Question 1
A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device?
A. IP address
B. Default gateway
C. DNS address
D. Loopback address
Question 2
An architect designs the building blueprint for a new office. The IT team has to purchase equipment and cabling. Upon inspection of the building layout, it is discovered that no designation was made for network infrastructure wiring, cabling, and services for the building. Which of the following needs to be documented in the blueprint for building connectivity?
A. HVAC
B. Server room
C. MDF
D. Mechanical room
Question 3
A network technician has been notified that an available wireless SSID is using insecure WEP encryption and has been asked to investigate what other options are available on the existing wireless hardware. The technician has found that the WAPs support AES-CCMP. Which of the following should the technician configure?
A. WPA2
B. MAC filtering
C. MD5
D. WPS
Question 4
A technician is called to troubleshoot a client PC that is not connecting to the network. The technician first examines the LEDs on the NIC and connection to the wall jack. Then the technician runs a loopback test on the NIC. Which of the following troubleshooting skills is the technician demonstrating?
A. Inductive reasoning
B. OSI model bottom-to-top
C. Trial-and-error
D. Divide and conquer
Question 5
Users within an office building report wireless connectivity is sporadic. A wireless technician troubleshooting the issue notices there are multiple WAPs visible in the same hallway within 20ft (6m) of one another. Which of the following is causing the issue?
A. Incorrect antenna type
B. Interference
C. Frequency mismatch
D. Signal reflection
Question 6
A network technician is tasked with troubleshooting intermittent network connectivity issues within an organization. Which of the following are possible network service issues? (Select TWO).
A. Duplicate IP address
B. Phishing
C. MAC filtering
D. Exhausted DHCP scope
E. NIC teaming
F. Content filter
Question 7
Which of the following components should be used to manage multiple virtual machines existing on one host?
A. Hypervisor
B. Virtual router
C. Virtual switch
D. Virtual NIC
Question 8
Which of the following is aimed at irreversibly damaging and disabling IoT devices?
A. PDoS
B. Spoofing
C. Ransomware
D. Logic bomb
E. MITM
Question 9
In troubleshooting network performance issues on a computer, a technician finds that the CAT5e cable was run through a conduit with power lines. There is plenty of spare room in the conduit, and a cable continuity test is successful. Which of the following is the MOST likely issue?
A. Attenuation
B. Crosstalk
C. Incorrect cable type
D. EMI
E. VLAN misconfiguration
Question 10
One purpose of network segmentation is to:
A. protect sensitive data from the rest of the network.
B. make file transfers easier for end-users.
C. allow certain services to talk to each other without a choke point
D. hold all hardened baseline images for deployment.
Question 1) A. IP address
Question 2) C. MDF
Question 3) A. WPA2
Question 4) B. OSI model bottom-to-top
Question 5) B.Interference
Question 6) A, D. Duplicate IP address, Exhausted DHCP scope
Question 7) A. THypervisor
Question 8) A. PDoS
Question 9) D. EMI
Question 10) A. protect sensitive data from the rest of the network.
Question 1
When logging in to an application, users are prompted to enter a code received from a smartphone application after entering a username and password. Which of the following security concepts does this BEST represent?
A. Biometric authentication
B. Least privilege
C. Role-based access
D. Multifactor authentication
Question 2
Which of the following concepts would MOST likely be used to identify individual pieces of hardware throughout their life cycle?
A. Geofencing
B. Smart locker
C. Chain of custody
D. Asset tagging
Question 3
Which of the following layers is the FIRST step of the bottom-to-top OSI model troubleshooting approach?
A. Network
B. Application
C. Presentation
D. Physical
Question 4
A network technician is responding to an end user who is experiencing issues while trying to connect to 123.com. Other users, however, are able to access the website by the IP address. Which of the following is MOST likely the cause of the issue?
A. DNS
B. DHCP
C. FTP
D. HTTP
Question 5
A new wireless network was implemented with every AP linked to the others to maintain full redundancy for network links. Which of the following BEST describes this network topology?
A. Star
B. Bus
C. Mesh
D. Ring
Question 6
A technician is required to keep all network devices configured to the same system time. Which of the following network protocols will the technician MOST likely use?
A. DNS
B. STP
C. NTP
D. DHCP
Question 7
A device on the network is used to link hosts from multiple subnets and on different VLANs. Which of the following does this MOST likely describe?
A. An access point
B. A hub
C. A proxy server
D. A Layer 3 switch
Question 8
A network technician is trying to determine which hop between a client and a server is causing extreme latency. Which of the following commands will allow the technician to find this information?
A. tracert
B. arp
C. tcpdump
D. netstat
Question 9
During a routine network check, a technician discovers multiple IP addresses recorded in the network logs that are not listed in the company's inventory. None of the devices have wireless network cards. Which of the following would prevent unauthorized devices from gaining access to computer resources?
A. DHCP
B. Geofencing
C. SFTP
D. Port security
Question 10
A technician needs to connect two systems. The only available path for the cabling passes close to some equipment that emits large amounts of interference. Which of the following would be the BEST type of cable to install between the two systems?
A. Crossover
B. Cat 3
C. Shielded twisted pair
D. Plenum-rated
Question 1) D. Multifactor authentication
Question 2) D. Asset tagging
Question 3) D. Physical
Question 4) A. DNS
Question 5) C. Mesh
Question 6) C. NTP
Question 7) D. A Layer 3 switch
Question 8) A. tracert
Question 9) D. Port security
Question 10) C. Shielded twisted pair