After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds. Which of the following should the technician check to troubleshoot the issue?
#271
Answer: A✅ Correct❌ Incorrect
Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
#272
Answer: B✅ Correct❌ Incorrect
An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?
#273
Answer: B✅ Correct❌ Incorrect
A firewall administrator is mapping a server's internal IP address to an external IP address for public use. Which of the following is the name of this function?
#274
Answer: A✅ Correct❌ Incorrect
A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?
#275
Answer: C✅ Correct❌ Incorrect
Which of the following best represents north-south traffic?
#276
Answer: A✅ Correct❌ Incorrect
Which of the following provides an opportunity for an on-path attack?
#277
Answer: C✅ Correct❌ Incorrect
A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten uses. Each user will have two IP addresses, one computer, and one phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?
#278
Answer: B✅ Correct❌ Incorrect
A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?
#279
Answer: C✅ Correct❌ Incorrect
The network engineering team needs to implement a wireless network within two separate buildings. Once the network is set up, users will need to authenticate using RADIUS in order to access internal resources. Which of the following wireless technologies should the team implement?
#280
Answer: B✅ Correct❌ Incorrect
A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?
#281
Answer: C✅ Correct❌ Incorrect
A security administrator is looking for rogue servers on the network and would also like to determine which services are running on those servers. Which of the following software tools should the administrator use?
#282
Answer: B✅ Correct❌ Incorrect
A network administrator needs to secure SNMP access with authentication and encryption. Which of the following should the administrator use?
#283
Answer: A✅ Correct❌ Incorrect
A user’s desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following configurations is required?
#284
Answer: C✅ Correct❌ Incorrect
A network technician is configuring the company's network 100Mbps port Layer 2 switches. The technician wants increased throughput for the uplinks between switches. The technician connects multiple redundant links between the switches. Which of the following should the technician configure?
#285
Answer: A✅ Correct❌ Incorrect
Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?
#286
Answer: B✅ Correct❌ Incorrect
Some of the 20 employees who use the wireless network report they are unable to access network resources even though the wireless network is available. An administrator recently made the following configuration changes to the wireless DHCP server:Network: 192.168.100.0 -Mask: 255.255.255.240 -Gateway: 192.168.100.1 -Which of the following is the cause of this issue?
#287
Answer: C✅ Correct❌ Incorrect
Which of the following typically uses compromised systems that become part of a bot network?
#288
Answer: B✅ Correct❌ Incorrect
Which of the following network ports is used when a client accesses an SFTP server?
#289
Answer: A✅ Correct❌ Incorrect
Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?
#290
Answer: D✅ Correct❌ Incorrect
Which of the following is the step that a troubleshooter should take immediately after implementing a solution?
#291
Answer: C✅ Correct❌ Incorrect
Users can usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?
#292
Answer: C✅ Correct❌ Incorrect
Which of the following is the OSI model layer that uses a connectionless protocol for packet delivery?
#293
Answer: B✅ Correct❌ Incorrect
A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?
#294
Answer: D✅ Correct❌ Incorrect
Which of the following are benefits of implementing MFA and SSO in an enterprise environment?
#295
Answer: B✅ Correct❌ Incorrect
Users report connectivity issues after a network switch is replaced. There are three separate subnets for users, voice, and servers. The users cannot reach the resources in the server subnet. Upon investigation, a separate voice switch has thousands of discarded packets, but no users report issues making or receiving calls. Which of the following is most likely the issue?
#296
Answer: C✅ Correct❌ Incorrect
A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the following subnets should the administrator use?
#297
Answer: B✅ Correct❌ Incorrect
Which of the following will allow secure, remote access to internal applications?
#298
Answer: A✅ Correct❌ Incorrect
A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?
#299
Answer: D✅ Correct❌ Incorrect
A network engineer wants to implement a secure solution that provides authentication and encryption to gather and monitor logs within the company network. Which of the following tools will accomplish this task?