7. You have been tasked with testing a CAT5 cable. A summary of the test results can be found on the following table. Which tool was used to create the cable test results? (ID-NTIA-509) Show
A. Protocol Analyzer Question 7 Explanation: The test results indicate incorrectly crimped cable. 8. The DOCSIS (specification) is used by which for the following Internet connection types? (ID-NTIA-169) Question 8 Explanation: Data Over Cable Service Interface Specification (DOCSIS) 9. A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause? (ID-NTIA-530) 10. A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the most likely problem? (ID-NTIA-470) 11. A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this? (ID-NTIA-270) 12. A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network? (ID-NTIA-303) 13. A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser. Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the firewall’s WAN port? Choose all the correct answers. (ID-NTIA-153) Question 13 Explanation: SMTPS (mail) port is 587 or 465 and HTTPS (web access) is 443. 14. To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would best allow this to happen? (ID-NTIA-358) 15. A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP? (ID-NTIA-476) Question 15 Explanation: 64-Bit Extended Unique Identifier (EUI-64) 16. A network technician of an Internet Service Provider(ISP) was told that one of their customers cannot access the Internet. Upon investigation, the technician realized the customer has added a router, a day before, behind their ISP provided modem/router combo unit in order to increase the number of LAN ports. Which of the following has the user most likely introduced to the network? (ID-NTIA-154) Question 16 Explanation: If the customer wants to use their own router, the modem/router combo unit must be set to bridge mode (sometimes call passthrough mode). 17. A network technician is setting up the wireless network for a company’s new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs? (ID-NTIA-284) 18. Which of the following connector types was typically associated with a T-connector attached to the computer? (ID-NTIA-09) 19. Answer the following question based on the network diagram below. You were hired as an IT consultant and told to improve the following network. What might be something that you would recommend? Click on the image if it is hard to read. (ID-NTIA-37) A. Add a firewall between the domain controller and the router. B. Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. C. Add additional printers across both NATs. D. Remove the firewall between the Internet/modem and the router. 20. Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this? (ID-NTIA-197) 21. A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing? (ID-NTIA-308) 22. A technician replaced a malfunctioning network switch with an identical new switch from the same vendor. The model and hardware version of the new switch matched the broken unit. The technician extracts the config files from the old unit and installs it on the new unit. After installation, the new switch boot up and shuts down itself. Considering that the hardware is identical, which of the following is the most likely cause of the failure? (ID-NTIA-161) Question 22 Explanation: In my experience, you always take a risk when you migrate a firmware config files from one unit to another even when hardware versions match. If you have the time, it is sometimes better to reconfigure firmware of network equipment rather than loading from a backup on new equipment. The backups are useful when you need to reload the firmware to the same hardware. 23. Which of the following authentication methods is most secure? (ID-NTIA-517) 24. Which of the cabling types listed below is the most susceptible to EMI/RFI? (ID-NTIA-239) 25. In the following diagram, what is the type of optical fiber connector illustrated by II? (ID-NTIA-446) A. SC B. MT-RJ C. LC D. ST 26. A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network since he has full access to network resources. Which of the following attacks is described? (ID-NTIA-325) 27. A wireless client is having issues staying connected to the wireless network even though the client is less than 20ft (6m) from the access point. Which if the following is most likely the cause? (ID-NTIA-534) 28. Which of the following bridging types has never been used on Ethernet local area networks (LANs)? (ID-NTIA-87) 29. A bookstore uses a Faraday cage to comply with credit card regulations. Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the most likely cause? (ID-NTIA-251) 30. Which of the following wide-area networking (WAN) services provides the fastest transfer rate? (ID-NTIA-168) 31. A network technician has purchased a 10GBase-T switch and wishes to connect it to 30 computers with 10GB network cards. The computers are 225ft (69m) away, and all need to establish a 10 Gbps connection to meet business requirements. To minimize costs while still meeting these requirements, which of the following cable types should the technician choose? (ID-NTIA-264) 32. Which of the following protocols is used by Active Directory for authentication? (ID-NTIA-289) 33. A Chief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the company’s network devices. Which of the following is the most secure way to prevent this? (ID-NTIA-411) 34. A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization’s certificate authority. Which of the following authentication methods would meet this requirement? (ID-NTIA-252) Question 34 Explanation: Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) 35. Which of the answers listed below refers to a possible symptom of exhausted DHCP scope? (ID-NTIA-231) Question 35 Explanation: APIPA (Automatic Private IP Addressing) is issued when DHCP IP addresses being used and the new network device cannot obtain an IP. 36. An 801.11g wireless access point was configured as follows: (ID-NTIA-465) 37. A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this? (ID-NTIA-475) 38. A network engineer at a government agency is restricting Internet browsing on the corporate WAN to only government-related external websites. Which of the following is the best solution to achieve this goal while avoiding the need to configure this restriction on each PC? (ID-NTIA-185) 39. A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of ____________. (ID-NTIA-147) 40. A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will best ensure unauthorized devices cannot consume the shop owner’s limited Internet bandwidth? (ID-NTIA-268) 41. A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would most likely utilize to check the branch office’s router status? (ID-NTIA-155) 42. What connector would you use with RS-232? (ID-NTIA-118) Explanation: DB9 and DB15 style connectors are also used in VGA monitors. 43. Which of the following solution sets properly addresses all of the identified requirements below? (ID-NTIA-221) 44. A network support specialist is setting up wireless networks for several small companies that are leasing adjacent spaces in an office building. The network support specialist has already configured an access point for each office with WPA2-AES encryption and minimized any overlap of the wireless channels. Several of the companies have expressed concerns about performance and security issues due to the high volume of wireless networks being installed in close proximity. Which of the following actions will best mitigate the companies’ concerns? (ID-NTIA-242) 45. A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is most likely the issue? (ID-NTIA-315) 46. An NGFW alerts that a web server in the DMZ is sending suspicious traffic. A network administrator finds that port 25 is open, and the traffic is originating from this port. The only purpose of this server is to deliver website traffic. Which of the following should the network administrator recommend to the systems administrator? (ID-NTIA-392) 47. A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement? (ID-NTIA-265) 48. Which of the following technique can be used to scan multiple computers on a network for an open TCP or UDP port? (ID-NTIA-104) 49. A request is made to open an additional port on a firewall. The request is approved, and the port is opened. Which of the following BEST describes this process? (ID-NTIA-183) 50. During a weekend event, several people reported they were unable to get onto the wireless network. On Monday, the technician could not find a problem. Which of the following is the most likely cause? (ID-NTIA-194) 51. An assistant systems analyst reports the following findings of an investigation of slow Internet connections in a remote office to the senior systems analyst: (ID-NTIA-369) Which of the following devices is causing the issue? A. Switch 1 B. Router C. Firewall D. Switch 2 52. A network administrator needs to transmit traffic to geographically diverse sites to improve performance. Which of the following devices would BEST direct traffic to the remote sites? (ID-NTIA-370) 53. A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network? (ID-NTIA-297) 54. Which of the following operate only within the UDP protocol? (ID-NTIA-322) 55. Which of the following network topologies typically has all devices on a network directly connected to every other network device? (ID-NTIA-206) 56. A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues? (ID-NTIA-144) Question 56 Explanation:This question is extracted word-to-word from a real N10-007 exam from CompTIA. Some argue the answer should be EMI from the lights is interfering with the network cables. If the wires come in contact with one another it will cause interference, in this case, they are running one over the other instead of side by side which would eliminate the interference.. 57. Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? (ID-NTIA-529) 58. A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements? (ID-NTIA-427) 59. A network manager is concerned about visitors taking advantage of open cubicles at a company’s facilities. Which of the following would mitigate this issue? (ID-NTIA-246) 60. Which of the following should be implemented in a networked environment carrying teleconferencing packets? (ID-NTIA-457) 61. When querying a DNS server for an AAAA record, which of the following is an appropriate response? (ID-NTIA-474) 62. A government employee breaches privacy by accessing server data without permission and as a result, his employment contract was terminated abruptly. Which of the following IT policies would best describe this situation? (ID-NTIA-203) 63. A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced? (ID-NTIA-416) 64. A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies was created? (ID-NTIA-347) 65. A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug? (ID-NTIA-336) 66. VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices? (ID-NTIA-33) 67. Which network topology requires the installation of terminating resistors at two locations? (ID-NTIA-73) 68. A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss? (ID-NTIA-397) 69. Which of the following is a feature on high availability systems that enables them to automatically detect problems and react to them? (ID-NTIA-27) Question 69 Explanation:Failover has been a typical automated feature of high availability systems for a long time. However, backups and cold sites are also features of high avialability syetems, but not automaically reactive. 70. Which of the following is a proprietary routing protocol? (ID-NTIA-489) Question 70 Explanation: Enhanced Interior Gateway Routing Protocol (EIGRP) 71. Which of the following can be used to prevent unauthorized employees from entering restricted areas? (ID-NTIA-253) 72. A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network? (ID-NTIA-291) 73. The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network-related Which of the following should the technician do to improve performance? (ID-NTIA-165) 74. Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer? (ID-NTIA-491) 75. A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use? (ID-NTIA-164) 76. A technician has a remote site that often has congestion issues. When this happens, the remote router cannot be managed using SSH because the session drops. Which of the following is a possible solution to the issue? (ID-NTIA-480) 77. The phone company has provided a channelized T1 line. Which of the following should this line be connected to? (ID-NTIA-493) 78. Which of the following is the best option for controlling and limiting users from accessing resources on the Internet using your companies network? (ID-NTIA-215) 79. Which of the following is associated with the technique for prioritizing traffic by tagging packets based on their content? (ID-NTIA-90) 80. Which of the following BEST describes the Border Gateway Protocol (BGP) routing protocol? (ID-NTIA-401) 81. Due to the COVID-19 pandemic, the IT department received a shipment of 100 laptops and docking stations. The first action the IT department took is to affix stickers with scannable barcodes to each device. Then the barcode information is linked with specific user biodata. before deploying them to the end-users. This procedure can be best described as ______________. (ID-NTIA-59) 82. Which of the following is the most secure type of remote administration? (ID-NTIA-295) 83. A system administrator receives reports from users of odd behavior in regard to a recently installed server. While reviewing the server network configuration, the system administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration. Which of the following is the problem identified in the output below? (ID-NTIA-374) A. The reverse DNS entry is pointing to a different host B. The DNS lookup entry is incorrectly configured C. There is no reverse DNS entry for this host D. The server IP address is incorrectly configured 84. Which of the following can a network administrator use to access a network switch using standard AAA configurations? (ID-NTIA-192) 85. Which of the following command-line utilities can only run on Unix and Linux systems? (ID-NTIA-20)< 86. Which of the following uses types and codes rather than ports? (ID-NTIA-473) Question 86 Explanation:Internet Control Message Protocol (ICMP) 87. You are tasked with creating a network that will accomplish the following requirements for company A. (ID-NTIA-507) According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge. A. Layer 2 at C8 and Layer 3 at C6 B. Layer 2 at C7 and Layer 3 at C6 C. Layer 2 at C10 and Layer 3 at C12 D. Layer 2 at C5 and Layer 3 at C6 E. Layer 2 at C6 and Layer 3 at C6 88. The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would best assist the security manager in identifying systems involved in security incidents? (ID-NTIA-352) 88 Explanation:Universal Naming Convention (UNC) 89. Users report that they are unable to access the production server with IP address 192.168.30.17. These users need to be provided access without changing any subnet to VLAN information. The VLANs configured on the network are listed below: (ID-NTIA-484) 90. In which of the following scenarios should a technician use a cross-over cable to provide connectivity? (ID-NTIA-408) 91. A hacker uses a port scanner to penetrate your organization’s IT systems. Vulnerabilities at which layer of the Open Systems Interconnection (OSI) model is used for this exploit? (ID-NTIA-108) 92. Which of the following can be done to implement network device hardening? Choose all correct answers. (ID-NTIA-128) 93. Which of the following, originally created for the UNIX sendmail program, is now a standard for message logging that enables tools that generate, store, and analyze log information to work together? (ID-NTIA-22) 94. A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used? (ID-NTIA-431) 95. A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do first? (ID-NTIA-359) 96. A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following? (ID-NTIA-495) 97. When connecting two switches together in a LAN, which of the following protocols should you use to increase speed and fault tolerance? (ID-NTIA-141) Question 97 Explanation:Link Aggregation Control Protocol (LACP) 98. What topology is used when devices are connected in a LAN via an Ethernet switch? (ID-NTIA-117) 99. Which of the following signal types is carried by copper cable? (ID-NTIA-66) 100. A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? Choose all correct answers. (ID-NTIA-533) 101. A company is expanding and building a new remote branch office. Marketing will need 78 IP addresses, finance will need 150 IP addresses, legal will need 39 IP addresses, and R&D will need 12 IP addresses. The network administrator gives the technician a network of 172.16.48.0/23 and wants the technician to use VLSM for the design. Which of the following are possible solutions? Choose three answers. (ID-NTIA-211) 102. A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest? (ID-NTIA-204) 103. A VoIP system will require 23 concurrent voice channels and one signaling channel. Which of the following types of WAN service would provide the best connectivity to the PSTN? (ID-NTIA-134) Question 103 Explanation:PRI (Primary Rate Interface) 104. Which of the following switch types immediately forwards frames after looking at only the destination address? (ID-NTIA-43) 105. Which of the following is not one of the functions provided by TACACS+? (ID-NTIA-76) Question 105 Explanation:Terminal Access Controller Access Control System Plus (TACACS+) 106. Which of the following storage network technologies has the HIGHEST throughput? (ID-NTIA-275) Question 107. What is the function of the tool shown in the following figure? (ID-NTIA-505) Image Credit: https://www.amazon.ca/ A. Used to terminate a cable at a 110 block. B. Used to verify functionality after a NIC is installed. C. Used to determine which port a CAT6 cable is connected. D. Used to correct open short on a cable. E. Used to verify known good patch cables. Question 107 Explanation:Network Cable Tester Question 108. What type of network application would you expect to find the following connector? Click on image to enlarge. (ID-NTIA-443) A. A network built with Mesh Topology B. A network built with Logical Topology C. A network built with Ring Topology D. A network built with Star Topology E. A network built with Bus Topology 109. A technician notices clients are receiving a 169.254.x.x IP address following the upgrade of a server. Which of the following ports should the technician check on the local server firewall? (ID-NTIA-371) Question 109 Explanation:Ports 67 and 68 are used by DHCP and 169.254.x.x IP addresses are APIPAs. 110. When a service fails to start on a Windows server, an entry is typically created in which of the following event logs? (ID-NTIA-65) 111. What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive? (ID-NTIA-101) 112. A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers. Which of the following represents the BEST configuration for the remote site? (ID-NTIA-334) 113. In the Open Systems Interconnection (OSI) model, where would the sublayer Media Access Control (MAC) fall under? (ID-NTIA-75) 114. A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources such as network drives to perform her job. Which of the following would provide secure access to corporate resources? (ID-NTIA-405) 115. Which of the following is not one of the typical heights for devices mounted in IT equipment racks? (ID-NTIA-13) Question 115 Explanation:Typically rack-mountable network equipments have a height of 1U, 2U or 4U. But you may rarely come across unusual units with odd values (other than 1U) such as 3U or 5Us server cases. 116. Most enterprise servers have dual power supplies. Which of the following mode provides power fault tolerance? (ID-NTIA-53) Question 116 Explanation:In combined mode, if one PSU fails or one power circuit fails, the entire system will lose power. Please note that different hardware manufactures may use their own terminology to describe redundant mode (for example backup mode). But the correct technical term is the redundant mode. 117. A network technician notices that most of the nodes in the 10.10.74.0/23 address space return either 1 or 2 node hop after running a tracert, however, some of the new servers are showing a hop count larger than 10. Which of the following is the most likely reason for this? (ID-NTIA-479) 118. A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user’s bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario? (ID-NTIA-292) 119. What is the most likely reason that User A cannot communicate with User B based on the following network configuration? (ID-NTIA-376) User A User B A. The default gateway should have different values 120. An IT technician at a university was told to block all students from accessing the wireless network in the examination building. Which of the following would be the best method to prevent students from accessing the wireless network while in the examination building? (ID-NTIA-208) 121. Which of the following Windows applications would you most likely use to create a baseline of system or network performance? (ID-NTIA-38) 122. At which of the following Open Systems Interconnection (OSI) model layers would a router operate? (ID-NTIA-418) 123. Manuja, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, he determines that users max out at 802.11g speeds. Which of the following would most likely fix this issue? (ID-NTIA-461) 124. What performance monitoring tool is shown here (click on figure to enlarge) that enables a system administrator to monitor information about processes that are currently running on a Unix/Linux server? (ID-NTIA-28) A. cpustat B. ping C. netstat D. top E. monitor 125. Which of the following RAID levels will not provide fault tolerance? (ID-NTIA-106) 126. Which of the following best describes the characteristics of a differential backup solution? (ID-NTIA-282) 127. Jessica, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Jessica use? (ID-NTIA-391) 128. A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host? (ID-NTIA-496) 129. A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered? (ID-NTIA-277) 130. A government agency has hundreds of mobile devices for their field agents. In order to secure their IT assets and data, the agency implemented a system where these mobile devices only operate in specific field locations. If an employee tried to log into a mobile device outside of these specific field locations, the hard drive will self encrypt and the device becomes unusable. This is an example of what type of security measures? (ID-NTIA-93) 131. A switch has detected duplicate broadcast messages sourced from a second port. The broadcasts continue to be transmitted and duplicated until the amount of traffic causes severe performance issues. Which of the following should be configured to prevent this behavior? (ID-NTIA-412) 132. Which of the following DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions? (ID-NTIA-166) Question 132 Explanation:Rate-Adaptive Digital Subscriber Line (RADSL) 133. When configuring a new switch in a packet-switched network, which of the following helps protect against network loops? (ID-NTIA-503) 134. An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig: (ID-NTIA-353) Which of the following would MOST likely allow the network drives to be accessed? A. Disable the WLAN adapter B. Disable the LAN adapter C. Check the wireless DHCP configuration D. Update the WLAN adapter driver 135. What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)? (ID-NTIA-67) Question 135 Explanation:Ephemeral client ports fall in the range of 49152 through 65535 and this range dose not include already registred ports and commonly used standard ports. 136. A technician arrives at a new building to find cabling has been run and terminated, but only the wall ports have been labeled. Which of the following tools should be utilized to best facilitate labeling the patch panel? (ID-NTIA-384) 137. A network technician is creating a diagram of network termination points in the building. The technician diagrammed the core network room and now needs to diagram the auxiliary network closets. Which of the following is the technician MOST likely going to add to the diagram? (ID-NTIA-198) Question 137 Explanation:Intermediate Distribution Frame (IDF) 138. Sanuja has been hired by a critical care medical facility (hospital) to build a local area network (LAN) to connect over 150 network devices. The medical facility administrators have advised Sanuja that they have zero tolerance for radio and electromagnetic interference (EMI). Which of the following is the best solution for this facility? (ID-NTIA-86) Question 138 Explanation:Fiber-optic (aka optical fiber) is immune to electromagnetic interference (EMI) and itself does not produce EMI while in operations. 139. A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements? (ID-NTIA-526) 140. A customer has submitted a request for a new wireless connection in the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration? (ID-NTIA-301) 141. A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as ___________. (ID-NTIA-234) Question 141 Explanation:Signal-to-noise ratio (SNR) 142. Which of the following DNS record defines a mail exchange server that is associated with a domain name? (ID-NTIA-124) 143. What kind of tool would be used for troubleshooting short/open circuits inside a copper cable? (ID-NTIA-238) Question 143 Explanation:Time-Domain Reflectometer (TDR) 144. Which of the answers listed below refers to a secure replacement for Telnet? (ID-NTIA-226) Question 144 Explanation:SSH (Secure Shell) 145. A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed? (ID-NTIA-266) 146. Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance? (ID-NTIA-382) 147. Which of the following is a system of notation that uses base 16 rather than base 10? (ID-NTIA-156) 148. A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature must be used to accomplish this? (ID-NTIA-323) 149. When deploying UTP cables in a networking environment, which of the following are acceptable standards? Choose all the correct answers. (ID-NTIA-288) 150. A network technician does not have access to the GUI of a server and needs to adjust some network properties. Using the following command, what is this the technician attempting to alter? (ID-NTIA-305) 151. A technician has replaced a customer’s desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is most likely in place? (ID-NTIA-452) Question 151 Explanation:Network Access Control (NAC) 152. A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the best solution? (ID-NTIA-468) 153. The ______________ technology can maintain an account database that multiple remote access servers can employ to authenticate remote users. (ID-NTIA-41) Question 153 Explanation:Remote Authentication Dial-In User Service (RADIUS) 154. A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat. Which of the following policies did the technician violate? (ID-NTIA-258) 155. A WAP has been dropping off the network sporadically and reconnecting shortly thereafter. The Cat5 wire connecting the access point is a long run of 265ft (81m) and goes through the business area and the mechanical room. Which of the following should the technician do to fix the AP connectivity issue? (ID-NTIA-314) Question 155 Explanation:Cat 5 max distance is 100 m (328 ft). 156. A network technician is setting up a WiFi network in an apartment complex for seniors. When trying to determine the best channel, which of the following is the best tool to use? (ID-NTIA-209) 157. Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs? (ID-NTIA-423) 158. A network protocol that allows for secure file transfer over Secure Shell (SSH) is called _________. (ID-NTIA-227) Question 158 Explanation:SSH File Transfer Protocol (SFTP) 159. Which of the following BEST describes the functionality of the root guard feature on a switch? (ID-NTIA-261) 160. Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete? (ID-NTIA-55) Question 160 Explanation:Gigabit Interface Converter (GBIC) 161. IT department suspects that a rogue employee is attempting to access a print server located in an unsecured area on the main office floor. Assuming the print server is a Windows-based system, which of the following event logs can record information about both successful and failed access attempts? (ID-NTIA-62) 162. Which of the following storage network technologies provides access to data using block-level storage? (ID-NTIA-120) Question 162 Explanation:NAS provides File-Level Access, SAN provides Block Level Access. But in the past, CompTIA Network+ exams had NAS as the answer hence confusing a lot of people. 163. Which of the following must be kept synchronized in order for Kerberos to work? (ID-NTIA-490) 164. The help desk is receiving reports of intermittent connections to a server. A help desk technician suspects the server is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician’s claim? (ID-NTIA-259) 165. Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect? (ID-NTIA-338) 166. Which Windows tool uses ICMP messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork? (ID-NTIA-77) 167. After deployment of a second network link to load balance the network traffic, the quality of voice calls degrades. The network administrator discovers the voice packets are arriving at uneven intervals that cannot be handled by the voice application buffer. Which of the following actions will improve the quality of the voice calls? (ID-NTIA-193) 168. A company has decided to allow certain users to work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and to specific areas on the network. Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users’ mobile devices to allow these VPN connections? (ID-NTIA-248) 169. A technician is setting up VoIP phones on a wireless network. Users report that calls are choppy and sometimes dropped. The technician has measured two characteristics using simple command-line tools that verify the problem. Which of the following characteristics did the technician measure? Choose all correct asnwers. (ID-NTIA-425) 170.While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL? (ID-NTIA-388) 171. A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform next? (ID-NTIA-241) 172. In order to hide the internal IP addresses (LAN) of devices across WAN, which of the following should you configure? (ID-NTIA-158) 173. Which of the following commands did a network technician run, if the network technician receives the following command output from a Linux-based machine? (ID-NTIA-196) 174. Which of the following protocol is used by web browsers to communicate with web servers? (ID-NTIA-56) 175. A network engineer is working on a network connectivity problem between a site in Calgary and a site in New York. The connection went down overnight, and the engineer is unsure where the connection failed. The technician is logged into the primary switch in the customer’s network, which is also the company’s connection to the WAN. Which of the following tools should the technician use to determine the last available network hop? (ID-NTIA-247) 176. At which of the following layers of the OSI model does compression occur? (ID-NTIA-273) 177. Which of the following allows a central point to simultaneously address other points without addressing all of them? (ID-NTIA-486) 178. Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation? (ID-NTIA-337) Question 178 Explanation: Classless Inter-Domain Routing (CIDR) 179. A network printer error report indicates that it may have an expired IP address. A failure with which of the following will cause this issue? (ID-NTIA-232) Question 179 Explanation:Dynamic Host Configuration Protocol (DHCP) 180. You are an IT consultant for a small business where maintaining physical security is difficult. Implementing which of the following standards would best help to prevent unauthorized connections to the wired network? (ID-NTIA-214) 181. A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport? (ID-NTIA-126) 182. Which of the following explains why splitting a large switched Ethernet LAN into two LANs by adding a router can help to alleviate traffic congestion and improve performance? Choose all correct answers. (ID-NTIA-326) 183. This device enables administrators of enterprise wireless networks to manage multiple access points from a central location. (ID-NTIA-12) 184. A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario? (ID-NTIA-450) 185. Which of the following Windows commands enables you to delete the entire ARP cache? (ID-NTIA-83) Question 185 Explanation:Note, arp -d command is for deleting cache entries, and by running it with the asterisk wildcard, the command deletes all of the entries in the cache. 186. A company runs Linux servers in its own datacenter and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company’s datacenter. Which of the following BEST describes the type of cloud architecture being used? Choose all correct answers. (ID-NTIA-200) 187. A network technician is configuring user access to a VPN concentrator and has been advised to use a protocol that supports encryption over UDP. Which of the following protocols has the technician most likely configured for client use? (ID-NTIA-410) Question 187 Explanation: Datagram Transport Layer Security (DTLS) 188. A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection? (ID-NTIA-343) 189. You are the IT Manager at a 150 employee small business located in downtown Vancouver. The accounting department filed a ticket claiming that they lost access to the accounting network drive. You strongly suspect an update on the firewall firmware may have changed a configuration leading to loss of access. Which documentation most likely contains the firewall configurations and access control lists information? (ID-NTIA-51) 190. In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types? (ID-NTIA-485) 191. Which of the following types of interference on a twisted pair network are designed to be prevented by the twists in the wire pairs inside the cable? (ID-NTIA-100) 192. You were advised to replace a failed network switch in a datacenter. Which of the following would you use to determine the precise location of the device? (ID-NTIA-107) 193. A company hires another firm to test the integrity of its information security controls. This is an example of: (ID-NTIA-257) 194. Which of the following is a disadvantage of migrating data to a SaaS cloud service? (ID-NTIA-143) 195. A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11 ac router. The SSID, encryption, and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years old. Which of the following is most likely the problem? (ID-NTIA-152) 196. Installing an electrical generator to a datacenter is an example of which of the following fault tolerance concepts? (ID-NTIA-54) Question 196 Explanation:You may have thought Uninterruptible Power Supply (UPS). A UPS is a device that uses battery power, not a generator and it is not meant to supply power for a long period of time. A well-planned data center should have, power generators, UPS devices and power conditioning units. 197. MAC filtering is an access control method used by which of the following types of hardware devices? (ID-NTIA-25) 198. After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do first to reconnect the server to the network? (ID-NTIA-344) 199. A home user is unable to get to the Internet from a workstation that is connected to a wireless network. When reviewing the results of the ipconfig command, the user wants to verify the default gateway is correct. Which of the following devices should be the gateway? (ID-NTIA-398) 200. Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence? (ID-NTIA-373) Question 200 Explanation:Acceptable Use Policy (AUP) 201. Which of the following best describes geofencing? (ID-NTIA-113) 202. Which of the following STP states indicates an inactivated port due to a loop? (ID-NTIA-502) 203. Which of the following is the SHORTEST way to write 2001:0000:0d58:0000:0000:0095:7565:0001 in proper IPv6 shorthand? (ID-NTIA-331) 204. In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: (ID-NTIA-333) 205. A technician is utilizing SNMPv3 to monitor network statistics. Which of the following actions would occur immediately of a server’s utilization spikes above the prescribed value? (ID-NTIA-407) 206. A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue? (ID-NTIA-294) 207. Sanuja, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message: (ID-NTIA-245) 208. Which of the following should be configured to allow for IP-to-name resolutions? (ID-NTIA-396) 209. Which of the following could be used to stop unknown threats? (ID-NTIA-471) 210. A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement? (ID-NTIA-148) 211. An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company? (ID-NTIA-145) 212. A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on-site. Which of the following solutions should the technician implement? (ID-NTIA-254) 213. To keep the costs down, a small business allows its employees to use their own personal laptop computers to access their network infrastructure. This type of polity is typically known as __________. (ID-NTIA-140) Question 213 Explanation:Bring Your Own Device (BYOD) 214. Which of the following is a correct term describing the function of a switch? (ID-NTIA-34) 215. Which of the following BEST describes how a layer 2 switch functions? (ID-NTIA-510) 216. Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points? (ID-NTIA-212) 217. In a standard Cisco network diagram, what component does the following symbol represent? (ID-NTIA-02) A. A hub B. A switch C. A router D. A gateway 218. Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections? (ID-NTIA-365) 219. You have been called in to inspect a network configuration. You are given only one network diagram, shown in the following figure (click to enlarge). Using the diagram, what recommendation might you make? (ID-NTIA-377) A. None, the network looks good. B. Cable 1 does not need to be plenum rated. C. Cable 2 should be an STP cable. D. Cable 3 should be an STP cable. Question 219 Explanation:In this diagram, Cable i is plenum rated and should be fine. Cable 3 is a path cable and does not need to be STP rated. However, Cable 2 goes through walls and ceilings. Therefore, it should be recommended to have a better grade of cable than regular UTP. STP provides greater resistance to EMI. 220. A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing? (ID-NTIA-177) Question 220 Explanation:Port Address Translation (PAT) 221. Which of the following terms describes the process by which a client user or computer requests that it be issued a certificate, either manually or automatically? (ID-NTIA-95) 222. Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment? (ID-NTIA-518) 223. Which of the following defines when Dhillon, an attacker, attempts to monitor wireless traffic in order to perform malicious activities? (ID-NTIA-150) 224. Which of the following attack methods is associated with unprotected Wi-Fi network systems? (ID-NTIA-92) Question 224 Explanation:Wardriving is an attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks. 225. Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment? (ID-NTIA-287) 226. Which of the following protocols does the ping program never use to carry its messages? (ID-NTIA-98) 227. A network administrator is configuring the 172.16.40.0/22 network for a new building. Which of the following is the number of hosts that will be supported on this network? (ID-NTIA-274) 228. A company has just installed a new cloud VoIP solution, however, users occasionally report poor call quality or dead air being present. Which of the following describes the next troubleshooting step the technician should take? (ID-NTIA-394) 229. A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the following IP addressing scheme on each interface: (ID-NTIA-350) Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure? A. Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver B. Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver C. Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver D. Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver 230. A disgruntled employee decides to leak critical information about a company’s new product. The employee places keyloggers on the department’s computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring? (ID-NTIA-521) 231. Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session? (ID-NTIA-04) 232. A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network. Which of the following should the vendors recommend in response to the quote request? (ID-NTIA-243) 233. Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model? (ID-NTIA-317) 234. Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? Choose all the correct answers. (ID-NTIA-280) 235. An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason? (ID-NTIA-527) 236. A technician wants to configure a SOHO network to use a specific public DNS server. Which of the following network components should the technician configure to point all clients on a network to a new DNS server? (ID-NTIA-313) 237. Which of the following type of technique is used to block access to websites and web-based advertisements by providing a false result of a requested domain name? (ID-NTIA-202) 238. A company has procured a new office building and started the process of assigning employees to work at that location. The company has also purchased equipment for the new location. There are 5033 laptops, 6000 monitors, and 857 printers. Which of the following steps is the technician most likely to complete first? (ID-NTIA-310) 239. Your company is moving to a new building. After the site survey, you decided to install 25 wireless access points (AP) in drop ceilings across four floors. Which of the following would be the most efficient method for powering 25 APs? (ID-NTIA-187) 240. A network admin can ping remote host by its IP address, but not by FQDN. Which of the following is the most probable source of the problem? (ID-NTIA-233) 241. The IEEE 802.11g standard is backwards compatible with which of the following? (ID-NTIA-236) 242. A network administrator wants to reduce the amount of time each user takes to log in to different systems in the network. Which of the following would reduce the time spent authenticating? (ID-NTIA-278) Question 242 Explanation:Single sign-on (SSO) 243. Which of the following values could a web client use as an ephemeral port number when communicating with a web server? (ID-NTIA-26) Question 243 Explanation:The allowed ephemeral port number values range from 49152 to 65535. 244. A department is reporting network issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following is most likely the issue? (ID-NTIA-269) 245. A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the equipment would support? (ID-NTIA-173) 246. In a public key infrastructure (PKI), which half of a cryptographic key pair is never transmitted over the network? (ID-NTIA-16) 247. Which of the following must be installed on an employee’s computer if the remote access VPN implements an SSL VPN with PKI authentication? (ID-NTIA-483) 248. A junior network technician receives a help desk ticket from an end-user who is having trouble accessing a web application that was working the previous day. After talking with the end-user and gathering information about the issue, which of the following would be the most likely course of action for the technician to perform next? (ID-NTIA-378) 249. A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues? (ID-NTIA-520) 250. A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure? (ID-NTIA-290) 251. A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to best meet this requirement? (ID-NTIA-428) 252. A network engineer for a manufacturing company is implementing a wireless network that provides reliable coverage throughout the facility. There are several large, electric, motorized machines installed on the shop floor for automating the manufacturing process. These machines are known to be significant sources of RF interference. Which of the following frequencies should the wireless network use to minimize this interference? (ID-NTIA-311) 253. Which of the following is a proprietary routing protocol? (ID-NTIA-514) Question 253 Explanation:Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary protocol developed by Cisco Systems. 254. Which of the Open Systems Interconnection (OSI) model layers is responsible for syntax translation and compression or encryption? (ID-NTIA-24) 255. A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check next? (ID-NTIA-304) 256. Homer Simpson, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem? (ID-NTIA-455) 257. A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PCs IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC? (ID-NTIA-381) 258. Which of the following technologies should be used in high-throughput network to reduce network overhead? (ID-NTIA-299) 259. No link lights on a switch’s SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of-9. Which of the following types of cable is most likely being tested? (ID-NTIA-528) 260. A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential? (ID-NTIA-351) 261. A technician is observing brownout issues at a smaller office. At least once a week, the edge switch power cycles. Which of the following should the technician do to resolve the issue? (ID-NTIA-419) Question 261 Explanation:A power conditioner is also an option. However, installing a UPS is the better choice. 262. NTP is used for which of the following function? (ID-NTIA-240) Question 262 Explanation:Network Time Protocol (NTP) 263. A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured? (ID-NTIA-181) 264. Which of the following topologies offers the highest level of redundancy? (ID-NTIA-445) Question 264 Explanation:The full-mesh topology might be complex and expensive to implement, but it does provide excellent levels of redundancy. Should one or more links fail, it is often possible to reroute traffic around the failures. 265. Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use? (ID-NTIA-296) 266. When enabling jumbo frames on a network device, which of the following parameters is being adjusted? (ID-NTIA-339) 267. A network technician performs a wireless site survey at a company building and identifies that the cafeteria is not covered by a wireless signal. The cafeteria is located in a medium-size, square-shaped room. Which of the following types of WAP antenna should the technician install in the center of the cafeteria to provide the BEST coverage? (ID-NTIA-417) 268. A typical nexus termination point for incoming telephone and wide area network (WAN) services is known as __________. (ID-NTIA-103) Question 268 Explanation:Main Distribution Frame (MDF) 269. An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would most likely accomplish this? (ID-NTIA-494) 270. Which of the following types of cable, when installed, sometimes employed a device called a vampire tap? (ID-NTIA-11) 271. A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the most likely cause of the increased traffic? (ID-NTIA-456) 272. A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician’s machine. Which of the following should the technician use to help diagnose the problem? (ID-NTIA-281) 273. Sanuja installed six Windows computers in his home network connected to a switch and a cable modem/router that provides access to the Internet. One of the computers is able to connect to other computers and internal NAS but cannot connect to the Internet. Which of the following parameters on the malfunctioning computer will Sanuja most likely have to change to resolve this problem? (ID-NTIA-171) Question 273 Explanation:Subnet mask should be correct since the computer can communicate with the NAS and the other computers in the LAN. 274. A home security company has installed a wireless device at a residence that allows the company to view security status of the home online. The resident reports the 802.11ac home wireless intermittently loses connectivity for about 15 minutes twice a day. Which of the following is the most likely cause? (ID-NTIA-213) 275. What is the name of the tool shown in the following figure? (ID-NTIA-319) Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571 A. Butt set B. Tone generator and locator C. Punchdown tool D. Crimper 276. Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network? (ID-NTIA-437) 277. A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality? (ID-NTIA-182) 278. A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages? (ID-NTIA-06) Question 278 Explanation:Remember the three-way handshake. 279. Allowing data to be centrally stored and accessed by multiple devices on an isolated subnet is best understood as ________. (ID-NTIA-195) 280. A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected? (ID-NTIA-262) 281. Sanuja wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should he use? (ID-NTIA-205 282. Which utility is shown in the following figure (portions of which have been obscured for this question)? (ID-NTIA-375) A. netstat B. nbtstat C. nslookup D. pathping 283. A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented? (ID-NTIA-341) 284. Which of the following commands can Sanuja use to display the number of bytes that a Windows workstation has transmitted? (ID-NTIA-99) 285. A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet. Which of the following methods should be used to distribute the images while ensuring integrity? (ID-NTIA-249) 286. A network technician downloaded new firmware for a mission-critical firewall. Which of the following should the network technician do before installing the firmware? (ID-NTIA-138) Question 286 Explanation:File hash verifies to ensure the downloaded file is correct and complete. Companies like CISCO, IBM, HP, and Microsoft provides hash information on almost every downloadable update files. 287. Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps? (ID-NTIA-498) 288. Which of the following wireless security protocols uses CCMP for encryption? (ID-NTIA-81) 289. Which of the following is the correct port number for NTP? (ID-NTIA-220) 290. Which of the following is used to provide hot standby capabilities using paired routers? (ID-NTIA-512) Question 290 Explanation:Common Address Redundancy Protocol (CARP) 291. Which of the following must be implemented to share metrics between routing protocols within the same router? (ID-NTIA-224) 292. Which of the following protocols are included in a Fibre Channel packet? (ID-NTIA-316) Question 292 Explanation:The Fibre Channel standard defines a unique, five-layer protocol stack that does not correspond to the OSI model layers. 293. Which of the following security threats relies primarily on user deception and misinformation? (ID-NTIA-459) 294. A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the most secure method of connecting all devices while avoiding a performance impact to modern wireless devices? (ID-NTIA-283) 295. A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement? (ID-NTIA-399) 296. An employee, who using a laptop connected to the wireless network, is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop: (ID-NTIA-300) IP: 192.168.1.100 The administrator was expecting to see a network address within 10.100.0.0/23, which is consistent with the company’s wireless network. The network administrator verifies the company’s wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue? 297. A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? Choose all the correct answers. (ID-NTIA-159)< 298. How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network? (ID-NTIA-72) Question 298 Explanation:An IP address has 32 bits. In this example, if 17 bits are allocated to the network identifier, 15 bits are left for the host identifier. 299. A VPN concentrator is an advanced type of which of the following devices? (ID-NTIA-88) 300. Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device? (ID-NTIA-285) 301. Which of the following is an invalid MAC address? (ID-NTIA-487) 302. Which of the following is an object held within an MIB? (ID-NTIA-276) Question 302 Explanation:Object Identifier 303. A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the most likely cause? (ID-NTIA-302) Question 303 Explanation:The 169.254.x.x is part of Automatic Private IP Addressing (APIPA). 304. A technician is sent to a remote office to set up a device to connect to the Internet. The company standards document requires stateful inspection. Which of the following should the technician install? (ID-NTIA-403) 305. Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is most likely the cause? (ID-NTIA-400) 306. A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is most effective in resolving this issue? (ID-NTIA-349) 307. Review the following figure. Note that each store-and-forward switch (SANUJA_01, SANUJA_02, and SANUJA_03) has three connected node ports and one port for switch-to-switch connections. All node ports and links are configured for half-duplex communication. The switch-to-switch links are configured for full-duplex communication. Which of the following statements about the switched network is true? (ID-NTIA-327) A. There is one collision domain for this network. B. There are 3 collision domains, one for each switch-to-switch connection. C. There are 9 collision domains, one for each half-duplex connection. D. There are 12 collision domains, one for each switch connection. Question 307 Explanation:All half-duplex port connections on a store-and-forward switch represent a different collision domain. Full-duplex connections aren’t subject to collisions, so they do not define separate collision domains. 308. Which of the following technologies is typically associated with virtual PBX services? (ID-NTIA-89) 309. A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue? (ID-NTIA-279) 310. Due to a missing network device, 802.11n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect? (ID-NTIA-409) 311. The main server for your organization is located in Montreal, Quebec, Canada. You have an office in Calgary, Alberta, Canada. Which of the following virtual private network (VPN) connection should you use to connect the main server to the branch office in Calgary? (ID-NTIA-116) 312. A network technician needs to install an additional access point to the company’s wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point’s coverage areas to overlap? (ID-NTIA-466) 313.A web application is unable to authenticate customers so they can access their bills. The server administrator has tested the LDAP query but is not receiving results. Which of the following is the NEXT step the server administrator should take to correct the problem? (ID-NTIA-436) 314. After installing a Linux web server, as a prudent IT Analyst, which of the following utilities should you use to check open ports that attackers might be able to penetrate? (ID-NTIA-47) 315. If a workstation has the IP address 192.168.1.55/24, which of the following is the most likely IP address of the router that is connected to the workstation? (ID-NTIA-142) 316. Which of the following is used to classify network data for the purpose of providing QoS? (ID-NTIA-223) Question 316 Explanation:Differentiated Services Code Point (DSCP) 317. Which of the following protocols is responsible for inserting the tags into frames that enable switches to forward them to the appropriate VLAN? (ID-NTIA-318) 318. Which of the following is based entirely on using ICMP packets? (ID-NTIA-469) 319. In the following diagram, what is the type of optical fiber connector illustrated by I? (ID-NTIA-448) A. MT-RJ B. SC C. ST D. LC 320. Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model? (ID-NTIA-64) 321. Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server? (ID-NTIA-69) 322. Which of the following datacenter security methodologies is most likely to remain usable during a company-wide network outage? (ID-NTIA-372) 323. A company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? (ID-NTIA-464) 324. A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Which of the following are most likely the causes of this issue? Choose all suitable answers. (ID-NTIA-389) 325. Which of the following types of wiring faults cannot be detected by a wiremap tester? (ID-NTIA-19) Question 325 Explanation:It cannot detect split pairs because, in this fault situation, the pins are properly connected. 326. Which of the following DNS record types is an alias? (ID-NTIA-406) 327. A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach? (ID-NTIA-218) 328. An administrator is receiving reports from an executive that the executive’s wireless access point loses the signal frequently, even though the WAP is on the executive’s desk. The office contains four other 802.11n access points. Which of the following would most likely correct interference problems in the executive’s office? (ID-NTIA-467) 329. A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this? (ID-NTIA-293) 330. Which of the following types of keys is included in a digital certificate? (ID-NTIA-18) 331. Which of the following protocols is used to transport outgoing mail across networks? (ID-NTIA-190) 332. NetBIOS protocol uses the port _____ general and port _____ for secure traffic. The answer is in the respective order. (ID-NTIA-139) Question 332 Explanation:Read the Common port numbers table at the bottom of this page. 333. All of the following items are fault tolerance mechanisms except ______________. (ID-NTIA-114) Question 333 Explanation:Simple Network Monitoring Protocol (SNMP) 334. A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the celling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation? (ID-NTIA-255) 335. A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation? (ID-NTIA-478) 336. A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly? (ID-NTIA-340) 337. In the following diagram, what is the type of optical fiber connector illustrated by III? (ID-NTIA-449) A. SC B. MT-RJ C. ST D. LC 338. A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would best resolve the issue? (ID-NTIA-286) 339. Which of the following is a type of Out of Band Access; also known as out-of-band management? (ID-NTIA-216) 340. A type of protocol used in network management systems for monitoring network-attached devices is called _________. (ID-NTIA-229) Question 340 Explanation:Simple Network Management Protocol (SNMP) 341. This function can be interfered with by a DNS poisoning attack. (ID-NTIA-96) 342. A network technician is working on a new switch implementation to expand the network. Which of the following is the best option to ensure the implementation goes according to business requirements? (ID-NTIA-523) Question 342 Explanation:Standard Operating Procedure (SOP) 343. A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue? (ID-NTIA-178) 344. The web server hosting sanuja.com has a secure web application called Senawa. You have set up the server with Senawa assigned to the port number 123456 for remote web access. In order for you to access Senawa from a remote office, which of the following URLs should you use? (ID-NTIA-127) 345. A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following best explains this response? (ID-NTIA-366) 346. A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC- to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform next? (ID-NTIA-430 347. What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information? (ID-NTIA-35) 348. A network administrator is adding a new WAN circuit from the ISP to a new building. In which of the following locations would the network administrator find the utility entry point? (ID-NTIA-260) 349. The _____________ specifies the amount of time needed to restore a server from the most recent backup if it should fail. (ID-NTIA-109) Question 349 Explanation:Recovery Time Objective (RTO) 350. An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network? (ID-NTIA-497) Question 350 Explanation:Simple Network Management Protocol (SNMP) 351. Which utility is the easiest to use for identifying a malfunctioning router on a network? (ID-NTIA-45) 352. A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination? (ID-NTIA-433) 353. An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario? (ID-NTIA-360) 354. Which of the following routing metrics is used to determine the path of a network that utilizes RIPv2 to route traffic? (ID-NTIA-130) 355. Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion? (ID-NTIA-387) 356. A gaming company released a new game that is downloadable on April 20, 2020. On the day of the launch, the majority of customers could not reach the company’s website. A message appears on their web browser stating the website is unavailable due to unusually high traffic. This technical issue is very similar to which of the following? (ID-NTIA-356) Question 356 Explanation:What is described in the question is very similar to DDoS. A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server typically by sending multiple requests for resources from the server. On the launch day, the customers trying to access the website at the same time created an identical situation to a DDoS attack. 357. A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task? (ID-NTIA-180) 358. A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure the Linux server can reach the backup location? (ID-NTIA-146) 359. Which of the following security methord is most likley effective against an insdier threat? (ID-NTIA-60) Question 359 Explanation:Other than video surveillance, all other options can be defeated by an insider. An insider threat is when someone already authorized to access organizations’ network infrastructure performs a nefarious act. 360. The _____________ protocol provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model. (ID-NTIA-68) Question 360 Explanation:Transmission Control Protocol (TCP) 361. Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? (ID-NTIA-330) 362. Which of the following types of Secure Sockets Layer (SSL) virtual private network (VPN) connections provides the most comprehensive access to the remote network? (ID-NTIA-58) 363. Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer a critical application? (ID-NTIA-440) Question 363 Explanation:Some argue for IaaS. 364. Which of the following are characteristics of jumbo frames? Choose all correct answers. (ID-NTIA-421) 365. In a standard Cisco network diagram, what component does the following symbol represent? (ID-NTIA-07) A. A gateway B. A switch C. A hub D. A router 366. Which of the following parameters enables you to specify the number of messages the ping tool transmits? (ID-NTIA-29) 367. A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure? (ID-NTIA-442) Question 367 Explanation:It is NOT a business continuity plan because the best choice to have here is a rollback plan. 368. Which of the following best describes an exploit? (ID-NTIA-137) 369. A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements? (ID-NTIA-354) 370. A user checks an IP address using an external website. The address is different than the one the user sees when opening a command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses. This is BEST explained by the interworking of ___________. (ID-NTIA-217) 371. You were advised to set up a new storage area network for a business, but you must use the existing infrastructure. Which of the following storage standards should you use? (ID-NTIA-135) Question 371 Explanation:Why not iSCSI? Because iSCSI is not a storage standard. ISCSI is a transport layer protocol and NAS is a storage standard. 372. A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem? (ID-NTIA-492 373. When a user swipes a smartcard through a reader to log on to a Windows RDP session, which of the following actions is the user performing? (ID-NTIA-85) 374. Select all statements that apply to Telnet. (ID-NTIA-228) 375. A technician wants to have the ability to transfer files from home to the company’s network on a regular basis. Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys? (ID-NTIA-201) 376. Multiple users in a small organization with 50 employees complained that they cannot access certain applications installed on an in-house server. What type of problem is this? (ID-NTIA-46) Question 376 Explanation:You may argue that this can be also classified as a user application problem because the users are complaining about not having access to applications. However, the it is not the best answer because if multiple users complain they cannot access an application that is installed on a central server, it is most likely an issue with the server, thus it is a network-wide problem. 377. What is the length of an IPv6 address? (ID-NTIA-482) 378. You were advised to fix a network issue at Foothills Hospital in Calgary. Which of the following documentation most likely contains the complete route of every cable run from the wall plate to the patch panel? (ID-NTIA-48) 379. A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? Select all correct answers. (ID-NTIA-380) 380. Which of the following cable types exclusively is used for Thin Ethernet network segments? (ID-NTIA-32) 381. You want to make phone calls using the Intenet via a standard analog phone. Which device enables you to use the Internet instead of the Public Switched Telephone Network (PSTN)? (ID-NTIA-133) 382. Which of the following technologies allows more than two transceivers with an access point? (ID-NTIA-462) Question 382 Explanation:multiple-input and multiple-output (MIMO) 383. Which of the following would require troubleshooting if a network connectivity problem originates from mismatched transceiver types? (ID-NTIA-237) 384. A network administrator needs to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25. What device will allow for deep packet inspection? (ID-NTIA-149) 385. Which of the following DNS record would you use if sanuja.com is exculsively hosted on a server that only has an IPv6? (ID-NTIA-123) Question 385 Explanation:Note AAAA record takes IPv6 host information. 386. Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains? (ID-NTIA-272) 387. Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is most likely to reveal why files are becoming corrupted? (ID-NTIA-499) 388. A typical modern VOIP phone is equipped with which type of connector? (ID-NTIA-10) 389. When you accessed this website, https://sanuja.com is most likely using which port number on its the webserver? (ID-NTIA-263) Question 389 Explanation:HTTPS = Port 443 390. Review the following figure. How many collision domains and broadcast domains are there in the network diagram? (ID-NTIA-328) A. There are nine collision domains and three broadcast domains. B. There are seven collision domains and three broadcast domains. C. There are three collision domains and one broadcast domain. D. There are three collision domains and three broadcast domains. E. There is one collision domain and one broadcast domain. 391. Which of the following connector types are associated with fiberoptic cables? Choose more than one answer. (ID-NTIA-57) Question 391 Explanation:Types: straight tip (ST), local connector (LC), and mechanical transfer–registered jack (MTRJ). 392. A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician most likely to consider? Choose three answers. (ID-NTIA-335) 393. An administrator is redesigning a company’s network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration? (ID-NTIA-250) 394. Management at a company wants to increase the bandwidth available to users after receiving several complaints. A technician reports to management that 50% of the company bandwidth is being utilized by wireless devices outside the company’s property. Given budget constraints, which of the following solutions should the technician propose to management? (ID-NTIA-189) 395. A network administrator is installing a campus network of two routers, 24 switches, 76 APs, and 492 VoIP phone sets. Which of the following additional devices should the administrator install to help manage this network? (ID-NTIA-385) 396. A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the best method to perform this? (ID-NTIA-186) 397. Which of the following protocols does the Ping utility use to exchange messages with another system? (ID-NTIA-03) Question 397 Explanation:Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply. 398. A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician need to complete the installation? (ID-NTIA-160) 399. A Toronto hockey facility requested a guest wireless access system. Owners want to issue their guests vouchers with WiFi access codes that include expirations (time limits). Which of the following is the best choice to meet this requirement? (ID-NTIA-121) 400. Which user has requested the performance monitoring in the following figure (click on figure to enlarge)? (ID-NTIA-321) A. root B. gdm C. sanuja D. top E. systemd 401. A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection? (ID-NTIA-393) 402. Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would best enforce this requirement? (ID-NTIA-434) 403. A content filter is set to analyze XML and JSON that users access from the Internet. At which of the following OSI (Open Systems Interconnection) layers is this analysis taking place? (ID-NTIA-441) 404. In which of the following ways does a DDoS attack differ from a spoofing attack? (ID-NTIA-355) 405. Which encryption standard is used by CCMP? (ID-NTIA-110) Question 405 Explanation:Advanced Encryption Standard (AES) 406. In the following diagram, what is the type of optical fiber connector illustrated by IV? (ID-NTIA-447) A. SC B. ST C. MT-RJ D. LC 407. Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line wide area network (WAN) service? (ID-NTIA-167) 408. A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks? (ID-NTIA-131) 409. Which of the following command lines will produce the output shown in the figure? Click image to enlarge. (ID-NTIA-84) A. ping 192.168.1.1 -t B. ping 192.168.1.1 -l 2048 -t C. ping 192.168.1.1 -l 2048 -n 6 D. ping 192.168.1.1 -n 2048 E. ping 192.168.1.1 -l 2048 -t 6 Question 409 Explanation:Size of the message: -l parameter = 2048 bytes 410. A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three? (ID-NTIA-361) 411. Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network? (ID-NTIA-488) 412. A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use? (ID-NTIA-453) Question 412 Explanation:gigabit interface converter (GBIC) 413. Which of the following is a network device that is responsible for separating collision domains? (ID-NTIA-535) 414. An administrator is troubleshooting a user’s intermittent wireless connectivity issue. Other users across the hallway can connect and use the wireless network properly. Upon inspection of the connection details, the administrator finds the following: (ID-NTIA-435) 415. In Kerberos protocol, where is the Authenticating Service and Ticket Granting Service are held? (ID-NTIA-112) Question 415 Explanation:Key Distribution Center (KDC) 416. The Chief Executive Officer’s (CEO’s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting? (ID-NTIA-524) 417. Which of the following technologies is used to attach multiple guest operating systems to a single physical network port? (ID-NTIA-307) 418. Which of the following is the number of broadcast domain(s) that are created when using an unmanaged 12-port switch? (ID-NTIA-222) 419. Lauren, a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is most likely the cause? (ID-NTIA-271) 420. Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client? (ID-NTIA-01) 421. Which of the following solutions will detect and disable a rogue access point? (ID-NTIA-460) Question 421 Explanation:Intrusion Prevention System (IPS); note it specially state detect and desable. IDS only detects and alerts but will not be able to disable. 422. A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task? (ID-NTIA-404) 423. Which of the following is not a load balancing mechanism? (ID-NTIA-30) Question 423 Explanation:Redundant Array of Independent Disks (RAID) level 1 is a fault tolerance mechanism but does not provide load balancing. 424. An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause this condition? (ID-NTIA-348) 425. ____________ describes a system that prevents computers from logging on to a network unless they have the latest updates and antimalware software installed. (ID-NTIA-40) Question 425 Explanation:Network Access Control (NAC) 426. Which of the following physical security controls is most likely to be susceptible to a false positive? (ID-NTIA-368) 427. An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domains that exist? (ID-NTIA-342) 428. A recently constructed building makes use of glass and natural light. Users in the building are reporting poor cellular connectivity and speeds. Which of the following is most likely the cause? (ID-NTIA-522) 429. You are on the website sanuja.com. Sanuja also owns sanuja.net and would also like to reach sanuja.com via alias sanuja.net. What type of DNS record should you create? (ID-NTIA-122) Question 429 Explanation:CNAME is a Canonical Name Record or Alias Record. A type of resource record in the Domain Name System (DNS), that specifies that one domain name is an alias of another canonical domain name. 430. A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating? (ID-NTIA-191) 431. Identification badges, key fobs, and mantraps all fall into which of the following categories of security devices? (ID-NTIA-17) 432. A content filter is set to analyze XML and JSON that users access from the Internet. At which of the following OSI layers is this analysis taking place? (ID-NTIA-132) Question 432 Explanation:Layer 6 is the presentation layer. 433. Which of the following policies prohibits a network administrator from using spare servers in the datacenter to mine bitcoins? (ID-NTIA-383) 434. A technician is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs? (ID-NTIA-531) 435. Sanuja has a separate guest network at his home with the SSID SanujaGuest. When a visitor connects to SanujaGuest, a web page is presented to the user asking for login credentials. What type of WiFi security is most likley being used? (ID-NTIA-364) A. EAP-TLS B. MAC filtering C. Captive portal D. WPA2 E. SSL certificate 436. A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the most likely explanation? (ID-NTIA-172) Question 436 Explanation:This question is extracted out of a real Network+ exam. The answer is contested by some experts. 437. Typically group membership is used in this security procedure. (ID-NTIA-111) 438. Which of the following physical LAN topologies requires the most cabling? (ID-NTIA-444) 439. After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups? (ID-NTIA-210) 440. Which of the following security protocols can authenticate users without transmitting their passwords over the network? (ID-NTIA-31) 441. A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is most likely the issue with the cable? (ID-NTIA-345) 442. Which of the following best describes the differences between VLAN hopping and session hijacking? (ID-NTIA-176) 443. Based on the Open Systems Interconnection (OSI) model, which of the following statement on broadcast and collision domains is true? (ID-NTIA-102) 444. In a standard Cisco network diagram, what component does the following symbol represent? (ID-NTIA-08) A. Authentication server 445. You work for a large organization and your company occupies several floors of a downtown office building. You were told one of the network printers is malfunctioning. Which documentation most likely contains the tracking information about the printer such as the physical location (floor number, room, etc)? (ID-NTIA-49) 446. Which of the following is the purpose of a VLAN? (ID-NTIA-513) 447. In Windows Active Directory Domain Services (AD DS), which protocol is used for authentication of internal clients? (ID-NTIA-15) 448. A secured government building that scans the faces of incoming people and compares them to a database of authorized entrants is using which of the following types of technology? (ID-NTIA-94) 449. Manuja, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, he can access the Internet. The network engineer has confirmed that Manuja’s account has been set up the same as the others. There are no access lists restricting Manuja’s access. Which of the following could be the issue for this lack of access? (ID-NTIA-129) 450. A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements? (ID-NTIA-432) 451. Your company has spare network equipment to be used in an emergency. In order to minimize downtime, which of the following actions should your IT department take? (ID-NTIA-163) Question 451 Explanation:Some companies have the bright idea of having spare units, but fail to update firmware and OS. When the spares are needed, technicians have to update the firmware before installing the replacement. In some cases, such as Windows Servers, which never have been updated may result in driver failure and may take several hours/days to get the system back in running. Always update your spares! 452. A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements? (ID-NTIA-362) 453. Which of the following provides two-factor authentication? (ID-NTIA-420) 454. Which of the following command-line utilities is capable of performing the same basic function as traceroute or tracert? (ID-NTIA-44) 455. Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? (ID-NTIA-235) 456. A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the most likely cause of this issue? (ID-NTIA-424) Question 456 Explanation:DHCP exhaustion and overcapacity can be the right answer but overcapacity is the most likely reason. 457. A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring? (ID-NTIA-256) 458. The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 300 Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 5 Mbps. Which of the following policies is being agreed to in the SLA? (ID-NTIA-174) 459.What is the width of a standard equipment rack in a datacenter? (ID-NTIA-52) 460. Which of the following is the best way to detect and discourage insider the threat on a large scale infrastructure such as government IT networks? (ID-NTIA-61) Question 460 Explanation:Insider the threat is when someone who is already authorized to use organizations’ network infrastructure abuse the system. The best option in large scale operations such as government agencies is to perform frequent audits. 461.Which of the following VPN protocols establishes a secure session that can be initiated using a browser? (ID-NTIA-363) 462. An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring? (ID-NTIA-320) 463. A network engineer wants to segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments? (ID-NTIA-219) 464. An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real-time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? Select all correct answers. (ID-NTIA-451) 465. Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails? (ID-NTIA-472) 466. Which of the following syslog message severity levels indicates that the message is just informational? (ID-NTIA-97) 467. A Windows workstation failed to obtain an IP address from the DHCP server. Which of the following IP address most likely assigned to this workstations’ port? (ID-NTIA-71) Question 467 Explanation:It within the APIPA range which is 169.254.0.1 through 169.254.255.254. 468. A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (ID-NTIA-422) 469. Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation? (ID-NTIA-184) 470. A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to best meet this requirement? Choose all correct answers. (ID-NTIA-439) 471. An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured? (ID-NTIA-515) 472. ____________ is the configuration that disables the NAT feature on the modem and allows a router to function as a DHCP server without an IP Address conflict. (ID-NTIA-175) 473. A network room that is equipped with a fingerprint scanner that authenticates the user at the entrance is using which of the following types of technology? (ID-NTIA-14) 474. Which of the following best describes SNMP? (ID-NTIA-115) Question 474 Explanation:Simple Network Management Protocol (SNMP) 475. Windows remote access users with smartcards can be authenticated via which of the following protocols? (ID-NTIA-39) Question 475 Explanation:Extensible Authentication Protocol (EAP) 476. Which of the following devices are most often responsible for 802.1q tagging? Choose all correct answers. (ID-NTIA-438) 477. All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is most likely causing this issue? (ID-NTIA-501) 478. Which of the following syslog message severity levels indicates that a system is unusable? (ID-NTIA-80) Question 478 Explanation:Code 0 is the most severe. 479. You are tasked with creating a network that will accomplish the following requirements for company A. (ID-NTIA-508) A. C6 B. 5 C. C8 D. C7 E. C10 480. Which of the following is not a protocol operating at the network layer of the Open Systems Interconnection (OSI) model? (ID-NTIA-63) 481. Disk striping with distributed parity is used in which RIAD level? (ID-NTIA-105) 482. A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size? (ID-NTIA-207) 483. The NetBIOS is part of which layer in the Open Systems Interconnection (OSI) model? (ID-NTIA-74) 484. A technician is working on a new machine that has been procured for testing and development. The machine will run a hypervisor and host several operating systems of various types so the development team can test the company’s applications in a variety of environments. The technician wants the virtual machines to be available to communicate with each other without leaving the hypervisor. Which of the following is the best solution to the problem? (ID-NTIA-525) 485. What cloud service provides hardware (such as servers) and preconfigured operating systems (OS) by enableing you to select the OS you want to install? (ID-NTIA-119) Question 485 Explanation:Platform-as-a-service (PaaS) is a type of cloud computing offering in which a service provider delivers a platform to clients, enabling them to develop, run, and manage business applications without the need to build and maintain the infrastructure such software development processes typically require. 486. Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices are reconfigured, all clients report that they are unable to connect to the Internet. Which of the following is the MOST likely reason? Answer the question based on the following IP address information. (ID-NTIA-332) 487. Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement. After optimizing the network, which of the following would be required? (ID-NTIA-346) 488. Which of the following protocols do most man-in-the-middle attack (MITM) attacks utilize? (ID-NTIA-179) 489. Which of the following is BEST for providing real-time equipment theft alerts to the security staff? (ID-NTIA-532) 490. A standard network rack is typically ruled vertically using which of the following measurements? (ID-NTIA-21) Question 490 Explanation:Rack diagrams use vertical measurement called units, each of which is 1.75 inches. 491. Which of the following wireless security protocols was substantially weakened by its initialization vector? (ID-NTIA-170) Question 491 Explanation:Wired Equivalent Privacy (WEP) 492. When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation? (ID-NTIA-306) 493. Which of the following is created on a 48-port switch with five active VLANs? (ID-NTIA-309) 494. In which IPv4 class is the address 127.0.0.1 found? (ID-NTIA-70) Question 494 Explanation:Address 127.0.0.1 is the designated IPv4 local loopback address, and as such, it is reserved. 495. Management has requested that services be available within 72 hours of a disaster. Budget is a major concern. A contract is signed with a company that has plenty of space, and the technician will have the option of putting infrastructure equipment in place. Which of the following best describes this business continuity strategy? (ID-NTIA-413) 496. A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate? (ID-NTIA-151) 497. A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented? (ID-NTIA-516) 498. What is the correct crimp out sequence of a cross-over pin out T568B RJ45 jack? (ID-NTIA-506) Question 498 Explanation:You should also know the 568A: White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown. The 568B is more commonly used. 499. When configuring a new switch in a packet-switched network, which of the following helps protect against network loops? (ID-NTIA-395) 500. A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located? (ID-NTIA-367) 501. Which of the following is used to define the duration during which a client can use an IP address? (ID-NTIA-244) 502. While logged into a financial application, a user gets errors when trying to write to the database. The network administrator is not familiar with the application and how it communicates with the database. Which of the following documentation types should the network administrator use to troubleshoot the data flow? (ID-NTIA-477) 503. A technician is sent to a remote office to set up a device to connect to the Internet. The company standards document requires stateful inspection. Which of the following should the technician install? (ID-NTIA-519) 504. Which of the following occurs when antenna gain is increased on an access point? (ID-NTIA-463) 505. A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used? (ID-NTIA-454) Question 505 Explanation:Simple Network Management Protocol (SNMP) 506. Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the most likely cause of the problem? (ID-NTIA-511) 507. A server with Microsft Windows Server Datacentre edition is set up as a Domain Controller and primary gateway between all computers and devices within the LAN infrastructure. Which of the following networking devices offers the ability to increase both performance and security? (ID-NTIA-136) 508. A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem? (ID-NTIA-298) 509. Which of the following protocols is related to the term open relay? (ID-NTIA-414) 510. Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations? (ID-NTIA-50) 511. A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt next? (ID-NTIA-324) 512. Which of the following attack types involves the modification of a legitimate software product? (ID-NTIA-91) 513. A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update? (ID-NTIA-267) 514. If you are a System Administrator for a critical high availability IT infrastructure, which of the following types of patches you would least likely to install unless there is a specific reason to do so? (ID-NTIA-79) Question 514 Explanation:If the system is working as it should, updating drivers may lead to instability. Unless there is a bug in the drivers, most IT professionals will postpone for forgo driver updates. Feature updates typically do not lead to instabilities. Other listed updates above are critical to keeping all systems running smoothly. 515. A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would best accomplish this objective? (ID-NTIA-312) 516. Which of the following ports is used by HTTPS by default? (ID-NTIA-05) 517. Which of the following is the prefix for a link-local IPv6 address? (ID-NTIA-458) 518. A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement? (ID-NTIA-386) 519. Which of the following addresses is a class B private address? (ID-NTIA-504) 520. Which of the answers listed below refer to iptables? Choose all correct answers. (ID-NTIA-329 521. Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? (ID-NTIA-225) 522. What is the function of the tool shown in the following figure? (ID-NTIA-78) Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html A. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. B hen you place the tool at one end of a wire, it generates a tone that can be detected at the other end. C. To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. D. By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. Question 522 Explanation:This is known as lineman’s handset or more commonly known as a butt-set. 523. Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium? (ID-NTIA-23) 524. What is the fastest way for validating a digital certificate? (ID-NTIA-230) Question 524 Explanation:Online Certificate Status Protocol (OCSP) 525. Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment? (ID-NTIA-402) 526. Answer the following question based on the network diagram below. Assuming all Workstations receives their internal IP from the DHCP server within the router, which of the following is the most likely IP address of Workstation 5? Click on the image if it is hard to read. (ID-NTIA-36) A. 192.168.0.55 B. 192.168.0.1 C. 10.1.1.255 D. 10.1.0.255 E. 192.168.1.109 527. Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address? (ID-NTIA-162) 528. Which of the following commands enables you to view the ARP table stored in memory? (ID-NTIA-82) 529. Which of the following communication media can carry many voice, data, and video channels simultaneously over multiple frequencies? (ID-NTIA-357) 530. Which of the following commands displays all environment and shell variables? (ID-NTIA-415) 531. According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? Choose all correct answers. (ID-NTIA-390) 532. Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable? (ID-NTIA-42) 533. Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the fastest method possible? (ID-NTIA-426) 534. A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use? (ID-NTIA-429) Question 534 Explanation:Some argue for iSCSI. Note the question refers to ‘storage standards’ not packets carriers Which network protocol enables encapsulation of PPP frames within 802.3 frames?Which network protocol enables encapsulation of PPP frames within 802.3 frames? Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.
Which network protocol enables detection of packet loss?The Transmission Control Protocol (TCP) detects packet loss and performs retransmissions to ensure reliable messaging.
Which of the following answers refers to a protocol used for establishing a dedicated point to point link between two networked devices?Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices? MLPPP provides a method for combining two or more physical communication links into one logical interface for the purpose of improved speed and redundancy.
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.
|