B.4 CompTIA Network+ N10-008 Certification Practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following statements about DSCP are true? (Select two.)

Classification occurs at Layer 3. It uses the DiffServ field to add precedence values.

You are running a packet sniffer on your workstation so you can identify the types of traffic on your network. You expect to see all the traffic on the network, but the packet sniffer only seems to be capturing frames that are addressed to the network interface on your workstation. Which of the following must you do in order to see all the network traffic?

Configure the network interface to use promiscuous mode.

Which of the following prevents access based on website rating and classification?

Content filter

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do?

Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

In a large organization, a group of servers are running critical applications that are essential for the company's operations. The IT manager wants to ensure these servers are updated only after thorough vetting of the updates to minimize potential downtime. Which update ring should the IT manager use for these servers?

Critical

You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

Which OSI model layer is a switch associated with?

Data Link; layer 2

Which of the following is an attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial-of-service attack

Which backup strategy backs up only files that have the archive bit set and does not mark them?

Differential

Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference?

Error rate

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again?

Firewall

Which type of virtualization completely simulates a real physical host?

Full virtualization

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible? (Select two.)

GBIC SFP

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer?

Go to Programs and Features in Control Panel.

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

2.4 GHz 5.75 GHz

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components should be part of your design? (Select two.)

802.1x AES encryption

Which of the following is true about a community string?

A community string identifies devices under the same administrative control.

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Hosts use ARP to resolve known IP addresses into MAC addresses.

Which of the following devices does not segment the network?

Hub

Which of the following tests can be performed by a TDR? (Select two.)

Identify the location of a fault on a cable. Measure the length of a cable.

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?

If the network is connected to the internet using multiple ISPs.

Kate, a network administrator, has been tasked with staying within the company budget. She has a large network and doesn't want to spend more than she needs to on purchasing and registering multiple public IP addresses for each of the hosts on her network. Which of the following methods could help her provide internet access but also keep costs low and limit the number of registered IP addresses her organization needs to purchase?

Use Network Address Translation.

You manage a network that uses a single switch. All ports within your building connect through that switch. In the lobby, there are also three RJ45 ports connected to the switch. You want to allow visitors to plug in to these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement?

VLANs

Which component is MOST likely to allow physical and virtual machines to communicate with each other?

Virtual switch

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of attack BEST describes the scenario?

Whaling

Which command displays network activity statistics for TCP, UDP, and IP?

netstat -s

You work in an office that uses Linux and Windows servers. The network uses the TCP/IP protocol. You're sitting at a workstation that uses Windows 10, but an application that you're using is unable to contact a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

ping

You've heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to an attacker. Which log should you monitor?

ping

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the account manager's email address?

[email protected]

Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

two

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output?

-SX port 443

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall-content filter all-in-one device has been implemented

-relocate the switch to the locked server closet-control access to the work area with locking doors and card readers

Incorrect Match the Class of Service (CoS) priority on the left with its corresponding value on the right.

0 Background 1 Best effort 2 Excellent effort 3 Critical applications 4 Video (< 100ms latency) 5 Voice (< 10ms latency) 6 Internetwork control 7 Network control

Which of the following BEST describes the main purpose of the codec used in VoIP?

An algorithm to compress data in order to save on bandwidth.

You administer a network with Windows Server 2016, UNIX servers, and Windows 10 Professional, Windows 8, and Macintosh clients. A Windows 8 computer user calls you one day and says that he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 Ethernet adapter: IP address. . . . . . . . . : 169.254.1.17Subnet Mask . . . . . . . . : 255.255.0.0Default Gateway . . . . . . : You also check your NIC and see that the link light is on. What might the problem be in this scenario?

An unavailable DHCP server

Incorrect Which IDS method defines a baseline of normal network traffic and then looks for anything that falls outside of that baseline?

Anomaly-based

Which of the following is a protocol used for terminal emulation?

SSH

Which of the following network services or protocols uses TCP/IP port 22?

SSH

Which of the following controls is an example of a physical access control method?

Locks on doors

Cheryl needs a solution for file shares and data storage. The solution needs to provide fast I/O for the network users and needs to be secure. What is the BEST solution?

NAS

Which of the following is a method that allows you to connect a private network to the internet without obtaining registered addresses for every host?

NAT

Which of the following devices operate at the Data Link layer of the OSI model? (Select three.)

Network interface cards (NICs), Switches, Bridges

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task?

Network segmentation

Which of the following terms identifies the network of dial-up telephone and long-distance lines?

PSTN

Which options are you able to set on a firewall? (Select three.)

Packet destination address Port number Packet source address

You're adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You'd like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum-rated cable

Which of the following features do digital IP phones use to supply power through a switch port?

PoE

A new law was recently passed requiring that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

Policy

Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment?

Protocol data unit (PDU)

Which of the following protocols or services would you associate with Windows Remote Desktop network traffic?

RDP

You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms BEST describes this software?

Rootkit

You have a small network that's connected to the internet, as shown in the exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the internet. Which address would you use for the default gateway address?

The IP address assigned to Fa0/0 on Router1.

You have been struggling to keep the temperature in your server room under control. To address this issue, you've decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)

The front of your servers should face the cold aisle. The rear of your servers should face the hot aisle.

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults. Which of the following might you suspect is the cause of the connectivity problems?

There are overlapping channels.

Which of the following is considered part of a smart home?

Thermostat

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will run through the suspended tile ceiling in the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device on the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.)

You should implement redundant power supplies for the network devices. You should implement a UPS between the wall outlet and the network devices

Which two commands do you use to force a new IP configuration? (Select two.)

ipconfig /release ipconfig /renew

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?

netstat


Conjuntos de estudio relacionados

Social studies "a more perfect union" flocabulary answers

View Set

Econ chapter 4 (elasticity of supply)

View Set

match element in column a with column B that has the same chemical properties

View Set