Question 21
A technician is configuring a network switch to be used in a publicly accessible __cpLocation. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
Question 22
Which of the following is used to track and document various types of known vulnerabilities?
A. CVE
B. Penetration testing
C. Zero-day
D. SIEM
E. Least privilege
Question 23
The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
Question 24
A network engineer performs the following tasks to increase server bandwidth:
- Connects two network cables from the server to a switch stack
- Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
Question 25
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
A. 255.255.128.0
B. 255.255.192.0
C. 255.255.240.0
D. 255.255.248.0
Question 26
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492
C. 1500
D. 2304
Question 27
Given the following information:
Which of the following command-line tools would generate this output?
A. netstat
B. arp
C. dig
D. tracert
Question 28
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify full system functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine the cause
Question 29
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
A. Firewall
B. AP
C. Proxy server
D. IDS
Question 30
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber