B.4 CompTIA Network+ N10-008 Certification Practice Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which IDS traffic assessment indicates that the system identified harmless traffic as offensive and generated an alarm or stopped the traffic?

False positive

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature allows the switches to pass VLAN traffic between themselves?

Trunking

Which of the following time standards does NTP use?

UTC

You've just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files.

You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password in a new website so you can manage your email and spam using the new service. What should you do?

Verify that the email was sent by the administrator and that this new service is legitimate.

How many total channels (non-overlapping) are available for 802.11a wireless networks?

24

Drag each binary subnet mask on the left to its appropriate decimal equivalent on the right.

255.0.0.0 correct answer: 11111111.00000000.00000000.00000000 255.255.255.128 correct answer: 11111111.11111111.11111111.10000000 255.224.0.0 correct answer: 11111111.11100000.00000000.00000000 255.255.0.0 correct answer: 11111111.11111111.00000000.00000000 255.255.255.252 correct answer: 11111111.11111111.11111111.11111100

Which Class of Service (CoS) priority value should be assigned to a video conference call?

4

Which of the following BEST describes a MAC address?

A 48-bit number that serves as a unique identifier for network devices.

Which of the following best describes DHCP scope exhaustion?

A denial of service from a lack of IP addresses in a DHCP server's pool.

Which of the following is true about a network-based firewall?

A network-based firewall is installed at the edge of a private network or network segment.

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use?

Host-based firewall

Which of the following is true about single-mode fiber optic network cabling?

Which of the following is true about single-mode fiber optic network cabling?

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)

Which type of data will be transmitted on the network? How many devices will need to be supported? Is the size of the business expected to grow in the future?

You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

Which operating system does not use Syslog by default?

Windows

Which port number is used by SNMP?

161

A workstation has been assigned the following IP addressing information: IP address: 192.168.1.26 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.254 DNS server: 192.168.1.1 Given this information, what is this workstation's network IP address?

192.168.1.0

Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?

ACL

Which of the following components are the SIEM's way of letting the IT team know that a pre-established parameter is not within the acceptable range?

Alerts

Which of the following defines an Acceptable Use Agreement?

An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use.

Which of the following is true about an intrusion detection system?

An intrusion detection system monitors data packets for malicious or unauthorized traffic.

Which of the following functions are performed at the Physical layer of the OSI model?

Data movement across network cables

What do host-based intrusion detection systems often rely on to perform detection activities?

Auditing capabilities

Which deviation in power is the longest?

Blackout

Which of the following topologies connects all devices to a trunk cable?

Bus

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable that connects the computer to the network. Which type of document should you update?

Change documentation

What is spoofing?

Changing or falsifying information in order to mislead or re-direct traffic.

You are concerned that wireless access points might have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Check the MAC addresses of devices that are connected to your wired switch. Conduct a site survey.

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

A network device is given an IP address of 172.16.0.55. Which type of network is this device on?

Class B private network

When designing a firewall, what is the recommended approach for opening and closing ports?

Close all ports. Open only those ports required by applications inside the screened subnet.

Which of the following is true about half-duplex mode?

Collision detection is turned on.

You have configured a wireless access point to create a small network. For security reasons, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do?

Configure a profile on the wireless client.

You have hired 10 new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Configure day/time restrictions in user accounts.

Within an SDN, what is commonly referred to as the brains?

Controllers

You have a network with 50 workstations. You want to automatically configure the workstations with the IP address, subnet mask, and default gateway values. Which device should you use?

DHCP server

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast.

You would like to get a feel for the amount of bandwidth that you are using on your network. What is the first thing you should do?

Establish a baseline

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy?

Establish the symptoms.

You've just signed up for a broadband home internet service that uses coaxial cabling. Which connector type will you MOST LIKELY use?

F-type

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer?

Go to Programs and Features in Control Panel.

Which of the following do ACL scans filter by? (Select two.)

IP address Hostname

You have a small network with a single subnet connected to the internet, as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway and DNS1 as the DNS server address. From the drop-down menu options, select the appropriate parameters to configure the workstation's TCP/IP settings.

IP address incorrect answer. Correct Answer:192.168.12.46 Subnet mask incorrect answer. Correct Answer:255.255.255.240 Default gateway incorrect answer. Correct Answer:192.168.12.34 DNS server incorrect answer. Correct Answer:198.162.1.22

You have a workstation that's connected to a small branch network with a single switch. The network doesn't have any routers and isn't connected to the internet. What are the minimum configuration parameters required for the workstation to be able to communicate with all the hosts on the network?

IP address and subnet mask

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults. Which of the following might you suspect is the cause of the connectivity problems?

There are overlapping channels.

You are a network technician for a small consulting firm. One of your users is complaining that they are unable to connect to the local intranet site. After some troubleshooting, you've determined that the intranet site can be connected to by using the IP address but not the hostname. Which of the following would be the MOST likely reason for this?

Incorrect DNS settings

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take?

Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.)

Install racks with locking doors. Install a biometric lock on the data center door.

Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.

Layer 2 source address correct answer: 000b5f2a2222 Layer 3 source address correct answer: 192.168.11.11 Layer 2 destination address correct answer: 080046987654 Layer 3 destination address correct answer: 192.168.10.12

Which of the following OSI layers does a router operate at?

Layer 3

Which of the following describes a false positive when using an IPS device?

Legitimate traffic being flagged as malicious.

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Level 0

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

Load tester

What is the name of the computer that queries agents and gathers responses by sending messages?

Manager

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the new server in the accounting department. You check the problem and find out that her computer can't access any server on that subnet. However, her computer can access computers on other subnets as well as the internet. Which of the following is MOST likely the cause of the problem?

Missing route on the default gateway router.

Which address type do people use to support video conference calls consisting of multiple participants?

Multicast

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work?

No. The no shutdown command needs to be entered.

Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

One

Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks?

PAP

You have just installed a packet-filtering firewall on your network. Which options are you able to set on this firewall? (Select three.)

Packet source address Packet destination address Port number

At which layer of the OSI model do hubs operate?

Physical

Which pins on an RJ45 connector transmit data when they're used on a 100BaseT Ethernet network? (Select two.)

Pin 1 Correct Answer: Pin 2

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4

You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time. Which of the following should you do? (Select two.)

Point the cut side of the tool towards the wire end. Use a punch down tool with a notched blade.

Which of the following is a platform-independent authentication system that maintains a database of user accounts and passwords to centralize the maintenance of those accounts?

RADIUS

What is the main difference between RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol.

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall-content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two.)

Relocate the switch to the locked server closet. Control access to the work area with locking doors and card readers.

Which of the following are examples of Type 2 authentication credentials? (Select two.)

Smart card Photo ID

Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?

Sniffing

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

Which of the following features dynamically places switch ports in blocking or forwarding states?

Spanning Tree

You are configuring the DHCP relay agent role on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

What is a VPN (virtual private network) primarily used for?

Support secure communications over an untrusted network.

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?

The client system has moved too far away from the access point.

You have a WAN link that connects two sites. It's supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the link's actual bandwidth. Which tool should you use?

Throughput tester

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company's customer database. Which action should you take? (Select two. Each response is part of a complete solution.)

Train sales employees to use their own user accounts to update the customer database. Correct Answer: Delete the account that the sales employees are currently using.

Match the wireless signaling method on the left with its definition on the right. .

Transfers data over a radio signal by switching channels at random within a larger frequency band. FHSS Makes the transmitted bandwidth signal wider than the data stream needs. DSSS Encodes data over a wireless network using non-overlapping channels. OFDM

Your company is a small startup that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from the computers used by other companies. Which feature should you request to have implemented?

VLAN

You manage a network that uses a single switch. All ports within your building connect through that switch. In the lobby, there are also three RJ45 ports connected to the switch. You want to allow visitors to plug in to these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement?

VLANs

What is the main difference between vulnerability scanning and penetration testing?

Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.

You are worried about email spoofing. What can you put throughout an email's header that provides the originating email account or IP address and not a spoofed one?

X-headers

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you MOST LIKELY to experience?

echo

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?

netstat

Which TCP/IP utility gives you the following output?

netstat -r

Which command displays network activity statistics for TCP, UDP, and IP?

netstat -s


Conjuntos de estudio relacionados

Biology 1301 Final Exam-Connect Quiz

View Set

Health Assessment Ch. 13 Eye Assessment (Prep U)

View Set

hazmat #2, Hazardous material response!!!!!!!

View Set

comparison b/t ich gcp e6 and us fda regulations

View Set

Prepu Ch.53, 54 KIDNEY (Medsurg book)

View Set

Chapter 21-24 Economics Test Review

View Set

Lower Limb (Gray's Anatomy Review, BRS, Lippincott)

View Set

Intestinal Obstructions (Sherpath)

View Set