DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest CompTIA Network+ N10-008 Exam Questions for Effective Preparation

Ready to elevate your IT infrastructure skills with the CompTIA Network+ N10-008 exam? Our comprehensive collection of 100% real exam questions and answers is tailored to support your success. The CompTIA Network+ certification is your gateway to mastering network troubleshooting, configuration, and management. Our exam questions cover a wide range of topics crucial for Network+ certification, including network protocols, devices, security, and more. We provide valuable exam preparation resources such as study materials and exam guides. These resources are meticulously crafted to help you deepen your understanding of key concepts and optimize your exam readiness. To further enhance your preparation, make use of our mock exams. These practice tests mirror the exam environment, allowing you to assess your knowledge and skills before the actual exam day. With our support, passing the CompTIA Network+ N10-008 exam and earning your certification is within reach.
Take other online exams

Question #1
A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch. Which of the following cable connectors should be used?
A. J45
B. C
C. T
D. -type
View answer
Correct Answer: B
Question #2
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 02
B. TP
C. low control
D. SMA/CD
View answer
Correct Answer: B
Question #3
Which of the following TCP ports is used by the Windows OS for file sharing?
A. 53
B. 389
C. 445
D. 1433
View answer
Correct Answer: C
Question #4
Which of the following describes the BEST device to configure as a DHCP relay?
A. ridge
B. outer
C. ayer 2 switch
D. ub
View answer
Correct Answer: B
Question #5
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?
A. educe the wireless power levels
B. djust the wireless channels
C. nable wireless client isolation
D. nable wireless port security
View answer
Correct Answer: A
Question #6
Which of the following DNS records works as an alias to another record?
A. AAA
B. NAME
C. X
D. OA
View answer
Correct Answer: B
Question #7
Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:
A. n acceptable use policy
B. memorandum of understanding
C. ata loss prevention
D. non-disclosure agreement
View answer
Correct Answer: C
Question #8
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A.
B. GHz
C. GHz
D. 00MHz
View answer
Correct Answer: B
Question #9
Which of the following can be used to validate domain ownership by verifying the presence of pre-agreed content contained in a DNS record?
A. OA
B. RV
C. AA
D. XT
View answer
Correct Answer: D
Question #10
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
A. 0
B. 27
C. 92
D. 55
View answer
Correct Answer: B
Question #11
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. nternet Control Message Protocol
B. everse Address Resolution Protocol
C. ynamic Host Configuration Protocol
D. nternet Message Access Protocol
View answer
Correct Answer: B
Question #12
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
A. HCP snooping
B. eofencing
C. ort security
D. ecure SNMP
View answer
Correct Answer: C
Question #13
A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?
A. isabling unneeded switchports
B. hanging the default VLAN
C. onfiguring DHCP snooping
D. riting ACLs to prevent access to the switch
View answer
Correct Answer: A
Question #14
Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model?
A. PN
B. RRP
C. Switch
D. IP
View answer
Correct Answer: C
Question #15
A network administrator has received calls every day for the past few weeks from three users who cannot access the network. The administrator asks all the users to reboot their PCs, but the same users still cannot access the system. The following day, three different users report the same issue, and the administrator asks them all to reboot their PCs; however, this does not fix the issue. Which of the following is MOST likely occurring?
A. ncorrect firewall settings
B. nappropriate VLAN assignment
C. ardware failure
D. verloaded CAM table in switch
E. HCP scope exhaustion
View answer
Correct Answer: E
Question #16
A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse.Which of the following is the MOST likely cause of this issue?
A. he nearest APs are configured for 802
B. n incorrect channel assignment is on the nearest APs
C. he power level is too high for the AP on the far side
D. nterference exists around the AP on the far side
View answer
Correct Answer: C
Question #17
Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?
A. raffic shaping
B. raffic policing
C. raffic marking
D. raffic classification
View answer
Correct Answer: A
Question #18
At which of the following OSI model layers would a technician find an IP header?
A. ayer 1
B. ayer 2
C. ayer 3
D. ayer 4
View answer
Correct Answer: C
Question #19
A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?
A. ink aggregation
B. umbo frames
C. ort security
D. low control
E. ower FTP port
View answer
Correct Answer: B
Question #20
A network administrator needs to configure a server to use the most accurate NTP reference available. Which of the following NTP devices should the administrator select?
A. tratum 1
B. tratum 2
C. tratum 3
D. tratum 4
View answer
Correct Answer: A
Question #21
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. nternet Control Message Protocol
B. everse Address Resolution Protocol
C. ynamic Host Configuration Protocol
D. nternet Message Access Protocol
View answer
Correct Answer: B
Question #22
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: C
Question #23
A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?
A. DMA
B. SMA/CD
C. SMA/CA
D. SM
View answer
Correct Answer: C
Question #24
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:-Device-LC/LC patch cable -Patch panel-Cross-connect fiber cable -Patch panel-LC/LC patch cable -SwitchThe connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed.
A. X/RX is reversed
B. n incorrect cable was used
C. he device failed during installation
D. ttenuation is occurring
View answer
Correct Answer: A
Question #25
A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?
A. HCP exhaustion
B. rogue DHCP server
C. DNS server outage
D. n incorrect subnet mask
View answer
Correct Answer: B
Question #26
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. otion detection
B. ccess control vestibules
C. mart lockers
D. ameras
View answer
Correct Answer: B
Question #27
Within the realm of network security, Zero Trust:
A. revents attackers from moving laterally through a system
B. llows a server to communicate with outside networks without a firewall
C. lock malicious software that is too new to be found in virus definitions
D. tops infected files from being downloaded via websites
View answer
Correct Answer: A
Question #28
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
A. etFlow analyzer
B. andwidth analyzer
C. rotocol analyzer
D. pectrum analyzer
View answer
Correct Answer: D
Question #29
SIMULATIONYou have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: -The SSIDs need to be configured as CorpNet with a key of S3cr3t!-The wireless signals should not interfere with each other-The subnet the Access Points and switch are on should only support 30 devices maximum -The Access Points should be configured to only support TKIP clients at a maximum speedINSTRUCTONSClick on th
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #30
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceroute from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings?
A. symmetric routing
B. routing loop
C. switch loop
D. n incorrect gateway
View answer
Correct Answer: A
Question #31
Which of the following describes traffic going in and out of a data center from the internet?
A. emarcation point
B. orth-South
C. ibre Channel
D. pine and leaf
View answer
Correct Answer: B
Question #32
Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?
A. ata link
B. etwork
C. ransport
D. ession
View answer
Correct Answer: A
Question #33
Which of the following must be functioning properly in order for a network administrator to create an accurate timeline during a troubleshooting process?
A. TP
B. P helper
C. yslog
D. ySQL
View answer
Correct Answer: A
Question #34
A technician recently set up a small office network for nine users. When the installation was complete, all the computers on the network showed addresses ranging from 169.254.0.0 to 169.254.255.255. Which of the following types of address ranges does this represent?
A. rivate
B. ublic
C. PIPA
D. lassless
View answer
Correct Answer: C
Question #35
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
A. eplication traffic between an on-premises server and a remote backup facility
B. raffic between VMs running on different hosts
C. oncurrent connections generated by Internet DDoS attacks
D. PN traffic from remote offices to the datacenter’s VMs
View answer
Correct Answer: A
Question #36
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
A. IC teaming
B. oad balancer
C. AID array
D. DUs
View answer
Correct Answer: A
Question #37
An auditor assessing network best practices was able to connect a rogue switch into a network jack and get network connectivity. Which of the following controls would BEST address this risk?
A. ctivate port security on the switchports providing end user access
B. eactivate Spanning Tree Protocol on network interfaces that are facing public areas
C. isable Neighbor Resolution Protocol in the Layer 2 devices
D. nsure port tagging is in place for network interfaces in guest areas
View answer
Correct Answer: A
Question #38
A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?
A.
B. AAA
C. NAME
D. TR
View answer
Correct Answer: A
Question #39
A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?
A. TP
B. FTP
C. MTP
D. FTP
View answer
Correct Answer: D
Question #40
An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern's work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?
A. nsufficient power at the antennas
B. oE and UTP incompatibility
C. lectromagnetic interference
D. rong cable pinout
View answer
Correct Answer: C
Question #41
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?
A. lientless VPN
B. irtual desktop
C. irtual network computing
D. GRE tunnel
View answer
Correct Answer: A
Question #42
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to downWhich of the following describes the reason why the events are not being received?
A. he network device is not configured to log that level to the syslog server
B. he network device was down and could not send the event
C. he syslog server is not compatible with the network device
D. he syslog server did not have the correct MIB loaded to receive the message
View answer
Correct Answer: A
Question #43
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
A. lient-to-site VPN
B. lientless VPN
C. DP
D. ite-to-site VPN
E. SH
View answer
Correct Answer: D
Question #44
A user is having difficulty with video conferencing and is looking for assistance. Which of the following would BEST improve performance?
A. acket shaping
B. uality of service
C. ort mirroring
D. oad balancing
View answer
Correct Answer: B
Question #45
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. ST
B. IN
C. CMP Time Exceeded
D. edirect
View answer
Correct Answer: A
Question #46
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
A. anagement information bases
B. ystem baseline
C. etwork device logs
D. NMP traps
View answer
Correct Answer: A
Question #47
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
A. dd another AP
B. isable the 2
C. nable channel bonding
D. pgrade to WiFi 5
View answer
Correct Answer: C
Question #48
Users are reporting intermittent WiFi connectivity in a specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Choose two.)
A. unneling
B. ulticast routing
C. etwork address translation
D. outer advertisement
View answer
Correct Answer: AC
Question #49
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. ut-of-band access
B. plit-tunnel connections
C. irtual network computing
D. emote desktop gateways
View answer
Correct Answer: A
Question #50
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
A. etwork access control
B. east privilege
C. ultifactor authentication
D. eparation of duties
View answer
Correct Answer: B
Question #51
After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information?
A. NMP OID values
B. etFlow data export
C. etwork baseline configurations
D. ecurity information and event management
View answer
Correct Answer: D
Question #52
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a newDHCP pool. Which of the following can the administrator perform to resolve the issue?
A. panning Tree Protocol
B. eighbor Discovery Protocol
C. ink Aggregation Control Protocol
D. ddress Resolution Protocol
View answer
Correct Answer: D
Question #53
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
A. nstall load balancers
B. nstall more switches
C. ecrease the number of VLANs
D. educe the lease time
View answer
Correct Answer: AB
Question #54
A network engineer developed a plan of action to resolve an ongoing issue. Which of the following steps should the engineer take NEXT?
A. erify full system functionality and implement preventative measures
B. mplement the solution to resolve the problem
C. ocument findings, actions, outcomes, and lessons learned
D. stablish a theory of probable cause
View answer
Correct Answer: B
Question #55
A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause?
A. ID duplication
B. IB mismatch
C. PU usage
D. ncapsulation errors
View answer
Correct Answer: C
Question #56
Which of the following is used to provide disaster recovery capabilities to spin up all critical devices using internet resources?
A. loud site
B. ot site
C. old site
D. arm site
View answer
Correct Answer: A
Question #57
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
A. 02
B. 02
C. 02
D. 02
View answer
Correct Answer: B
Question #58
A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?
A. TBF
B. TTR
C. PO
D. TO
View answer
Correct Answer: A
Question #59
A network administrator is talking to different vendors about acquiring technology to support a new project for a large company. Which of the following documents will MOST likely need to be signed before information about the project is shared?
A. YOD policy
B. DA
C. LA
D. OU
View answer
Correct Answer: B
Question #60
A network administrator is reviewing the following metrics from a network management system regarding a switchport. The administrator suspects an issue because users are calling in regards to the switch port's performance:Based on the information in the chart above, which of the following is the cause of these performance issues?
A. he connected device is exceeding the configured MTU
B. he connected device is sending too many packets
C. he switchport has been up for too long
D. he connected device is receiving too many packets
E. he switchport does not have enough CRCs
View answer
Correct Answer: A
Question #61
A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remotelocation to connect rogue devices and gain access to the organization's resources. Which of the following techniques would BEST address the concern?
A. onfigure port security using MAC filtering
B. anually register the cameras on the switch address table
C. ctivate PoE+ on the active switchports
D. isable Neighbor Discovery Protocol on the switch
View answer
Correct Answer: A
Question #62
A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests?
A. panning Tree Protocol
B. pen Shortest Path First
C. ort mirroring
D. n interior gateway protocol
View answer
Correct Answer: B
Question #63
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Choose two.)
A. 72
B. 72
C. 72
D. 72
View answer
Correct Answer: BC
Question #64
A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task?
A. racert
B. pconfig
C. etstat
D. slookup
View answer
Correct Answer: C
Question #65
Which of the following would MOST likely utilize PoE?
A. camera
B. printer
C. hub
D. modem
View answer
Correct Answer: A
Question #66
A network administrator is trying to add network redundancy for the server farm. Which of the following can the network administrator configure to BEST provide this capability?
A. RRP
B. NS
C. PS
D. PO
View answer
Correct Answer: A
Question #67
A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?
A. how interface
B. how config
C. how route
D. how arp
View answer
Correct Answer: A
Question #68
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A. vil twin
B. ailgating
C. iggybacking
D. houlder surfing
View answer
Correct Answer: B
Question #69
The following DHCP scope was configured for a new VLAN dedicated to a large deployment of 325 IoT sensors:The first 244 IoT sensors were able to connect to the TFTP server, download the configuration file, and register to an IoT management system. The other sensors are being shown as offline. Which of the following should be performed to determine the MOST likely cause of the partial deployment of the sensors?
A. heck the gateway connectivity to the TFTP server
B. heck the DHCP network scope
C. heck whether the NTP server is online
D. heck the IoT devices for a hardware failure
View answer
Correct Answer: B
Question #70
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
A. aaS
B. aaS
C. aaS
D. isaster recovery as a Service (DRaaS)
View answer
Correct Answer: B
Question #71
An employee reports to a network administrator that internet access is not working. Which of the following should the administrator do FIRST?
A. stablish a theory of probable cause
B. dentify symptoms
C. etermine if anything has changed
D. sk the user to restart the computer
View answer
Correct Answer: C
Question #72
An employee working in a warehouse facility is experiencing interruptions in mobile applications while walking around the facility. According to a recent site survey, the WLAN comprises autonomous APs that are directly connected to the internet, providing adequate signal coverage. Which of the following is the BEST solution to improve network stability?
A. mplement client roaming using an extended service deployment employing a wireless controller
B. emove omnidirectional antennas and adopt a directional bridge
C. nsure all APs of the warehouse support MIMO and Wi-Fi 4
D. erify that the level of EIRP power settings is set to the maximum permitted by regulations
View answer
Correct Answer: A
Question #73
A technician manages a DHCP scope but needs to allocate a portion of the scope’s subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?
A. ynamic assignment
B. xclusion range
C. ddress reservation
D. P helper
View answer
Correct Answer: B
Question #74
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?
A. ig
B. rp
C. howinterface
D. ostname
View answer
Correct Answer: A
Question #75
Which of the following documents would be used to define uptime commitments from a provider, along with details on measurement and enforcement?
A. DA
B. LA
C. OU
D. UP
View answer
Correct Answer: B
Question #76
An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF?
A. emperature
B. umidity
C. moke
D. lectrical
View answer
Correct Answer: B
Question #77
A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?
A. slookup
B. etstat -a
C. pconfig /a
D. rp -a
View answer
Correct Answer: B
Question #78
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?
A. ncreased CRC errors
B. ncreased giants and runts
C. ncreased switching loops
D. ncreased device temperature
View answer
Correct Answer: A
Question #79
A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?
A. utomate a continuous backup and restore process of the system's state of the active gateway
B. se a static assignment of the gateway IP address on the network clients
C. onfigure DHCP relay and allow clients to receive a new IP setting
D. onfigure a shared VIP and deploy VRRP on the routers
View answer
Correct Answer: A
Question #80
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
A. irewall
B. P
C. roxy server
D. DS
View answer
Correct Answer: D
Question #81
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy's requirements?
A. ecover all systems to a loss of 48 hours of data
B. imit network downtime to a maximum of 48 hours per year
C. ecover all systems within 48 hours
D. equire 48 hours of system backup maintenance
View answer
Correct Answer: C
Question #82
A network administrator needs to implement an HDMI over IP solution. Which of the following will the networkadministrator MOST likely use to ensure smooth video delivery?
A. ink aggregation control
B. ort tagging
C. umbo frames
D. edia access control
View answer
Correct Answer: C
Question #83
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?
A. oad balancing
B. eofencing
C. ublic cloud
D. ontent delivery network
E. nfrastructure as a service
View answer
Correct Answer: D
Question #84
A security engineer is installing a new IDS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?
A. nstall a network tap for the IDS
B. onfigure ACLs to route traffic to the IDS
C. nstall an additional NIC into the IDS
D. nstall a loopback adapter for the IDS
E. dd an additional route on the router for the IDS
View answer
Correct Answer: A
Question #85
Which of the following transceiver types can support up to 40Gbps?
A. FP+
B. SFP+
C. SFP
D. FP
View answer
Correct Answer: B
Question #86
A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used?
A. ivide-and-conquer
B. op-to-bottom
C. ottom-to-top
D. etermine if anything changed
View answer
Correct Answer: A
Question #87
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
View answer
Correct Answer: A
Question #88
Which of the following technologies provides a failover mechanism for the default gateway?
A. HRP
B. ACP
C. SPF
D. TP
View answer
Correct Answer: A
Question #89
A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?
A. ingle-mode
B. oaxial
C. at 6a
D. winaxial
View answer
Correct Answer: A
Question #90
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?
A. etwork address translation
B. efault gateway
C. oopback
D. outing protocol
View answer
Correct Answer: B
Question #91
A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application. Which of the following actions will BEST support the administrator's response?
A. enerate a network baseline report for comparison
B. xport the firewall traffic logs
C. ollect the router's NetFlow data
D. lot interface statistics for dropped packets
View answer
Correct Answer: C
Question #92
Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network?
A. ayer 1
B. ayer 3
C. ayer 6
D. ayer 7
View answer
Correct Answer: C
Question #93
Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time?
A. sing a tone generator and wire map to determine the fault location
B. sing a multimeter to locate the fault point
C. sing an OTDR in one end of the optic cable to get the fiber length information
D. sing a spectrum analyzer and comparing the current wavelength with a working baseline
View answer
Correct Answer: C
Question #94
At which of the following OSI model layers would a technician find an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
View answer
Correct Answer: C
Question #95
Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?
A. ulnerability assessment
B. actory reset
C. irmware update
D. creened subnet
View answer
Correct Answer: C
Question #96
A technician is configuring a static IP address on a new device in a newly created subnet. The work order specifies the following requirements:•The IP address should use the highest address available in the subnet.•The default gateway needs to be set to 172.28.85.94.•The subnet mask needs to be 255.255.255.224.Which of the following addresses should the engineer apply to the device?
A. un diagnostics on the relevant devices
B. ove the access point to a different location
C. scalate the issue to the vendor's support team
D. emove any electronics that might be causing interference
View answer
Correct Answer: A
Question #97
Which of the following ports should be used to securely receive mail that is synchronized across multiple devices?
A. 5
B. 10
C. 43
D. 93
View answer
Correct Answer: D
Question #98
A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?
A. old site
B. ot site
C. arm site
D. loud site
View answer
Correct Answer: C
Question #99
Which of the following devices have the capability to allow communication between two different subnetworks? (Choose two.)
A. SO
B. DAP
C. AP
D. ACACS+
View answer
Correct Answer: DE
Question #100
Which of the following is a benefit of the spine-and-leaf network topology?
A. ncreased network security
B. table network latency
C. implified network management
D. liminated need for inter-VLAN routing
View answer
Correct Answer: B
Question #101
Which of the following is the physical topology for an Ethernet LAN?
A. us
B. ing
C. esh
D. tar
View answer
Correct Answer: D
Question #102
A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?
A. ireless client isolation
B. ort security
C. evice geofencing
D. HCP snooping
View answer
Correct Answer: A
Question #103
The following configuration is applied to a DHCP server connected to a VPN concentrator:There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?
A. ecrease the lease duration
B. eboot the DHCP server
C. nstall a new VPN concentrator
D. onfigure a new router
View answer
Correct Answer: A
Question #104
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
A. yslog server messages
B. IB of the attacked firewall
C. etwork baseline reports
D. etFlow aggregate data
View answer
Correct Answer: A
Question #105
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
A. irus
B. otnet
C. RP spoofing
D. DoS
View answer
Correct Answer: D
Question #106
A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use?
A. GP
B. IPv2
C. SPF
D. IGRP
View answer
Correct Answer: A
Question #107
An administrator is working with the local ISP to troubleshoot an issue. Which of the following should the ISP use to define the furthest point on the network that the administrator is responsible for troubleshooting?
A. irewall
B. CSU/DSU
C. emarcation point
D. outer
E. atch panel
View answer
Correct Answer: D
Question #108
Which of the following services can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices?
A. aaS
B. aaS
C. aaS
D. aaS
View answer
Correct Answer: B
Question #109
Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
A. etstat -a
B. fconfig
C. p addr
D. pconfig /all
View answer
Correct Answer: D
Question #110
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:Which of the following metrics confirms there is a cabling issue?
A. ast cleared
B. umber of packets output
C. RCs
D. iants
E. ulticasts
View answer
Correct Answer: C
Question #111
Which of the following is the physical security mechanism that would MOST likely be used to enter a secure site?
A. landing page
B. n access control vestibule
C. smart locker
D. firewall
View answer
Correct Answer: B
Question #112
The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?
A. n incident response plan
B. business continuity plan
C. change management policy
D. n acceptable use policy
View answer
Correct Answer: C
Question #113
A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network?
A. nsure all guests sign an ND
B. isable unneeded switchports in the area
C. ower the radio strength to reduce Wi-Fi coverage in the waiting area
D. nable MAC filtering to block unknown hardware addresses
View answer
Correct Answer: B
Question #114
A company is being acquired by a large corporation. As part of the acquisition process, the company's address should now redirect clients to the corporate organization page. Which of the following DNS records needs to be created?
A. OA
B. S
C. NAME
D. XT
View answer
Correct Answer: C
Question #115
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
A. SO
B. ACACS+
C. ero Trust
D. eparation of duties
E. ultifactor authentication
View answer
Correct Answer: B
Question #116
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
A. ES encryption
B. hannel to the highest frequency within the band
C. KIP encryption protocol
D. ynamic selection of the frequency
View answer
Correct Answer: A
Question #117
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication
View answer
Correct Answer: B
Question #118
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information.Which of the following actions should the network technician take to prevent data loss?
A. isable the user account
B. ock the phone
C. urn off the service
D. xecute remote wipe
View answer
Correct Answer: D
Question #119
A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks.Which of the following would be BEST for the administrator to purchase?
A. etection
B. ecovery
C. dentification
D. revention
View answer
Correct Answer: B
Question #120
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. isabling unneeded switchports
B. mplementing role-based access
C. hanging the default passwords
D. onfiguring an access control list
View answer
Correct Answer: B
Question #121
Which of the following network devices can perform routing between VLANs?
A. ayer 2 switch
B. ayer 3 switch
C. oad balancer
D. ridge
View answer
Correct Answer: B
Question #122
A network administrator is planning a WLAN for a soccer stadium and was advised to use MU-MIMO to improve connection performance in high-density areas.The project requires compatibility with clients connecting using 2.4GHz or 5GHz frequencies. Which of the following would be the BEST wireless standard for this project?
A. 02
B. 02
C. 02
D. 02
View answer
Correct Answer: B
Question #123
A Chief Executive Officer and a network administrator came to an agreement with a vendor to purchase new equipment for the data center. A document was drafted so all parties would be informed about the scope of the project before it started. Which of the following terms BEST describes the document used?
A. ontract
B. roject charter
C. emorandum of understanding
D. on-disclosure agreement
View answer
Correct Answer: C
Question #124
A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1 Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.Which of the following is the MOST likely cause for the failure?
A. he network engineer is using the wrong protocol
B. he network engineer does not have permission to configure the device
C. NMP has been secured with an ACL
D. he switchport the engineer is trying to configure is down
View answer
Correct Answer: A
Question #125
A network technician at a university is assisting with the planning of a simultaneous software deployment to multiple computers in one classroom in a building.Which of the following would be BEST to use?
A. ulticast
B. nycast
C. nicast
D. roadcast
View answer
Correct Answer: A
Question #126
Which of the following transceiver types can support up to 40Gbps?
A. SFP+
B. QSFP+
C. QSFP
D. SFP
View answer
Correct Answer: B
Question #127
A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?
A. isable unneeded ports
B. isable SSH service
C. isable MAC filtering
D. isable port security
View answer
Correct Answer: A
Question #128
A network administrator installed a new data and VoIP network. Users are now experiencing poor call quality when making calls. Which of the following should the administrator do to increase VoIP performance?
A. onfigure a voice VLAN
B. onfigure LACP on all VoIP phones
C. onfigure PoE on the network
D. onfigure jumbo frames on the network
View answer
Correct Answer: A
Question #129
Which of the following attacks encrypts user data and requires a proper backup implementation to recover?
A. DoS
B. hishing
C. ansomware
D. AC spoofing
View answer
Correct Answer: C
Question #130
A corporation is looking for a method to secure all traffic between a branch office and its data center in order to provide a zero-touch experience for all staff members who work there. Which of the following would BEST meet this requirement?
A. ite-to-site VPN
B. NC
C. emote desktop gateway
D. irtual LANs
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: