consider, but they are not the first step in troubleshooting. They can be used to verify the connectivity, routing, and configuration of the new hardware, but they do not provide a clear picture of the network performance before and after the change3.
References:
* CompTIA Network+ N10-008 Study Guide, Chapter 5: Network Monitoring and Troubleshooting, pages 248-249, 264-265.
* [Professor Messer's CompTIA N10-008 Network+ Course Notes], Section 5.1: Network Troubleshooting Methodology, pages 48-49.
* [Professor Messer's CompTIA N10-008 Network+ Training Course], Video 5.1: Network Troubleshooting Methodology, [6].
* A WAN technician should consider the network performance baseline first when identifying newly installed hardware that is causing outages, because it can help determine what has changed and how it affects the network performance3.
* VLAN assignments, routing table, and device configuration review are also important factors to consider, but they are not the first step in troubleshooting. They can be used to verify the connectivity, routing, and configuration of the new hardware, but they do not provide a clear picture of the network performance before and after the change3.
References:
* CompTIA Network+ N10-008 Study Guide, Chapter 5: Network Monitoring and Troubleshooting, pages 248-249, 264-265.
* [Professor Messer's CompTIA N10-008 Network+ Course Notes], Section 5.1: Network Troubleshooting Methodology, pages 48-49.
* [Professor Messer's CompTIA N10-008 Network+ Training Course], Video 5.1: Network Troubleshooting Methodology, [6].
Add Comments
- Other Question (427q)
- Q1. A WAN technician reviews activity and identifies newly installed hardware that is causing ...
- Q2. Which of the following describes when an active exploit is used to gain access to a networ...
- Q3. A technician is configuring a bandwidth-monitoring tool that supports payloads of 1,600 by...
- Q4. In which of the following scenarios should a technician use a cross-over cable to provide ...
- Q5. A network administrator is planning to implement device monitoring to enhance network visi...
- Q6. Which of the following devices would be used to manage a corporate WLAN?...
- Q7. A technician is configuring a wireless access point in a public space for guests to use. W...
- Q8. Users in a remote office report that corporate web server pages are taking a long time to ...
- Q9. A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the...
- Q10. An organization wants to implement a method of centrally managing logins to network servic...
- Q11. A network technician was troubleshooting an issue for a user who was being directed to clo...
- Q12. A network administrator is configuring a firewall to allow for a new cloud-based email ser...
- Q13. According to troubleshooting methodology, which of the following should the technician do ...
- Q14. Which of the following connector types would have the MOST flexibility?...
- Q15. A technician is troubleshooting a SQL database connection. After remotely connecting to th...
- Q16. A technician is monitoring a network interface and notices the device is dropping packets....
- Q17. Which of the following combinations of single cables and transceivers will allow a server ...
- Q18. A company hired a technician to find all the devices connected within a network. Which of ...
- Q19. While using a secure conference call connection over a corporate VPN, a user moves from a ...
- Q20. A network administrator is installing a new server in the data center. The administrator i...
- Q21. A network technician needs to resolve some issues with a customer's SOHO network. The cust...
- Q22. Which of the following is MOST commonly used to address CVEs on network equipment and/or o...
- Q23. An attacker is using an unknown vulnerability that allows malicious actors to utilize the ...
- Q24. A fiber link connecting two campus networks is broken. Which of the following tools should...
- Q25. A customer is adding fiber connectivity between adjacent buildings. A technician terminate...
- Q26. A company has a geographically remote office concern for this type of connection?...
- Q27. A network engineer is troubleshooting application connectivity issues between a server and...
- Q28. A network administrator wants to test the throughput of a new metro Ethernet circuit to ve...
- Q29. A technician is connecting multiple switches to create a large network for a new office. T...
- Q30. After running a Cat 8 cable using passthrough plugs, an electrician notices that connected...
- Q31. Which of the following is the DNS feature that controls how long a lookup is stored in cac...
- Q32. A network technician needs to select an AP that will support at least 1.3Gbps and 5GHz onl...
- Q33. A network engineer designed and implemented a new office space with the following characte...
- Q34. Which of the following would be BEST suited for use at the access layer in a three-tier ar...
- Q35. A network technician is attempting to harden a commercial switch that was recently purchas...
- Q36. A technician is troubleshooting a client's report about poor wireless performance. Using a...
- Q37. A company wants to mitigate unauthorized physical connectivity after implementing a hybrid...
- Q38. A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping c...
- Q39. A network technician is reviewing an upcoming project's requirements to implement laaS. Wh...
- Q40. A technician is investigating why a PC cannot reach a file server with the IP address 192....
- Q41. A non-employee was able to enter a server room. Which of the following could have prevente...
- Q42. You are tasked with verifying the following requirements are met in order to ensure networ...
- Q43. A help desk supervisor reviews the following excerpt of a call transcript: Which of the fo...
- Q44. A retail store recently acquired the store next door. The owners would like this store to ...
- Q45. A network security technician is designing a solution for a secure remote access scheme wi...
- Q46. A network technician is manually configuring the network settings for a new device and is ...
- Q47. To comply with an industry regulation, all communication destined to a secure server shoul...
- Q48. SIMULATION A network technician replaced a switch and needs to reconfigure it to allow the...
- Q49. A network technician is hired to review all the devices within a network and make recommen...
- Q50. A virtual machine has the following configuration: IPv4 address: 169.254.10.10 Subnet mask...
- Q51. Which of the following describes the BEST device to configure as a DHCP relay?...
- Q52. A network administrator is configuring a new switch and wants to connect two ports to the ...
- Q53. A network technician is selecting a replacement for a damaged fiber cable that goes direct...
- Q54. A network technician is deploying multiple switches for a new office. The switches are sep...
- Q55. A network administrator responds to a support ticket that was submitted by a customer who ...
- Q56. During a risk assessment which of the following should be considered when planning to miti...
- Q57. You have been tasked with implementing an ACL on the router that will: 1. Permit the most ...
- Q58. An IT administrator needs to connect older smart-plug devices to the network. The administ...
- Q59. Which of the following should a network administrator configure when adding OT devices to ...
- Q60. An organization has a guest network with a network IP range of 192.168.1.0/28 using a DHCP...
- Q61. Which of the following would be used to indicate when unauthorized access to physical inte...
- Q62. A network technician is reviewing the interface counters on a router interface. The techni...
- Q63. Which of the following is the primary function of the core layer of the three-tiered model...
- Q64. Which of the following objectives does an evil twin achieve?...
- Q65. A network attack caused a network outage by wiping the configuration and logs of the borde...
- Q66. Which of the following steps of the troubleshooting methodology would most likely include ...
- Q67. Which of the following documents dictates the uptimes that were agreed upon by the involve...
- Q68. An organization wants to implement a method of centrally managing logins to network servic...
- Q69. A network administrator is installing a wireless network at a client's office. Which of th...
- Q70. A network administrator is testing performance improvements by configuring channel bonding...
- Q71. Given the following Information: (Exhibit) Which of the following would cause performance ...
- Q72. A network administrator requires redundant routers on the network, but only one default ga...
- Q73. Which of the following protocols should be used when Layer 3 availability is of the highes...
- Q74. A network administrator is concerned about a rainbow table being used to help access netwo...
- Q75. A technician is responsible for configuring a new firewall. The hardware team has already ...
- Q76. A network technician added a new workstation to the network and needs to make a custom, sh...
- Q77. A network engineer is monitoring a fiber uplink to a remote office and notes the uplink ha...
- Q78. A network administrator is troubleshooting a client's device that cannot connect to the ne...
- Q79. A company is opening a new building on the other side of its campus. The distance from the...
- Q80. Which of the following is the most secure connection used to inspect and provide controlle...
- Q81. An application is not working. When the log files are reviewed, the application continuous...
- Q82. Which of the following topologies requites the MOST connections when designing a network?...
- Q83. A Network engineer is investigating issues on a Layer 2 Switch. The department typically s...
- Q84. Network traffic is being compromised by DNS poisoning every time a company's router is con...
- Q85. A public, wireless ISP mounts its access points on top of traffic signal poles. Fiber-opti...
- Q86. A network administrator is installing a wireless network at a client's office. Which of th...
- Q87. Which of the following routing protocols is hierarchal by nature and uses the router ID to...
- Q88. An engineer is designing a network topology for a company that maintains a large on-premis...
- Q89. A technician is troubleshooting intermittent connectivity between devices and viewing the ...
- Q90. Which of the following devices would be used to extend the range of a wireless network?...
- Q91. A network administrator corrected a rule on a misconfigured firewall. Which of the followi...
- Q92. Which of the following OSI model layers would allow a user to access and download flies fr...
- Q93. A network administrator is designing a wireless network. The administrator must ensure a r...
- Q94. A network security technician is designing a solution for a secure remote access scheme wi...
- Q95. Which of the following protocols can be routed?...
- Q96. A security engineer is installing a new IOS on the network. The engineer has asked a netwo...
- Q97. A workstation is configured with the following network details: (Exhibit) Software on the ...
- Q98. A desktop support department has observed slow wireless speeds for a new line of laptops u...
- Q99. A network technician is hired to review all the devices within a network and make recommen...
- Q100. To access production applications and data, developers must first connect remotely to a di...
- Q101. A user reports that a new VoIP phone works properly, but the computer that is connected to...
- Q102. At which of the following OSI model layers would a technician find an IP header?...
- Q103. A user from a remote office is reporting slow file transfers. Which of the following tools...
- Q104. A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode...
- Q105. Which of the following functions is used to prioritize network traffic based on the type o...
- Q106. Which of the following routing protocols should be implemented to create a route between a...
- Q107. A technician is concerned about unauthorized personnel moving assets that are installed in...
- Q108. A technician wants to deploy a new wireless network that comprises 30 WAPs installed throu...
- Q109. A network technician wants to deploy a new wireless access point to reduce user latency. C...
- Q110. While setting up a new workstation, a technician discovers that the network connection is ...
- Q111. At which of the following OSI model layers does an IMAP client run?...
- Q112. Which of the following topologies is designed to fully support applications hosted in on-p...
- Q113. A corporation has a critical system that would cause unrecoverable damage to the brand if ...
- Q114. Which of the following ports is commonly used by VoIP phones?...
- Q115. A customer is adding fiber connectivity between adjacent buildings. A technician terminate...
- Q116. An IT technician suspects a break in one of the uplinks that provides connectivity to the ...
- Q117. Which of the following is used to track and document various types of known vulnerabilitie...
- Q118. A network technician has determined the cause of a network disruption. Which of the follow...
- Q119. A network engineer is investigating reports of poor network performance. Upon reviewing a ...
- Q120. During a client audit, a network analyst is tasked with recommending changes to upgrade th...
- Q121. A packet is assigned a value to ensure it does not traverse a network indefinitely. Which ...
- Q122. A client who shares office space and an IT closet with another company recently reported c...
- Q123. Which of the following network topologies is ONLY possible between two users?...
- Q124. A company is using a DHCP server with 12-hour leases for its device configurations. A user...
- Q125. A network technician needs to determine which RJ45 jack in a patch panel corresponds to th...
- Q126. Which of the following redundant devices creates broadcast storms when connected together ...
- Q127. Which of the following can be used to aggregate logs from different devices and would make...
- Q128. A Chief Information Officer (CIO) wants to improve the availability of a company's SQL dat...
- Q129. A technician uses a badge to enter a security checkpoint on a corporate campus. An unknown...
- Q130. A technician is assisting a user who cannot connect to a network resource. The technician ...
- Q131. An administrator is setting up a multicast server on a network, but the firewall seems to ...
- Q132. A technician is installing multiple UPS units in a major retail store. The technician is r...
- Q133. Which of the following is the most likely reason an insurance brokerage would enforce VPN ...
- Q134. Which of the following DHCP settings would be used to ensure a device gets the same IP add...
- Q135. Which of the following storage connection types should be used to allow the consolidation ...
- Q136. A PC user who is on a local network reports very slow speeds when accessing files on the n...
- Q137. A technician is implementing a new wireless network to serve guests at a local office. The...
- Q138. An administrator needs to connect two laptops directly to each other using 802.11ac but do...
- Q139. A customer wants to log in t o a vendor's server using a web browser on a laptop. Which of...
- Q140. Which of the following is the MOST effective security control to keep a company's physical...
- Q141. A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. ...
- Q142. Which of the following is most likely to be implemented to actively mitigate intrusions on...
- Q143. You are tasked with verifying the following requirements are met in order to ensure networ...
- Q144. Two users on a LAN establish a video call. Which of the following OSI model layers ensures...
- Q145. A customer wants to log in t o a vendor's server using a web browser on a laptop. Which of...
- Q146. A desktop support department has observed slow wireless speeds for a new line of laptops u...
- Q147. A company's data center is hosted at its corporate office to ensure greater control over t...
- Q148. A network technician is working to upgrade an existing wireless system in order to improve...
- Q149. A network administrator is troubleshooting a PC that cannot connect to the LAN. The admini...
- Q150. Which of the following describes the BEST device to configure as a DHCP relay?...
- Q151. Which of the following best describes what an organization would use port address translat...
- Q152. A network administrator wants to reduce overhead and increase efficiency on a SAN. Which o...
- Q153. A workstation is configured with the following network details: (Exhibit) Software on the ...
- Q154. A network administrator is trying to identify a device that is having issues connecting to...
- Q155. A network technician is troubleshooting internet connectivity issues with users in a subne...
- Q156. During a recent security audit, a contracted penetration tester discovered the organizatio...
- Q157. A network technician is investigating an IP phone that does not register in the VoIP syste...
- Q158. A company is undergoing expansion but does not have sufficient rack space in its data cent...
- Q159. A network client is trying to connect to the wrong TCP port. Which of the following respon...
- Q160. Which of the following ports are associated with IMAP? (Choose two.)...
- Q161. Which of the following is a valid and cost-effective solution to connect a fiber cable int...
- Q162. Wireless users are reporting intermittent internet connectivity. Connectivity is restored ...
- Q163. A network technician receives a support ticket about an employee who has misplaced a compa...
- Q164. A network engineer is designing a new secure wireless network. The engineer has been given...
- Q165. A network technician is investigating an issue with handheld devices in a warehouse. Devic...
- Q166. On a network with redundant switches, a network administrator replaced one of the switches...
- Q167. The following DHCP scope was configured for a new VLAN dedicated to a large deployment of ...
- Q168. A network administrator is given the network 80.87.78.0/26 for specific device assignments...
- Q169. MIMO technology in the 802.11n standard provides for which of the following benefits?...
- Q170. A network technician is investigating an IP phone that does not register in the VoIP syste...
- Q171. A network administrator is given the network 80.87.78.0/26 for specific device assignments...
- Q172. A technician is trying to determine whether an LACP bundle is fully operational. Which of ...
- Q173. A network technician receives a report from the server team that a server's network connec...
- Q174. While using a secure conference call connection over a corporate VPN, a user moves from a ...
- Q175. The Chief Executive Officer of a company wants to ensure business operations are not disru...
- Q176. A network engineer is investigating reports of poor network performance. Upon reviewing a ...
- Q177. Many IP security cameras use RTSP to control media playback. Which of the following defaul...
- Q178. Due to space constraints in an IDF, a network administrator can only a do a single switch ...
- Q179. A security team would like to use a system in an isolated network to record the actions of...
- Q180. A systems administrator is running a VoIP network and is experiencing jitter and high late...
- Q181. Which of the following IP packet header fields is the mechanism for ending loops at Layer ...
- Q182. Which of the following BEST describes a network appliance that warns of unapproved devices...
- Q183. A customer has an attached USB printer that needs to be shared with other users. The deskt...
- Q184. A network administrator is installing a wireless network at a client's office. Which of th...
- Q185. A non-employee was able to enter a server room. Which of the following could have prevente...
- Q186. Which of the following issues are present with RIPv2? (Select TWO)....
- Q187. A technician removes an old PC from the network and replaces it with a new PC that is unab...
- Q188. Which of the following situations would require an engineer to configure subinterfaces?...
- Q189. Which of the following factors should be considered when evaluating a firewall to protect ...
- Q190. A customer has an attached USB printer that needs to be shared with other users. The deskt...
- Q191. A user from a remote office is reporting slow file transfers. Which of the following tools...
- Q192. A technician discovered that some information on the local database server was changed dur...
- Q193. Which of the following is an advantage of using the cloud as a redundant data center?...
- Q194. The network administrator is informed that a user's email password is frequently hacked by...
- Q195. The results of a recently completed site survey indicate a significant, undesired RSSI in ...
- Q196. A company ranis out a largo event space and includes wireless internet access for each ten...
- Q197. A customer wants to segregate the traffic between guests on a hypervisor. Which of the fol...
- Q198. A network engineer has added a new route on a border router and is trying to determine if ...
- Q199. A technician is monitoring a network interface and notices the device is dropping packets....
- Q200. Which of the following devices have the capability to allow communication between two diff...
- Q201. Which of the following TCP ports is used by the Windows OS for file sharing?...
- Q202. A network technician is responding to an issue with a local company. To which of the follo...
- Q203. A network technician receives a report about a performance issue on a client PC that is co...
- Q204. During the security audit of a financial firm the Chief Executive Officer (CEO) questions ...
- Q205. A network technician is configuring a wireless network that consists of multiple APs for b...
- Q206. A network technician needs to correlate security events to analyze a suspected intrusion. ...
- Q207. Which of the following is an example of on-demand scalable hardware that is typically hous...
- Q208. Which of the following refers to a weakness in a mechanism or technical process?...
- Q209. A network administrator is deploying a new switch and wants to make sure that the default ...
- Q210. Which of the following situations would require an engineer to configure subinterfaces?...
- Q211. Switch 3 was recently added lo an existing stack to extend connectivity to various parts o...
- Q212. Branch users are experiencing issues with videoconferencing. Which of the following will t...
- Q213. A user stores large graphic files. The lime required to transfer the files to the server i...
- Q214. An administrator notices that after contact with several switches in an MDF they failed du...
- Q215. An IT director is setting up new disaster and HA policies for a company. Limited downtime ...
- Q216. A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, ...
- Q217. A technician is investigating packet loss to a device that has varying data bursts through...
- Q218. A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are no...
- Q219. Switch 3 was recently added lo an existing stack to extend connectivity to various parts o...
- Q220. A network administrator walks into a datacenter and notices an unknown person is following...
- Q221. Which of the following OSI model layers are responsible for handling packets from the sour...
- Q222. A technician is investigating an issue with connectivity at customer's location. The techn...
- Q223. Which of the following would MOST likely be used to review previous upgrades to a system?...
- Q224. To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt clo...
- Q225. An attacker is attempting to find the password to a network by inputting common words and ...
- Q226. A company's web server is hosted at a local ISP. This is an example of:...
- Q227. Which of the following is the most accurate NTP time source that is capable of being acces...
- Q228. A network administrator is downloading a large patch that will be uploaded to several ente...
- Q229. A security analyst found the following vulnerability on the company's website: <INPUT T...
- Q230. Which of the following provides guidance to an employee about restricting non-business acc...
- Q231. A technician is installing a cable modem in a SOHO. Which of the following cable types wil...
- Q232. A network administrator is reviewing the following metrics from a network management syste...
- Q233. A network administrator determines that even when optimal wireless coverage is configured,...
- Q234. A new student is given credentials to log on to the campus Wi-Fi. The student stores the p...
- Q235. A network technician recently replaced a managed switch in an enterprise network with a ne...
- Q236. Wireless users are reporting intermittent internet connectivity. Connectivity is restored ...
- Q237. A network administrator needs to configure a server to use the most accurate NTP reference...
- Q238. A WAN technician reviews activity and identifies newly installed hardware that is causing ...
- Q239. Clients have reported slowness between a branch and a hub location. The senior engineer su...
- Q240. Several users with older devices are reporting intermittent connectivity while in an outdo...
- Q241. You are tasked with verifying the following requirements are met in order to ensure networ...
- Q242. SIMULATION A network technician replaced a switch and needs to reconfigure it to allow the...
- Q243. An engineer is configuring redundant network links between switches. Which of the followin...
- Q244. A network administrator views a network pcap and sees a packet containing the following: (...
- Q245. A user reports being unable to access network resources after making some changes in the o...
- Q246. A network administrator needs to implement an HDMI over IP solution. Which of the followin...
- Q247. Which of the following OSI model layers are responsible for handling packets from the sour...
- Q248. A network attack caused a network outage by wiping the configuration and logs of the borde...
- Q249. Which of the following describes the ability of a corporate IT department to expand its cl...
- Q250. Which of the following service models would MOST likely be used to replace on-premises ser...
- Q251. A security engineer wants to provide a secure, dedicated, alternate access method into an ...
- Q252. At which of the following OSI model layers does routing occur?...
- Q253. A network engineer receives the following when connecting to a switch to configure a port:...
- Q254. A company's publicly accessible servers are connected to a switch between the company's IS...
- Q255. You have been tasked with implementing an ACL on the router that will: 1. Permit the most ...
- Q256. An administrator needs to connect two laptops directly to each other using 802.11ac but do...
- Q257. A network technician is troubleshooting an area where the wireless connection to devices i...
- Q258. A technician is installing multiple UPS units in a major retail store. The technician is r...
- Q259. The following configuration is applied to a DHCP server connected to a VPN concentrator: (...
- Q260. A medical building offers patients Wi-Fi in the waiting room. Which of the following secur...
- Q261. Which of the following can be used to centrally manage credentials for various types of ad...
- Q262. A network administrator is deploying a new switch and wants to make sure that the default ...
- Q263. Which of the following can be used to centrally manage credentials for various types of ad...
- Q264. A network administrator is concerned about a rainbow table being used to help access netwo...
- Q265. A user is having difficulty with video conferencing and is looking for assistance. Which o...
- Q266. An administrator is adjusting the routing policy to ensure the headquarters location can c...
- Q267. Which of the following is the primary function of the core layer of the three-tiered model...
- Q268. A network administrator redesigned the positioning of the APs to create adjacent areas of ...
- Q269. A network technician is investigating an issue with a desktop that is not connecting to th...
- Q270. A Wi-Fi network was recently deployed in a new, multilevel budding. Several issues are now...
- Q271. A PC and a network server have no network connectivity, and a help desk technician is atte...
- Q272. A network technician is planning a network scope. The web server needs to be within 12.31 ...
- Q273. A network technician wants to find the shortest path from one node to every other node in ...
- Q274. A network engineer has added a new route on a border router and is trying to determine if ...
- Q275. A network administrator is downloading a large patch that will be uploaded to several ente...
- Q276. A network technician is troubleshooting a connection to a web server. The Technician Is un...
- Q277. A technician wants to deploy a new wireless network that comprises 30 WAPs installed throu...
- Q278. A technician is investigating why a PC cannot reach a file server with the IP address 192....
- Q279. Which of the following OSI model layers will ensure messages are transmitted to their dest...
- Q280. During the security audit of a financial firm the Chief Executive Officer (CEO) questions ...
- Q281. A company's publicly accessible servers are connected to a switch between the company's IS...
- Q282. Which of the following statements about the OSI model is true?...
- Q283. An IT technician is working on a support ticket regarding an unreachable web-site. The tec...
- Q284. A security engineer is installing a new IOS on the network. The engineer has asked a netwo...
- Q285. Which of the following would be used when connecting devices that have different physical ...
- Q286. Which of the following policies is MOST commonly used for guest captive portals?...
- Q287. A technician is installing a high-density wireless network and wants to use an available f...
- Q288. A network technician is attempting to increase throughput by configuring link port aggrega...
- Q289. An engineer is designing a network topology for a company that maintains a large on-premis...
- Q290. Following the implementation of a BYOD policy, some users in a high-density environment re...
- Q291. An IT director is setting up new disaster and HA policies for a company. Limited downtime ...
- Q292. Which of the following is used to determine whether or not a user's account is authorized ...
- Q293. There are two managed legacy switches running that cannot be replaced or upgraded. These s...
- Q294. A network engineer needs to enable device monitoring using authentication and encryption. ...
- Q295. A network administrator would like to enable NetFlow on a Layer 3 switch but is concerned ...
- Q296. Which of the following is required when connecting an endpoint device with an RJ45 port to...
- Q297. A network is experiencing a number of CRC errors during normal network communication. At w...
- Q298. Which of the following would be used on a network to ensure access to resources if a criti...
- Q299. A network administrator is designing a wireless network. The administrator must ensure a r...
- Q300. A technician is investigating why a PC cannot reach a file server with the IP address 192....
- Q301. A network technician is implementing a solution that will allow end users to gain access t...
- Q302. Wireless users are reporting intermittent internet connectivity. Connectivity is restored ...
- Q303. Which of the following technologies would MOST likely be used to prevent the loss of conne...
- Q304. A network technician is troubleshooting internet connectivity issues with users in a subne...
- Q305. A technician is troubleshooting a network switch that seems to stop responding to requests...
- Q306. A network administrator is preparing new switches that will be deployed to support a netwo...
- Q307. A building was recently remodeled in order to expand the front lobby. Some mobile users ha...
- Q308. A junior network engineer is trying to change the native network ID to a non-default value...
- Q309. A company joins a bank's financial network and establishes a connection to the clearinghou...
- Q310. A user wants to avoid using a password to access a third-party website. Which of the follo...
- Q311. Switch 3 was recently added lo an existing stack to extend connectivity to various parts o...
- Q312. A technician received a report that some users in a large, 30-floor building are having in...
- Q313. A network is experiencing a number of CRC errors during normal network communication. At w...
- Q314. Joe, a user, reports intermittent connectivity issues, but a technician notices that the o...
- Q315. A technician is setting up DNS records on local servers for the company's cloud DNS to ena...
- Q316. A network administrator notices excessive wireless traffic occurring on an access point af...
- Q317. An ISP is unable to provide services to a user in a remote area through cable and DSL. Whi...
- Q318. A network technician is having issues connecting an loT sensor to the internet The WLAN se...
- Q319. Logs show an unauthorized IP address entering a secure part of the network every night at ...
- Q320. A network technician wants to deploy a new wireless access point to reduce user latency. C...
- Q321. A company's network is set up so all Internet-bound traffic from all remote offices exits ...
- Q322. A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the...
- Q323. A network engineer is configuring new switches. Some of the trunk ports are in a blocking ...
- Q324. A network administrator is investigating a network event that is causing all communication...
- Q325. A network administrator wants to check all network connections and see the output in integ...
- Q326. A network administrator is reviewing the following metrics from a network management syste...
- Q327. A company that uses VoIP telephones is experiencing intermittent issues with one-way audio...
- Q328. A senior administrator has been directed to incorporate AAA services within a domain envir...
- Q329. A customer is hosting an internal database server. None of the users are able to connect t...
- Q330. Which of the following describes a network in which users and devices need to mutually aut...
- Q331. A help desk supervisor reviews the following excerpt of a call transcript: (Exhibit) Which...
- Q332. A technician is troubleshooting a client's report about poor wireless performance. Using a...
- Q333. A network administrator received a report staling a critical vulnerability was detected on...
- Q334. A network administrator views a network pcap and sees a packet containing the following: (...
- Q335. A network technician is troubleshooting a connection to a web server. The Technician Is un...
- Q336. A network administrator views a network pcap and sees a packet containing the following: (...
- Q337. A network administrator is given the network 80.87.78.0/26 for specific device assignments...
- Q338. A network administrator is investigating a network event that is causing all communication...
- Q339. A technician is connecting a Cat 6 Ethernet cable to a device mat only has LC poos. Which ...
- Q340. A network engineer is designing a wireless network that has the following requirements: * ...
- Q341. A server application requires large amounts of data to be sent at a consistent rate. Which...
- Q342. An engineer is gathering data to determine the effectiveness of UPSs in use at remote reta...
- Q343. A technician needs to change an incoming fiber line into an RJ45 copper connection for upl...
- Q344. A technician is configuring a bandwidth-monitoring tool that supports payloads of 1,600 by...
- Q345. A security analyst found the following vulnerability on the company's website:<INPUT TY...
- Q346. A small, family-run business uses a single SOHO router to provide Internet and WiFi to its...
- Q347. Users have reported an issue connecting to a server over the network. A workstation was re...
- Q348. The following DHCP scope was configured for a new VLAN dedicated to a large deployment of ...
- Q349. A network technician is investigating an issue with a desktop that is not connecting to th...
- Q350. A network technician is investigating a trouble ticket for a user who does not have networ...
- Q351. A network administrator is troubleshooting a connection to a remote site. The administrato...
- Q352. Which of the following protocols will a security appliance that is correlating network eve...
- Q353. A network administrator is configuring a load balancer for two systems. Which of the follo...
- Q354. Which of the following protocols uses Dijkstra's algorithm to calculate the LOWEST cost be...
- Q355. A large metropolitan city is looking to standardize the ability tor police department lapt...
- Q356. A network administrator is creating a subnet for a remote office that has 53 network devic...
- Q357. A customer calls the help desk to report that users are unable to access any network resou...
- Q358. A customer needs six usable IP addresses. Which of the following best meets this requireme...
- Q359. An IT administrator is creating an alias to the primary customer's domain. Which of the fo...
- Q360. A technician needs to configure a routing protocol for an internet-facing edge router. Whi...
- Q361. A network manager wants to view network traffic for devices connected to a switch. A netwo...
- Q362. Which of the following is a benefit of the spine-and-leaf network topology?...
- Q363. Which of the following is the physical security mechanism that would MOST likely be used t...
- Q364. A network administrator discovers that users in an adjacent building are connecting to the...
- Q365. When a user makes a VoIP phone call and finishes speaking, the user experiences a delay in...
- Q366. A technician is deploying a new switch model and would like to add it to the existing netw...
- Q367. A technician installed an 8-port switch in a user's office. The user needs to add a second...
- Q368. Which of the following most likely requires the use of subinterfaces?...
- Q369. A network security engineer locates an unapproved wireless bridge connected to the corpora...
- Q370. Which of the following focuses on application delivery?...
- Q371. Which of the following factors should be considered when evaluating a firewall to protect ...
- Q372. An attacker is attempting to find the password to a network by inputting common words and ...
- Q373. Access to a datacenter should be individually recorded by a card reader even when multiple...
- Q374. Which of the following network topologies best describes a central device connected to mul...
- Q375. An administrator wants to host services on the internet using an internal server. The serv...
- Q376. A network engineer configured new firewalls with the correct configuration to be deployed ...
- Q377. A network technician needs to correlate security events to analyze a suspected intrusion. ...
- Q378. A technician removes an old PC from the network and replaces it with a new PC that is unab...
- Q379. Which of the following is the MOST secure connection used to inspect and provide controlle...
- Q380. A network manager wants to view network traffic for devices connected to a switch. A netwo...
- Q381. A network administrator needs to add access points to the network because coverage in some...
- Q382. Which of the following is a requirement when certifying a network cabling as Cat 7?...
- Q383. A technician is installing a high-density wireless network and wants to use an available f...
- Q384. A network engineer is installing hardware in a newly renovated data center. Major concerns...
- Q385. SIMULATION You have been tasked with setting up a wireless network in an office. The netwo...
- Q386. Branch users are experiencing issues with videoconferencing. Which of the following will t...
- Q387. A network administrator installed an additional IDF during a building expansion project. W...
- Q388. A network security engineer locates an unapproved wireless bridge connected to the corpora...
- Q389. A technician receives feedback that some users are experiencing high amounts of jitter whi...
- Q390. A network administrator installed an additional IDF during a building expansion project. W...
- Q391. A company wants an administrator to perform a vulnerability test. The administrator finds ...
- Q392. An on-call network technician receives an automated email alert stating that a power suppl...
- Q393. An engineer is designing a network topology for a company that maintains a large on-premis...
- Q394. A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not...
- Q395. Which of the following types of devices can provide content filtering and threat protectio...
- Q396. Which of the following services can provide data storage, hardware options, and scalabilit...
- Q397. During a risk assessment which of the following should be considered when planning to miti...
- Q398. Which of the following network devices can perform routing between VLANs?...
- Q399. Which of the following OSI model layers would allow a user to access and download files fr...
- Q400. A network administrator is designing a new datacenter in a different region that will need...
- Q401. An organization has a security requirement that all network connections can be traced back...
- Q402. A company streams video to multiple devices across a campus. When this happens, several us...
- Q403. To access production applications and data, developers must first connect remotely to a di...
- Q404. A network technician is troubleshooting an issue that involves connecting to a server via ...
- Q405. A network engineer needs to change an entire subnet of SLAAC-configured workstation addres...
- Q406. A company must create a way for partners to access a web portal to update documents for a ...
- Q407. A WAN technician reviews activity and identifies newly installed hardware that is causing ...
- Q408. A company just migrated its email service to a cloud solution. After the migration, two-th...
- Q409. A hacker used a packet sniffer on the network to capture the hardware address of the serve...
- Q410. A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode...
- Q411. Which of the following protocols uses Dijkstra's algorithm to calculate the LOWEST cost be...
- Q412. Which of the following is MOST likely to generate significant East-West traffic in a datac...
- Q413. Which of the following is the DNS feature that controls how long a lookup is stored in cac...
- Q414. A company wants to set up a backup data center that can become active during a disaster. T...
- Q415. Which of the following does OSPF use to communicate routing updates?...
- Q416. Which of the following policies would be best to refer to when trying to prevent a disgrun...
- Q417. Which of the following would be used to expedite MX record updates to authoritative NSs?...
- Q418. Which of the following authentication methods requires a user to enter a password and scan...
- Q419. Given the following Information: Which of the following would cause performance degradatio...
- Q420. A technician is investigating a misconfiguration on a Layer 3 switch. When the technician ...
- Q421. A Wi-Fi network was recently deployed in a new, multilevel budding. Several issues are now...
- Q422. A network administrator is setting up a new phone system and needs to define the location ...
- Q423. Which of the following physical security methods Is the MOST effective to prevent tailgati...
- Q424. A technician is deploying a new switch model and would like to add it to the existing netw...
- Q425. Which of the following routing protocols should be implemented to create a route between a...
- Q426. A technician discovered that some information on the local database server was changed dur...
- Q427. Which of the following protocols will a security appliance that is correlating network eve...
