COMPTIA Network Exam
How many bits of a class A IP address are used for host information? -24 bits -16 bits -32 bits -8 bits
24 bits
What decimal number corresponds to the binary number 11111111? -256 -255 -127 -11,111,111
255
What is one advantage offered by VDI over RDS and VNC? -Supports remote access to mobile devices -Provides open source flexibility -Offers access to multiple OSs in VMs -Allows multiple users to sign in at once
Offers access to multiple OSs in VMs
Which type of DoS attack orchestrates an attack bounced off uninfected computers? -DRDoS attack -PDoS attack -FTP bounce -Ransomware
DRDoS attack
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network? -Default gateway -DHCP server -DNS server -Root server
Default gateway
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? -Time to Live -Traffic Class -Priority Code Point -DiffServ
DiffServ
When shopping for a new router, what does the MTBF tell you? -How long it will usually take to repair that device -How long devices like this one will last on average until the next failure -How much it will cost to repair that device -How long until that device fails
How long devices like this one will last on average until the next failure
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? -ifconfig /release -ipconfig /release -ipconfig /renew -ifconfig /renew
ipconfig /release
Which policy ensures messages are discarded when they don't match a specific firewall rule? -Explicit deny -Implicit allow -Implicit deny -Explicit allow
Implicit deny
What information in a transmitted message might an IDS use to identify network threats? -Signature -FIM - Port mirroring -ACL
Signature
Which protocol's header would a layer 4 device read and process? -ARP -TCP -IP -HTTP
TCP
Which of the following wireless technologies does not use the 2.4 GHz band? -ZigBee -Z-Wave -Bluetooth -Wi-Fi
Z-Wave
Which of these commands has no parameters in Windows? -ipconfig -hostname -nslookup -ping
hostname
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack? -AC adapter -Rack ears -Large fans -Padded feet
rack ears
Which of these categories of twisted-pair cable can support Gigabit Ethernet? -Cat 6, Cat 7a, Cat 5 -Cat 5e, Cat 6a, Cat 7 -Cat 5e, Cat 6, Cat 3 -Cat 5, Cat 6, Cat 7
Cat 5e, Cat 6a, Cat 7
What type of attack relies on spoofing? -Deauth attack -Pen testing -Tailgating -Friendly DoS attack
Deauth attack
What is the first step of inventory management? -List all components on the network -List an administrative account's username and password for each device on a network -Interview users -Identify network requirements
List all components on the network.
Which of these is considered a secure place to store a list of documented network passwords? -Sticky note under the keyboard -CEO's smartphone -MDF -Password manager
A password manager
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? -Guest network -Evil twin -Captive portal -Brute force attack
Evil twin
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself? -2000::/3 -::1/128 -FE80::/64 -FF00::/8
FE80::/64
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? -BYOD -NDA -MDM -AUP
NDA
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack? -Cat 5e twisted-pair cable -Cat 6 twisted-pair cable -Passive twinaxial cable -RG-6 coaxial cable
Passive twinaxial cable
What specifications define the standards for cable broadband? -DOCSIS -PSTN -FTTC -HFC
DOCSIS
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? -Top listeners -Top talkers -Jabbers -Giants
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? -Flow control -Power management -Congestion control -Traffic shaping
Traffic shaping
What is the Internet standard MTU? -65,535 bytes -9,198 bytes -1,522 bytes -1,500 bytes
1,500 bytes
Which protocol replaced TKIP for WPA2? -RC4 -CCMP -WEP -RADIUS
CCMP
Which Carrier Sense technology is used on wireless networks to reduce collisions? -SSID -CSMA/CA -EAPoL -CSMA/CD
CSMA/CA
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? -Cold site -Hot site -Standby site -Warm site
Cold site
What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable? -Dirty connectors -Fiber type mismatch -Wavelength mismatch -TX/RX reverse
Fiber type mismatch
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? -Generator -Dual power supplies -Standby UPS -Online UPS
Online UPS
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this? -Tailgating -Quid pro quo -Baiting -Phishing
Phishing
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? -Channel -RSSI -EIRP -Band
RSSI
What method does a GSM network use to separate data on a channel? -SIM -TDMA -TDM -CDMA
TDMA
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? -iPerf -NetFlow -Wireshark -Spiceworks
Wireshark
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet? -VoIP phone -Voice gateway -Dedicated telephone switch -Legacy PBX
voice gateway
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? -10 bits -0 bits -8 bits -9 bits
8 bits
A routing protocol's reliability and priority are rated by what measurement? -MTU -Latency -AD -Routing table
AD
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? -SYN flags -Application data -ICMP message -Destination IP address
Application data
Which log type is used to prove who did what and when? -System log -Audit log -Syslog -Traffic log
Audit log
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? -BGP -OSPF -IP -RIPv2
BGP
Which transmission characteristic is never fully achieved? -Bandwidth -Latency -Throughput -Bit rate
Bandwidth
Which assignment technique requires a RADIUS server? -Static VLAN assignment -Dynamic IP address assignment -Dynamic VLAN assignment -Static IP address assignment
Dynamic VLAN assignment
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them? -Work area -CEO's office -EF -IDF
EF
When a router can't determine a path to a message's destination, where does it send the message? -Gateway of last resort -Administrative distance -Routing table -Default gateway
Gateway of last resort
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? -Vulnerability -Insider threat -Principle of least privilege -Denial of service
Insider threat
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? -Integrity -Confidentiality -Symmetric -Availability
Integrity
Active Directory and 389 Directory Server are both compatible with which directory access protocol? -LDAP -AD DS -RADIUS -Kerberos
LDAP
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? -Layer 4 -Layer 5 -Layer 2 -Layer 3
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? -Layer 2 -Layer 3 -Layer 4 -Layer 1
Layer 3
At what layer of the OSI model do proxy servers operate? -Layer 4 -Layer 3 -Layer 2 -Layer 7
Layer 7
What do well-chosen subnets accomplish? -IP address spaces overlap for easier management. -Network documentation is easier to manage. -Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. -Problems affect the entire network, making them more difficult to pin down.
Network documentation is easier to manage.
At which OSI layer does IP operate? -Network layer -Application layer -Data link layer -Transport layer
Network layer
Which OSI layer is responsible for directing data from one LAN to another? -Network layer -Physical layer -Transport layer -Data link layer
Network layer
Which cloud service model gives software developers access to multiple platforms for testing code? -XaaS -IaaS -PaaS -SaaS
PaaS
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. -Security audit -Vulnerability assessment -Red team-blue team exercise -Pen testing
Pen testing Red team-blue team exercise
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? -Data breach -Exploit -Posture assessment -Security audit
Posture assessment
Which DNS server offers the most current resolution to a DNS query? -Root DNS server -Caching DNS server -TLD DNS server -Primary DNS server
Primary DNS server
Which type of switch connects all devices in a rack to the rest of the network? -Spine switch -Core switch -EoR switch -ToR switch
ToR switch
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? -TDR -Tone locator -Tone generator -Toner
Tone locator
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? -Virtual load balancer -Virtual firewall -Virtual switch -Virtual router
Virtual switch
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? -access-list acl_2 permit icmp any any -access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www -access-list acl_2 permit https any any -access-list acl_2 deny tcp any any
access-list acl_2 permit https any any
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? -Plenum-rated cable -Patch cable -Fiber-optic cable -Backbone cable
patch cable
Which fiber connector contains two strands of fiber in each ferrule? -SC -LC -ST -MT-RJ
MT-RJ
Which port mode on a switch enables that port to manage traffic for multiple VLANs? -Access -Private -Community -Trunk
Trunk
Which type of DNS record identifies an email server? -PTR record -MX record -AAAA record -CNAME record
MX record
Which of the following is not one of the AAA services provided by RADIUS and TACACS+? -Accounting -Authorization -Administration -Authentication
Administration
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? -No devices -All devices on the internet -The one device that is configured with this IP address -All devices on your local network
All devices on your local network
Which formulas can be used to calculate the magic number? Choose two -256 - the interesting octet -2h -2h - 2 -2n
256 - the interesting octet 2h
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? -802.11b -802.11ax -802.11g -802.11ac
802.11ax
Which of these cellular technologies offers the fastest speeds? -CDMA -LTE-A -GSM -4G-LTE
LTE-A
Which of the following is considered a secure protocol? -FTP -SSH -Telnet -HTTP
SSH
Which device would allow an attacker to make network clients use an illegitimate default gateway? -RA guard -DHCP server -Network-based firewall -Proxy server
DHCP server
What is the formula for determining the number of possible hosts on a network? -2h = Z -2h - 2 = Z -2n = Y -2n - 2 = Y
2h - 2 = Z
Which encryption protocol does GRE use to increase the security of its transmissions? -SSH -SSL -SFTP -IPsec
IPsec
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? -Load balancer -Firewall -Router -Switch
Load balancer
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? -Logic bomb -Ransomware -Virus -Worm
Logic bomb
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply. -PowerShell -Microsoft Edge -Command Prompt -Zenmap
PowerShell, Command Prompt, Zenmap
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? -Rogue AP -Evil twin -War driving -Hidden node
Rogue AP
Which kind of multiplexing assigns slots to nodes according to priority and need? -CWDM (coarse wavelength division multiplexing) -WDM (wavelength division multiplexing) -TDM (time division multiplexing) -STDM (statistical time division multiplexing)
STDM (statistical time division multiplexing)
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? -Smart locker -Access control vestibule -Locking rack -Locking cabinet
Smart locker
What kind of device can monitor a connection at the demarc but cannot interpret data? -CSU/DSU -Line driver -DTE -Smartjack
Smartjack
What kind of route is created when a network administrator configures a router to use a specific path between nodes? -Trace route -Default route -Static route -Dynamic route
Static route
Which of the following devices are you likely to find in the MDF? Choose all that apply. -Switches -Routers -Network Printer -KVM switch
Switches, Routers, KVM switch
Which part of a MAC address is unique to each manufacturer? -The OUI -The network identifier -The physical address -The device identifier
The OUI
Who is responsible for the security of hardware on which a public cloud runs? -It depends -Both the cloud customer and the cloud provider -The cloud customer -The cloud provider
The cloud provider
Which hexadecimal block in an IPv6 address is used for the Subnet ID? -The fourth one -The first one -The third one -The eighth one
The fourth one
Which of the following is not a good reason to segment a network? -To narrow down the location of problems on a network -To limit access to broadcast domains -To reduce the demand on bandwidth -To increase the number of networking devices on a network
To increase the number of networking devices on a network
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address? -arp -a -telnet 192.168.1.56 -netstat -n -tracert 192.168.1.56
arp -a
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? -Terminal emulation -SDN (software-defined networking) -Hypervisor -NFV (Network Functions Virtualization)
Hypervisor
Which two protocols manage neighbor discovery processes on IPv4 networks? -NDP and Ethernet -IPv4 and IPv6 -TCP and UDP -ICMP and ARP
ICMP and ARP
Which kind of crosstalk occurs between wire pairs near the source of the signal? -Alien -TX/RX reverse -FEXT -NEXT
NEXT
Which one of the following wireless transmission types requires a clear LOS to function? -NFC -Bluetooth -Wi-Fi -IR
IR
What information does the switchport port-security command use to restrict access to a switch's interface? -IP address -MAC address -Port number -Broadcast address
MAC address
With which network connection type does the VM obtain IP addressing information from its host? -Managed mode -Bridged mode -NAT mode -Isolation mode
NAT mode
Which function of WPA/WPA2 security ensures data cannot be read in transit? -Encryption -Key distribution -Message integrity -Authentication
Encryption
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? -Stop-and-wait -Choke packet -Go-back-n sliding window -Selective repeat sliding window
Selective repeat sliding window
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin? -White/green -Brown -Blue -White/orange
White/green
Which cloud management technique executes a series of tasks in a workflow? -Automation -Orchestration -SLA -IaC
Orchestration
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters? -Cat 6 -Cat 7 -Cat 6a -Cat 5e
Cat 6a
What type of diagram shows a graphical representation of a network's wired infrastructure? -Nework map -Rack diagram -Netowrk topology -Wiring diagram
Wiring diagram
Which IEEE standard determines how VLANs work on a network? -802.1Q -802.3af -802.1X -802.11
802.1Q
Which remote file access protocol is an extension of SSH? -SFTP -TFTP -HTTPS -FTPS
SFTP
Which of the following features of a network connection between a switch and server is not improved by link aggregation? -Availability -Bandwidth -Speed -Fault tolerance
Speed
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? -The web server and primary DNS server because the web server is requesting zone transfers from the primary DNS server -The caching and primary DNS servers because the caching server is requesting zone transfers from the primary server -The root and primary DNS servers because the primary server is requesting zone transfers from the root server -The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? -Principle of least privilege -Shared responsibility model -Separation of duties -Defense in depth
Separation of duties
What command requests the next record in an SNMP log? -SNMP Trap -SNMP Get Next -SNMP Get Response -SNMP Get Request
SNMP Get Next
What port do SNMP agents listen on? -Port 161 -Port 20 -Port 162 -Port 21
Port 161