Free Certification Practice Questions

COMPTIA-NETWORK

Loading…
A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?
#181
A new server is deployed in a trusted zone and is validated to be online with all appropriate services running. However, users in a perimeter network cannot access the server. Which of the following should a network administrator do to resolve the reported issue?
#182
Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?
#183
A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?
#184
A network engineer wants to implement a solution where all web servers will send event data over port 514. Which of the following services will accomplish this task?
#185
A security administrator wants to discover zero-day attacks before they can be used on the company’s network. Which of the following can the administrator use to accomplish this task?
#186
Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?
#187
A network administrator is trying to locate the switch interface a PC is connected to. The administrator accesses the local switch, pings the PC IP address, and then uses the command show arp. Which of the following commands should the administrator use next?
#188
A user attempts to log in to a corporate website by utilizing a shortcut. The shortcut has been used many times before. The user then notices some discrepancies on the company website. Which of the following is most likely the reason for this issue?
#189
Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?
#190
A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?
#191
Which of the following SD-WAN features allows a router to be shipped directly to the installation site and does not require site-level configuration?
#192
A network technician is troubleshooting network latency and has determined the issue to be occurring between two network switches (Switch10 and Switch11). Symptoms reported include poor video performance and slow file copying. Given the following information:Which of the following should the technician most likely do to resolve the issue?
#193
Which of the following types of routes will take precedence when building a routing table for a given subnet?
#194
Which of the following steps in the troubleshooting methodology comes after using a top-to-bottom examination of the OSI model to determine cause?
#195
Which of the following would an adversary do while conducting an evil twin attack?
#196
An ISP provided a company with an IP range of 98.174.235.142/28. A network technician configured a router with a subnet mask of 255.255.255.224 and default gateway of 98.174.235.129. After the configuration was set up. the company is unable to connect to the ISP. Which of the following would resolve this issue?
#197
A network administrator is troubleshooting a connection between two switches that is experiencing intermittent errors. The administrator needs to determine which port on the remote switch the faulty cable is connected to. Which of the following is the best tool to use to identify the error?
#198
Which of the following is a difference between EOL and EOS?
#199
A network architect is implementing an off-premises computing facility and needs to ensure that operation will not be impacted by major outages. Which of the following should the architect consider?
#200
A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?
#201
A small coffee shop wants to set up multiple 2.4GHz wireless access points. The access points will support a large number of users, and the network technician wants to mitigate interference as much as possible. Which of the following is the number of 22MHz channels that the equipment can support?
#202
A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?
#203
Which of the following are the main differences between ESP and AH?
#204
An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?
#205
Which of the following is the most closely associated with segmenting compute resources within a single cloud account?
#206
Which of the following is the most likely function to be decremented when a tool is used to measure the distance between two locations on the internet?
#207
A user's home mesh wireless network is experiencing latency issues. A technician has:• Performed a speed test.• Rebooted the devices.• Performed a site survey.• Performed a wireless packet capture.The technician reviews the following information:The technician notices in the packet capture that frames were retransmitted. Which of the following is the most likely cause of the user's network issue?
#208
A network engineer implements a 192.168.100.0/25 subnet for a building without obtaining sizing requirements. It is later determined that the building will house 700 people. Which of the following subnet masks will most efficiently support that number of people?
#209
A company is building a new campus that will have wired and wireless devices. The network will be designed to support casual internet usage for guests and break rooms for employees. Which of the following authentication methods is best suited for guests given the requirements of this scenario?
#210