CompTIA Network+ Exam Walkthrough CompTIA Network+ Practice Test Take the Network+ course here. Back to Exams Check out our CompTIA Network+ video and lab course by clicking on 'Courses' above. Our book for the Network+ are all available on Amazon. Click the image to read more. 1. Which of the following protocols is the best known protocol for secure remote login to a computer systems?SSHTelnetFTPRDPSMTPQuestion 1 of 90 2. Regarding protocols and ports, click on the correct port for each protocol to select the correct answer (click again to unselect).FTP TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectSSH TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectHTTP TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectHTTPS TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectDNS TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectNTP TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectSMTP TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectTFTP TCP/80UnselectUDP/69UnselectTCP/25UnselectTCP/21UnselectTCP/443UnselectTCP/22UnselectUDP/53UnselectUDP/123UnselectQuestion 2 of 90 3. Which of the following are UDP header fields?Source port numberDestination port numberLength of dataChecksumSequence numberAcknowledgment numberControl flagsWindow sizeQuestion 3 of 90 4. Which of the following are characteristics of TCP protocol?ReliableConnectionlessSegment retransmissionWindowingNo acknowledgementNo segment sequencingQuestion 4 of 90 5. Put the following OSI layers in order from layer 7 to 1. Presentation Data Link Transport Session Physical Network Application Question 5 of 90 6. Click on the correct PDU for each OSI model layer (click again to unselect).Physical Layer frameUnselectdataUnselectsegmentUnselectpacketUnselectbitUnselectData Link Layer frameUnselectdataUnselectsegmentUnselectpacketUnselectbitUnselectNetwork Layer frameUnselectdataUnselectsegmentUnselectpacketUnselectbitUnselectTransport Layer frameUnselectdataUnselectsegmentUnselectpacketUnselectbitUnselectSession Layer frameUnselectdataUnselectsegmentUnselectpacketUnselectbitUnselectQuestion 6 of 90 7. Which of the following statements provide Layer 5 protocols?L2TPNetBIOSUDPHTMLXMLPOP3Question 7 of 90 8. You need to increase the uplink capacity between two switches, where the uplink is dropping packets due to the high utilization. Which solution can be used to increase the uplink capacity?Link Aggregation (802.3ad)Virtual LANs (VLANs)TrunkingPower over EthernetSpanning Tree Protocol (STP)Question 8 of 90 9. You have some issue with a specific server and needs to analyze the traffic to identify what is causing the issue. What should you do in order to troubleshoot without any disruption?Configure port mirroring on the switch where the server is connected in order to get all the traffic which is being sent to it.Configure port mirroring in all uplink ports on network switches to get all the network traffic to analyze it.Plug a hub on the server port to get all the traffic to the server.Configure port mirroring on the router used as the default gateway of the network, to analyze al the network traffic.Question 9 of 90 10. You are the network administrator of a small company and you're also responsible by network security.You need to make sure just employees are using the corporate network to protect your company data. Which security feature should you use?802.1xPort monitoringDAIPort securityACLQuestion 10 of 90 11. Regarding Spanning-tree protocol (STP), which of the following statements are true?Every non-root bridge has a single root port.Root port is the port closest to the root bridge in terms of cost.All ports on root bridge are designated ports.All ports on non-root bridge are designated ports.Every non-root bridge has a single designated port.Question 11 of 90 12. You have the following scenario, where you need to define the subnets to be used in a new office.The 192.168.123.0/24 prefix is available for this office and the transit VLAN was already configured during the initial setup.Select the statement where the subnets were defined to fit the requirements as per the picture below.VOICE VLAN - 192.168.123.32/27DATA VLAN - 192.168.123.64/26WIRELESS VLAN - 192.168.123.128/25VOICE VLAN - 192.168.123.16/28DATA VLAN - 192.168.123.64/26WIRELESS VLAN - 192.168.123.128/25VOICE VLAN - 192.168.123.0/27DATA VLAN - 192.168.123.64/26WIRELESS VLAN - 192.168.123.128/25VOICE VLAN - 192.168.123.32/28DATA VLAN - 192.168.123.64/26WIRELESS VLAN - 192.168.123.128/25Question 12 of 90 13. You have defined the subnet 192.168.123.32/27 as the prefix to be used for VOICE devices. Which subnet mask you need to use on the L3 interface configuration?255.255.255.224255.255.255.240255.255.255.192255.255.255.248Question 13 of 90 14. Which of the following are private subnets, as per RFC1918 definition?192.168.0.0/1610.0.0.0/8172.16.0.0/12202.0.0.0/8192.0.0.0/8172.32.0.0/12Question 14 of 90 15. Considering the following physical LAN topology, which statements below provides its name and characteristics.StarRingBusMost popular physical LAN topology, where the devices connect to a single point.Most redundant topology, where every node connects to every other node.Uses a cable running in a circular loop.Question 15 of 90 16. Which of the following statements are considered logical topologies?BusStarHub-and-SpokeFull-MeshPartial-MeshQuestion 16 of 90 17. You need to setup the wireless network for the company. You already bought the Wireless Controller and the access points for it.Which type of wireless implementation you should use?Infrastructure ModeAd Hoc ModeWireless Mesh TopologyWireless Full-MeshAutonomousQuestion 17 of 90 18. You want to connect your bluetooth headset to your phone to listen some music. Which type of network you will need to use?PANLANWLANWANQuestion 18 of 90 19. Which statements are requirements to choose the number of APs needed for a new implementation and the best AP placement?Wireless Network Planning is required to prevent the APs from interfering with one another and still maintaining the desired coverage area.Wireless Site Survey is required to prevent the APs from interfering with one another and still maintaining the desired coverage area.Coverage should overlap between APs to allow uninterrupted roaming from one cell to another but can’t use overlapping frequencies.Coverage should not overlap between APs to allow uninterrupted roaming from one cell to another but can use overlapping frequenciesQuestion 19 of 90 20. You are analyzing your client´s wireless network. Based on the following information, what can you describe about the network?SSID: MyCorpSSIDAuth: WPA2-PSKPSK: MyCorp123Authentication is part of IEEE 802.11i standardIntegrity checking through CCMPUses Advanced Encryption Standard (AES)It uses 802.1x as authentication factorUses Message Integrity Check (MIC)Each wireless user authenticates with their own credentialsQuestion 20 of 90 21. Click on the correct example for each Cloud Service (click again to unselect).NaaS Microsoft AzureUnselectRed Hat OpenShiftUnselectAmazon´s VPCUnselectOffice 365UnselectIaaS Microsoft AzureUnselectRed Hat OpenShiftUnselectAmazon´s VPCUnselectOffice 365UnselectSaaS Microsoft AzureUnselectRed Hat OpenShiftUnselectAmazon´s VPCUnselectOffice 365UnselectPaaS Microsoft AzureUnselectRed Hat OpenShiftUnselectAmazon´s VPCUnselectOffice 365UnselectQuestion 21 of 90 22. Which of the following Cloud Connectivity technology has the lower cost and can be used through standard internet links to connect local resources to the Cloud environment?VPNAWS Direct ConnectGoogle Cloud Dedicated InterconnectMicrosoft Azure ExpressRouteQuestion 22 of 90 23. Select the best description to each DNS record type:stores a hostname and its corresponding IPv4 address NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectstores a hostname and its corresponding IPv6 address NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectused to alias a hostname to another hostname NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectspecifies an SMTP email server NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectprovides the address of the name server for the domain NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectreverse DNS lookup entry NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectservice location record NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectcarries machine-readable data such as opportunistic encryption NSUnselectPTRUnselectAAAAUnselectCNAMEUnselectTXTUnselectSRVUnselectAUnselectMXUnselectQuestion 23 of 90 24. In order to provide dynamic IP address to the hosts on DATA, VOICE and WIRELESS subnets, you are setting up a DHCP server on the switch.Which of the following options should you configure in the DHCP scope to be able to access the Internet and internal company servers?Default gatewaySubnet maskDNS serversDHCP option 82TFTP serverBootpQuestion 24 of 90 25. Which of the following are twisted pair cable connectors?RJ-45RJ-11DB-25LCSCGBICSFPQuestion 25 of 90 26. You are designing the architecture of a Datacenter and must define the UTP cable category to be purchased to connect the servers to the switch via 10GBaseT UTP ports. Which of the following should you use?Cat5Cat5eCat6Cat7Cat8Question 26 of 90 27. You connect two switches using an UTP cable and the port didn´t come up. You already checked and both switch ports are not disabled. What can be the issue?You used a Straight-Through cable and the switch doesn´t support MDIX or it´s disabled on the switch port.You used a crossover cable and the switches don´t support it.One of the switches is not powered.You didn´t configure the port properly as trunk.You need to reload the switches in order to connect them.Question 27 of 90 28. You have configured new VLANs for your office and the users which were migrated to this VLAN are complaining about the internet access, which is not working.Your field analyst did the first analysis and the websites are being resolved by DNS server but the users are not able to connect to it. Internal resources, like printers and corporate servers, are working fine. Other users VLANs are connecting to internet with no issues.Where can be the issue?FirewallDNS serverDHCP serverL3 switch routing tableQuestion 28 of 90 29. Which technology can be used to save company money and provide enhanced telephony services over the traditional PBX solution and which device can be used to accomplish this?VoIPIP TelephonySwitchVoIP gatewayAnalog PBXQuestion 29 of 90 30. You need to extend the coverage of a corporate wireless network and there is no cabling where you need to provide wireless. Which device can be used?Wireless Range ExtendersWireless AntennaWireless RouterUse the hotspot feature of a cell phone to provide internet connectivity through Wireless network.Question 30 of 90 31. You are setting up a new network, where you already configured the L3 switch and the router.All the clients are using the internet access with no issues, but they are exposed since there is no filter on it.What you should use to restrict the web access filtering undesired websites and contents, and log all client activities?Proxy ServerFirewallIDSIPSNGFWQuestion 31 of 90 32. Due to the pandemia, all employees of a company must work from home and you need to provide network connectivity for them. Which device do you need to provide this connectivity?VPN ConcentratorL3 SwitchRouterIDSIPSQuestion 32 of 90 33. Your company grows in the last months and you need to grow the external connection capacity to your company system.The infrastructure team ask you to use more servers in parallel to increase the capacity and provide a high availability to the application.Which network device you need to use to use all the servers in parallel without changing the way the clients access your company application?Load balancerFirewallProxy ServerRouterQuestion 33 of 90 34. Which software abstracts guest machines and the operating system they run on?hypervisorvirtual servervirtual switchvirtual suiteBoot loaderQuestion 34 of 90 35. Which of the following hypervisor can be considered as hosted hypervisor (or type-2)?Virtual BoxMicrosoft Hyper-VVMWare ESXiKVMXenQuestion 35 of 90 36. You need to allocate each virtual server to the proper VLAN on the same hypervisor. Which can be used to accomplish this?virtual switchvirtual lanvirtual routervirtual networkQuestion 36 of 90 37. You need to setup a SAN network and you have no budget to buy storage network devices.How can you do this?Running iSCSI on the existing ethernet network.Running fiber channel over the existent network.You can run SAN on ethernet devices, it´s compatible.Changing the ethernet cabling for fiber channels.Question 37 of 90 38. Which of the following technologies provides broadband internet connectivity through a traditional telephony structure using a modem?DSLT1E1ISDNQuestion 38 of 90 39. Which technology encapsulates PPP frames within Ethernet frames to provide internet service?PPPoEPPPoAATMISDNQuestion 39 of 90 40. You were requested to reduce the cost of wan link connectivity between the remote locations, head quarters and datacenters.The current solution is MPLS.Which solution could you use to generate the requested saving?DMVPNFrame-relayVPN Site-to-siteDedicated Leased LinesQuestion 40 of 90 41. Refer to the exhibit.Which type of document this picture represents?Logical TopologyPhysical TopologyChange managementRack TopologyQuestion 41 of 90 42. Refer to the exhibit.Which type of document this picture represents?Logical TopologyPhysical TopologyChange managementRack TopologyQuestion 42 of 90 43. Which of the following document is important to reduce impact of a downtime or network issues after the maintenance window? change managementasset managementinventoryStandard operating procedures/work instructionsQuestion 43 of 90 44. Which of the following document outlines how a business will continue operating during an unplanned disruption in service?business continuity plan (BCP)disaster recovery plan (DRP)High availability PlanRedundant PlanQuestion 44 of 90 45. Which of the following can be considered in a Business Continuity Plan document?Redundant internet linksRedundant core devices, like routers, firewalls and switchesRedundant connectivity between core devicesSecondary datacenter as a contingencyhow to respond to unplanned incidents such as natural disastersQuestion 45 of 90 46. What can be considered in a Business continuity plan to provide a redundant connectivity to physical servers?NIC teamingetherchannel802.1qload balancingQuestion 46 of 90 47. Which of the following can be used in the Business Continuity Plan in order to reduce the power outage risk?UPSPower generatorsDual power suppliesDual power outletsQuestion 47 of 90 48. Which tools can be used to periodically test the network to verify that network security components are behaving as expected and to detect known vulnerabilities?NessusZenmapKaliKerberosQuestion 48 of 90 49. Which is the best definition of patching process?Designed to correct a known bug or fix a known vulnerability in programs and appsPeriodically test the network to verify that network security components are behaving as expected and to detect known vulnerabilitiesAttackers use their resources attacking the honey pot and leave the real servers aloneReduces unauthorized accessQuestion 49 of 90 50. Select the backup type associated to each description (click again to unselect).Complete backup is the safest and most comprehensive IncrementalUnselectFullUnselectSnapshotsUnselectDifferentialUnselectBackup only data changed since last backup IncrementalUnselectFullUnselectSnapshotsUnselectDifferentialUnselectOnly backups data since the last full backup IncrementalUnselectFullUnselectSnapshotsUnselectDifferentialUnselectRead-only copy of data frozen in time (VMs) IncrementalUnselectFullUnselectSnapshotsUnselectDifferentialUnselectQuestion 50 of 90 51. The infrastructure team wants to access their Windows Servers from home, to be able to support after business hours.Which solution should be used to provide remote access to these servers?RDPClient-to-Site VPN and RDP over VPNSSHSite-to-Site VPNTelnetQuestion 51 of 90 52. Your company needs to open a new office for a few number of employees (about 10). Which is the best solution to connect this new office to your DC?Site-to-Site VPNClient-to-Site VPNSSL VPNSSHRDPQuestion 52 of 90 53. Which solution provides access to network devices either when the network is down, being able to connect to the devices remotely?Out-of-band ManagementClient-to-Site VPNSite-to-Site VPNRDPTelnetSSHQuestion 53 of 90 54. Which document is part of corporate security policy, makes employees aware of their obligations and must be signed by them during their onboarding?AUPUAPSecurity DefinitionsSecurity RulesUser RulesQuestion 54 of 90 55. In the last years the number of remote workers increase a lot and with number of remote employees the risk of loss of data or the exfiltration increases also.Which solution can help company´s data from loss and exfiltration?DLPfirewallsantivirusAMPSecurity PoliciesQuestion 55 of 90 56. Which of the following are examples of End-User Policies?Acceptable Use Policy (AUP)Privileged User AgreementNon-Disclosure (NDA)Remote AccessBYODQuestion 56 of 90 57. Which of the following are detection physical security devices?Video surveillanceAsset tracking tagsBadgesBiometricsLocksQuestion 57 of 90 58. Which of the following is a physical security device which provides authentication that is tied specifically to you as an individual?BiometricsBadgesSmart cardsLocksKey fobQuestion 58 of 90 59. Which of the following centralized authentication provides is an open standard and all-vendor supported?RADIUSTACACS+LDAPKerberosQuestion 59 of 90 60. Which of the following solution must be used in conjunction with SSL VPN to improve the security level of authentication?Multifactor AuthenticationAAARADIUSTACACS+Active DirectoryQuestion 60 of 90 61. Which solution can be used to improve wired network access security, asking users to login to allow to access the network before provide connectivity to their PC?802.1xPort-Securitymultifactor authenticationLDAPTACACS+RADIUSQuestion 61 of 90 62. You need to configure a new SSID for employees where the security level will be the best as possible, to keep the network secure.The authentication method must use AES as encryption method.Which authentication must you use in this new SSID?WPA2WPAWEPOpenLDAPQuestion 62 of 90 63. Which EAP method uses certificate to stablish the connection and is considered the most secure EAP method?EAP-TLSPEAPEAP-FASTEAP-MD5Question 63 of 90 64. Which malware denies a user access to their files by encrypting the files and then displaying a message demanding a compensation for the decryption key?AdwareRansomwareRootkitSpywareWormQuestion 64 of 90 65. Which attack attempts to manipulate individuals into performing actions or divulging confidential information?Social EngineeringMan-in-the-middleRansomwareRootkitInsider threatQuestion 65 of 90 66. Which action can be done to protect the company from social engineering attacks?User trainingDocumentationAntivirusSecurity actionAntimalwareQuestion 66 of 90 67. You need to install a new device in the network and must make sure all security best practices are being applied. Which of the following are good practices for network device hardening?Shutdown unused portsDeactivate unused servicesUpgrade the firmware before installing it in the networkConfigure an IP address to the deviceConfigure access-listsConfigure port-security on all portsQuestion 67 of 90 68. You are hardening the network devices and need to choose which protocol should be used for remote access to the devices. Select the most secure protocol to be used for CLI access to the network devices.SSHHTTPTelnetVNCRDPQuestion 68 of 90 69. Which mitigation technique avoid an attacker from getting information about DTP, CDP and VTP protocols plugging some PC to an unconfigured switch port?Changing native VLAN on the networkRemoving unused VLANsUsing port-security on switch portsusing part aggregationQuestion 69 of 90 70. You need to configure a new server to publish WWW service to the internet, configuring the proper ACL and NAT. What must be taken into consideration on the design of this solution?Create a DMZ network for servers which have published services.Configure IPS on the network firewallConfigure a honeypotDisable unused services on this server.Question 70 of 90 71. Which of the following is a mitigation technique used to attract cybercriminals to a server where there is a fake application, protecting the real systems from those attackers?HoneypotAMPNATDMZQuestion 71 of 90 72. Which switch configuration can secure the network from DHCP spoofing?DHCP snoopingport-securityconfigure a DHCP server on the switchACLBPDU guardQuestion 72 of 90 73. Regarding the network troubleshooting methodology, put the troubleshooting steps in the correct order. Identify the Problem Verify full system functionality and if applicable implement preventative measures Establish a theory of Probable Cause Establish a plan of action to resolve the problem and identify potential effects Test the theory to determine the cause Implement the solution or escalate as necessary Document findings, actions and outcomes Question 73 of 90 74. Some users are claiming about network issues and you need to identify what can be the issue. Which techniques can be used to identify it?Gather information about the current state of the networkDuplicate the problem on a test piece of hardware or software, if possible. Question users on the network to learn about the errors or difficulties they have encountered.Restart the network devicesUpdate networking devicesQuestion 74 of 90 75. Regarding network troubleshooting, there are some traditional CLI tools which are used by all network experts as the first resource when troubleshooting some issue.Which are they?pingtraceroutewire crimperssnifferProtocol AnalyserQuestion 75 of 90 76. Users are claim about the network when doing a meeting in a specific meeting room. You notice that all the users connect to the meeting via wireless connection.What tool can you use to identify what should be the issue in this case?Wifi AnalyzerProtocol AnalyzerPort ScannerPacket SnifferPingQuestion 76 of 90 77. You are troubleshooting a specific application issue where the users lose the connection when they are working into it.You already checked the reachability from layer 1 to 4, where you already did a telnet in the application port and the connection is closing as expected.Which tool can be used to proceed with the troubleshooting?Packet SnifferPingtracertPort ScannernetstatQuestion 77 of 90 78. You just install a new internet link with 1Gbps but the users are claiming about the connection speed.Which tool can be used to troubleshoot this issue?Bandwidth Speed TesterpingtraceroutetcpdumpCable testerQuestion 78 of 90 79. Refer to the exhibit.The host is unable to access internet. Select the correct statement about this issue and the first step to identify it.It´s a Data Link Layer issue, where there is a VLAN misconfiguration.It´s a Network Layer issue, where there is an IP misconfiguration.It´s a Network Layer issue, where there is a subnet mask misconfiguration.It´s a Physical Layer issue, where there is a port misconfiguration.It´s a Network Layer issue, where there is an VLAN misconfiguration.Question 79 of 90 80. The network field analyst just install a new switch and you didn´t see the neighbor switch via LLDP.You checked the interface and it seems the port is down.The transceiver is being identified and it seems to be ok.What can be done as the first step to troubleshoot this issue?change between TX and RX cables on one end of the fiberchange the fiber patch cord for a new onechange the transceiver on both endsshutdown and bring up the port on the switchQuestion 80 of 90 81. An user is complaining about the network performance.The following output is from the port connected to the user´s PC.What can be the issue in this case?Duplex/speed mismatchTX/RX reverseTransceiver mismatchVLAN mismatchBad portQuestion 81 of 90 82. You are troubleshooting a wireless issue where the network becomes unstable in a small office during the lunch time.During you visit for troubleshooting, you notice that the employees usually have lunch at the office and the microwaves is used to heat the food.Which issue you think they have on the wireless network?Radio frequency interference (RFI)Signal strength issuesChannel overlapFrequency mismatchRefractionQuestion 82 of 90 83. Regarding the issue where the microwaves interfere on wireless signaling, what can be done to solve this issue?Upgrade the network to 5 Ghz spectrumTurn off the microwavesAmplify the signaling strengthChange the signal frequencyQuestion 83 of 90 84. You are troubleshooting a wireless issue where some clients usually lost the connectivity to the wireless network.Analyzing all the cases in detail you figure out that there is no specific area where the issue is happening, but all users which have issues are using the same laptop model.What should you do to troubleshoot this issue?Update wireless adapter driver on the laptopsChange the laptops by a newest modelReconfigure wireless on those laptopsChange the authentication methodQuestion 84 of 90 85. Refer to the exhibit.Which statement best describes the best way to start the troubleshooting and which tools should be used in the process?Ipconfig tool should be used to check the gateway IP and the ping tool should be used to test if there is connectivity to the gateway.A cable tester tool should be used to check the host connectivity and the ping tool should be used to test if there is connectivity to the gateway.Packet Sniffer tool should be used to check the host connectivity and the ipconfig tool should be used to test if there is connectivity to the gateway.ping tool should be used to check the host connectivity, pinging any public IP.tracert tool should be used to check the host connectivity, using any public IP.Question 85 of 90 86. Refer to the exhibit.Users are complaining that they cannot access the internet.The network field analyst did an initial check and the hosts can ping either the gateway and the public IP 8.8.8.8.What can be the issue?Names are not resolvingInternet IPs are not reachableLatency is to highUnresponsive serviceHardware failureQuestion 86 of 90 87. Refer to the exhibit.Users are complaining that they cannot access the internet.The network field analyst did an initial check and the hosts can ping either the gateway and the public IP 8.8.8.8.You checked if the the host can ping www.google.com and it is responding.You tried to telnet the 443 and 80 port for www.google.com and none of them connect.What can be the issue now?Blocked TCP portsNames are not resolvingInternet IPs are not reachableLatency is to highUnresponsive serviceQuestion 87 of 90 88. You have being asked to check some weird behavior in the network.Users are getting IPs from subnet 10.0.0.0/24 where the corporate network configured and where there is a DHCP server is 192.168.10.0/24.What can be the issue?There is a rogue DHCP serverDHCP server is delivering wrong IP addressesThe DHCP scope is exhaustedThe IPs are being configured staticallyQuestion 88 of 90 89. You need to segment the network in different broadast domains, to avoid a great number of broadcast in the network.Which network device should be used?Multilayer switchWireless controllerLoad balancerUTM applianceNGFW/Layer 7 firewallQuestion 89 of 90 90. Which device should be used to implement DMVPN in a Cloud environement?Virtual switchVirtual firewallVirtual routerHypervisorVirtual NICQuestion 90 of 90 Loading...