Network+ Review pt2

¡Supera tus tareas y exámenes ahora con Quizwiz!

While performing a penetration test, you came across a suspiciously vulnerable station. What is the station most likely to be? A. A honeypot B. A firewall C. A DMZ D. An old computer

A. A honeypot

Which of the following can prevent intrusion from an outside network to an internal network? A. A network sniffer B. Packet Dropping C. Packet Filtering D. A multilayer switch

A. A network sniffer

What is APIPA? A. A feature that generates addresses when a NIC fails to acquire a valid IP address. B. Random IP addresses. C. Specific IP addresses that allow temporary access tothe web. D. None of the above.

A. A feature that generates addresses when a NIC fails to acquire a valid IP address. pg107

What is a DHCP reservation? A. A specific IP address reserved for a specific MAC address. B. A specific MAC address reserved for a specific IP address. C. Blocks access to a specific IP address. D. Blocks access to a specific MAC address.

A. A specific IP address reserved for a specific MAC address. pg201

What is the most significant change introduced by WPA2, in comparison with the older WPA protocol? A. AES algorithms B. TKIP C. EAP D. 256 bit keys

A. AES algorithms Advanced Encryption Standard Algorithms

Tom works in a backend department, and his manager recently added another backend server. What should Tom do to ensure that when one backend server fails, traffic will be routed to the other backend server? A. Add a load balancer. B. Add another server. C. Add a fallback HDD. D. Implement mirroring.

A. Add a load balancer.

What happens when you use a broadcast address? A. All stations in a network receive messages. B. Only the router receives messages. C. The HTTP server receives messages. D. The last station in a network receives messages.

A. All stations in a network receive messages. pg107

Oscar wants to connect his friend to a website designed by John. To do so, on what does John have to host his website? A. An HTTP server B. A DHCP server C. A DNS server D. A proxy site

A. An HTTP server. pg20

What do connection-oriented and connection-less services have in common? A. Both are used to transmit data between endpoint devices. B. Both are related to the telephone system. C. Both are related to the postal system. D. All of the above.

A. Both are used to transmit data between endpoint devices.

While researching the WPA2 protocol, you found that it encrypts data. Which protocol does WPA2 use for encryption? A. CCMP B. CMVP C. CVPM D. CPCM

A. CCMP Cipher Block Chaining Message Authentication Code Protocol

Which of the following is the best way to determine if any changes were made to the network? A. Check if any hardware or software was recently installed or reconfigured. B. Installing a sniffer. C. Replace each network device with an older version. D. Ask employees.

A. Check if any hardware or software was recently installed or reconfigured.

As an employee in a service provider group that includes more than five million devices and networks, you were asked to class the network with a subnet mask. Which of the following classes would you choose? A. Class A B. Class C C .Class B D. Class E

A. Class A pg115

At your workplace, a complaint about access to uncensored sites was received, and you were asked to block those sites. Which of the following tools will you use? A. Content filtering. B. Whitelist only the sites employees need. C. Blacklist all sites you know of. D. None of the above.

A. Content filtering.

What is the best usage of a multilayer switch? A. Creating multiple VLANs and forwarding packets. B. Running a DNS server. C. Load balancing. D. Acting as a modem.

A. Creating multiple VLANs and forwarding packets.

John set up a website with the address www.jonswebsite.com. Which service should he use to check the website's IP address? A. DNS B. DHCP C. TCP D. POP

A. DNS Domain Name System pg20

During a company test, it was concluded that data transmitted over the network was leaked. What is the data described in the conclusion also known as? A. Data in motion B. Data in transit C. Data in movement D. Data in use

A. Data in motion

Which term defines data that is loaded to an application by a user? A. Data in use B. Active data C. Data in process D. In-memory data

A. Data in use

A user submits a ticket claiming she did not receive responses to her requests from a server in the same network. While troubleshooting, you notice that each request was in fact answered. However, a different station received the replies. What could be the cause? A. Duplicate physical addresses. B. Blocked ports on the user's computer. C. Duplicate IP addresses. D. Incorrect routing settings.

A. Duplicate physical addresses.

A coworker was advised to install a new twisted pair network in the ceiling, above fluorescent fixtures. What network problem may occur if he does that? A. EMI B. No problem will occur C. Jitter D. Duplex mismatch

A. EMI Electro-magnetic Interference

Which of the following can be caused by a duplex mismatch? A. Extremely slow data transfer. B. No connection can be established. C. Overheating. D. IP collision.

A. Extremely slow data transfer.

What is the correct definition of MTRJ? A. Fiber-optic cable connector. B. Copper cable connector. C. High-speed beam deflector. D. Solid-state beam scanner.

A. Fiber-optic cable connector.

To test a new toolset, you establish a virtual LAN network with two Windows 2012 servers and three clients. When you run ping to test connectivity, client3 does not respond. To investigate further, you run ping from client3 to the server, and note that it succeeded. What could be the problem? A. Firewall blockage. B. Unresponsive workstation. C. Unresponsive website. D. Misconfigured DNS.

A. Firewall blockage.

Dan works in a secret agency. He asks you to advise him which technology to use to secure connections and deliver messages between two nodes. What would be your recommendation? A. HTTPS B. Load balancer C. VPN concentrator D. SSH

A. HTTPS Hypertext transfer protocol secure

John was recently hired to head the IT department at his company. His first task was to connect the fiber optic cables of both branches of the company, which are located at opposite ends of the city. Which of the following could John use to accomplish that task? A. Media converter B. Hub C. Longer cable D. Media forwarder

A. Media converter

In which layer does IP addressing operate? A. Network B. Transport C. Application D. Session

A. Network Layer 3

The company you work for formed a new network hardening policy. Which of the following is likely to be included in it? A. Not using common passwords. B. Changing passwords to include a pet name and a birthday. C. Disabling RDP in the organization. D. Upgrading switches to L3.

A. Not using common passwords.

What is the main purpose of configuring a DNS address? A. Points to a server that translates a URL to IP. B. An address used to access web pages. C. A web host specification. D. Makes sure the computer belongs to the same internet section as other computers.

A. Points to a server that translates a URL to IP. pg20

You were asked to implement mitigation techniques on the new Windows Server 2012 that you installed. Which of the following would not be implemented? A. Port Security configuration B. DHCP snooping C. Monitoring file permissions D. Configuring the firewall

A. Port Security configuration

Your manager asks you to set up a cloud storage server and tells you to choose the most secure option. Which of the following options would you choose? A. Private cloud B. Hybrid cloud C. Public cloud D. Ad hoc cloud

A. Private cloud

A company wants to interconnect two LAN networks to form a larger MAN network. Which device can be used to do that? A. Router B. Switch C. Hub D. Bus

A. Router pg124

MIB is a database used to reference information from various agents about the network. Which protocol uses the MIB database? A. SNMP B. HTTP C. PPP D. POP3

A. SNMP Simple Network Management Protocol

A friend calls you and says he can't access his desktop, and that a password is required. All he can see is the input for the password and a link for a PayPal transaction. Which of the following attacks is most likely the cause? A. Scareware B. Ransomware C. Denial of Service D. Spear Phishing

A. Scareware

Your IT team encountered a problem they described as 'crosstalk interference' on a network. What could be the solution to this problem? A. Shield the twisted wire pairs inside the cable. B. Twist the cables surrounding the wires. C. Untwist the network pairs. D. None of the above.

A. Shield the twisted wire pairs inside the cable.

A coworker said that attacks don't necessarily require technology to be executed. Which type of attack could she be referring to? A. Social Engineering B. Brute-force C. Phishing D. DDoS

A. Social Engineering

During a job interview, Bill was asked which protocol does not operate in the application layer? What is the correct answer? A. TCP B. DNS C. FTP D. SMTP

A. TCP Transmission Control Protocol Layer 4 - Transport

Every station in the company was disconnected from the network! When troubleshooting, you discover that the entire company was assigned 169.254.x.x/16 addresses. What may have happened? A. The DHCP server is down. B. The DNS server is down. C. A rogue DHCP is corrupting the network. D. An attacker executed DHCP snooping.

A. The DHCP server is down.

A report was sent from the IT team saying that a LAN network may experience attenuation issues. Which of the following can be concluded from their report? A. The network uses cables that are more than 100 meters long. B. The network resides near an electromagnetic field that interrupts communication. C. The network includes different types of routers. D. Electricity in company facilities is unstable.

A. The network uses cables that are more than 100 meters long.

In a switched network, what is needed to facilitate communication between two computers? (Choose two answers) A. The same subnet mask. B. A different subnet mask. C. The same IP address. D. A different IP address. E. The same MAC address.

A. The same subnet mask. & D. A different IP address. pg105

Which of the following is done during the problem identification phase? A. Ticket submission. B. Solving the problem. C. Verifying system functionality. D. Alerting the IT team.

A. Ticket submission.

While accessing your Google account on a friend's computer, Google sends an SMS with a verification code for you to enter. What is this type of action called? A. Two-Factor Authentication B. Authentication Proofing C. Verification Check D. Captcha

A. Two-Factor Authentication

During penetration testing, a red team used 802.1q spoofing and managed to access VLAN networks. What is the correct term that describes that attack? A. VLAN Hopping B. Lateral Movement C. VLAN Spoofing D. ARP Spoofing

A. VLAN Hopping

While working for a Cybersecurity company, your boss asks you to look for weaknesses in a bank's defense system. Which environment would you use to simulate and test the system? A. Virtual machine B. Wireshark C. Host D. PyCharm

A. Virtual machine

When does signal attenuation occur? A. When a signal travels a long distance. B. When a cable is damaged. C. When a signal is sent incorrectly. D. When there is a data transfer load.

A. When a signal travels a long distance.

What is the purpose of CNAME? A. It is used as an alias for a hostname. B. It is used to route outgoing emails to an email server. C. It stores encryption certificates. D. It provides information for external sources.

A.It is used as an alias for a host name. pg22

Which of the following terms refers to a document that describes an in-house policy for personal electronics usage? A. PQD B. BYOD C. BYOB D. SLA

B. BYOD Bring Your Own Device

Which of the following protocols allows remote connection between two stations? A. SSH B. Telnet C. RDP D. All of the above

D. All of the above

You are part of an IT team in a large company, in which problems recently arose regarding data transfer among devices on the network. The issue involved Maximum Transmission Unit settings. Your manager asks you to set up Jumbo Frames. Which of the following protocols uses such frames? A. NVMe B. Ethernet C. Fiber Channel D. iSCSI

B. Ethernet

Which of the following Ethernet standards is limited to 25 meters? A. 1000Base-FX B. 1000Base-CX C. 1000Base-DX D. 1000Base-GX

B. 1000Base-CX

Your manager asks you to explain to a new employee the difference between an exploit and a vulnerability. Which of the following explanations would you use? A. An exploit is a software weakness, a vulnerability is a hardware weakness. B. An exploit is designed to take advantage of a known vulnerability, a vulnerability is a potential weakness. C. An exploit is a potential weakness, a vulnerability takes advantage of an exploit. D. An exploit is a tool that damages the integrity of data-in-use, a vulnerability is the possibility of extracting data-in-motion.

B. An exploit is designed to take advantage of a known vulnerability, a vulnerability is a potential weakness.

What is the purpose of a default gateway? A. Creates a loopback connection. B. Forwards packets destined for addresses outside the local network. C. Creates a WAN network. D. Translates URL addresses to IP addresses.

B. Forwards packets destined for addresses outside the local network. pg98

To play a new game you and your friends downloaded, you must first log in to a third-party VPN, and change the location to the US. What kind of service is implemented on the game side that prevents you from logging in from your home location? A. LocationChecker B. GeoFencing C. Geologin D. NordVPN

B. GeoFencing

During a meeting, you were asked to use a warm site facility. What exactly are they asking you to do? A. Implement a storage unit. B. Implement a recovery mechanism. C. Implement a fire safety plan. D. All of the above.

B. Implement a recovery mechanism.

Your manager decides to implement a new password complexity requirement. Why is this requirement considered a good practice? A. It helps users remember their passwords. B. It prevents users from using extremely weak passwords. C. It mitigates brute-force attacks. D. It does not change anything.

B. It prevents users from using extremely weak passwords.

Which type of VLAN should a VoIP phone be placed on when connected to a network? A. It should be placed only on the default VLAN. B. It should be placed on a separate VLAN called Voice VLAN. C. It should be placed on the same VLAN used by the computers. D. VoIP phones cannot communicate on VLANs.

B. It should be placed on a separate VLAN called Voice VLAN.

You were asked to upgrade the server's RAID hard disk array. Which specification should be checked first? A. AUP B. MTBF C. Mirroring D. MTTR

B. MTBF Mean Time Between Failure

If you provide HD videos over your home network to two tablets, a laptop, and a smart TV, all at the same time, which of the following solutions are you using? A. Internal HDD B. Network Attached Storage C. RAID D. External HDD

B. Network Attached Storage

Which of the following services will be the best option to minimize the management of technical elements, including data, servers, and storage? A. IaaS B. SaaS C. PaaS D. On-premises

B. SaaS Software as a Service

As you sit in a coffee shop and use Wi-Fi on your laptop, you are prompted for a security type and enter WEP. However, even after configuring the security type, there is no internet access. What could be the problem? A. Incorrect network adapter B. Security type mismatch C. Frequency mismatch D. Overcrowded Wireless AP

B. Security type mismatch

During a troubleshooting process, once the problem is identified, what should the next step be? A. Establish a theory for the cause. B. Solve the problem. C. Verify system functionalities. D. Submit a ticket regarding the problem.

B. Solve the problem.

You need to divide a range of IP addresses into smaller ranges, to distribute them among all hosts in the organization. Which of the following would you use? A. Pool B. Subnetting C. Scope D. Range

B. Subnetting

You connected a new workstation to a network in the organization that is to be assigned IP addresses from the DHCP server. However, there is no network access. By executing ipconfig /all, you found that the assigned IP address is different from the scope defined in the DHCP manager. What can be concluded from the result of the ipconfig /all command? A. There are no more IP addresses in the current scope. B. There is a rogue DHCP server on the network. C. The workstation uses static IP address configuration. D. The DHCP rejected the workstation.

B. There is a rogue DHCP server on the network.

When Michael sends a file to his friend, to where will the packets be forwarded to exit the local network? A.HTTP server B.Default gateway C.HTTPS server D.DHCP server

B.Default gateway pg98

To protect an intranet, where would you install a firewall? A. Between the ISP and the router. B. Anywhere on the network. C. Between the router and the private network. D. Between the network and the storage server.

C. Between the router and the private network.

You bought a wireless adapter for your new store.What should you do to secure it? A. Configure a phone number as the password. B. Place it in a hidden closet. C. Change the default credentials. D. Answers B and C.

C. Change the default credentials.

What is the main purpose of a router? A. Transmit and receive data over a communication channel. B. Connect devices using Ethernet cables. C. Connect multiple networks and forward packets from its own network or other networks. D. Regenerate analog or digital signals distorted by transmission loss.

C. Connect multiple networks and forward packets from its own network or other networks. pg98

You identified a network problem and prepared an action to fix it. What else should you do before implementing the solution? A. Report the issue B. Close the ticket C. Consider potential network impact D. Nothing, just fix it

C. Consider potential network impact

When setting up a network in your company, you purchase a new router and configure it. The router automatically assigns addresses to computers on the network. Which of the following protocols performs the action? A. FTP B. DNS C. DHCP D. RDP

C. DHCP Dynamic Host Config Protocol pg206

A broadband router is used to connect multiple computers over a LAN network. It includes a variety of functions and features. Which of the following features is included? A. Anti-virus B. EPP C. DHCP server D. Encryption device

C. DHCP server

Which of the following protocols transfers files from clients to servers and vice versa? A. NTP B. HTTP C. FTP D. RDP

C. FTP File transfer Protocol

Which of the following cloud types enables administrators to migrate services between public and private resources? A. Public cloud B. Private cloud C. Hybrid cloud D. All clouds use the same hardware resources

C. Hybrid cloud

TPS and SFTP were developed to overcome which downside of the FTP protocol? A. Size limitation B. Slow upload/download rates C. Lack of security D. Anonymous authentication

C. Lack of security

The network in your workplace has an active prevention tool against double-tagging packets across the network. Which of the following is most likely implemented? A .Trunk access B. STP C. Native VLAN configured for dot1q tagging D. SIEM environment

C. Native VLAN configured for dot1q tagging

You were paid a bonus sum of money to determine the level of security implemented in your company. What is the most efficient way to do so? A. Network mapping B. Remediation C. Penetration testing D. Port scanning

C. Penetration testing

What can be configured to prevent bridge-loops over the network? A. Port Security B. BPDU Guard C. STP D. Layer 3 Switches

C. STP Spanning Tree Protocol

While viewing your network traffic using Wireshark, you noticed that the packets are SSL encrypted. At which layer does SSL function? A. Application B. Data-link C. Session D. Network

C. Session Layer 5

How are issue tickets prioritized in the first phase of troubleshooting? A. FIFO B. LIFO C. Severity D. Ticket length

C. Severity

What is the purpose of a subnet mask? A. To reduce network traffic. B. To increase network security. C. To define a range of IP addresses available within a network. D. To maintain a directory of domain names and translate them to IP addresses.

C. To define a range of IP addresses available within a network.

A ticket was submitted regarding a slow station that affects connectivity from company facilities to a server. In Windows OS, which command-line tool would you use to find the bottleneck? A. Ping B. Traceroute C. Tracert D. Nslookup

C. Tracert

John works in an IT department and was asked to set up a switched network and group computers by departments. Which of the following should he use? A. VPN B. VOIP C. VLAN D. Proxy

C. VLAN Virtual Local Area Network

While attempting to fix problem A, network changes caused problem B. During which phase should network changes be considered? A. When identifying the problem. B. When implementing the solution. C. When testing a theory. D. When establishing a plan of action.

C. When testing a theory.

While investigating an Ethernet frame, you were asked by your supervisor to list all the identified addresses. Which of the following addresses may be among them? A. 127.0.0.1 B. 2a02:ed0:5f26:c100:a0f6:471b:daf0:7dfc C. AA-BB-CC-GG-TT D. 00-FF-60-A9-08-CE

D. 00-FF-60-A9-08-CE

You are browsing to a website that uses HTTPS. What is the destination port of the request packet? A. 70 B. 80 C. 81 D. 443

D. 443

What is the purpose of a switch? A. To interconnect multiple stations in a network. B. To divide stations into separate collision domains. C. To divide stations into separate VLANs. D. All of the above.

D. All of the above. pg7

Which of the following can be used to hash files? A. MD5 B. SHA1 C. Base64 D. Answers A and B

D. Answers A and B

Which of the following refers to a network that has two access points, one in the direction of an internal network, and one in the direction of an external network? A. VLAN B. LAN C. WAN D. DMZ

D. DMZ demilitarized zone

Which layer in the OSI model uses frames? A. Application B. Network C. Presentation D. Data Link

D. Data Link Layer 2

While viewing a tutorial about denial-of-service attacks, an attack called "bluemoon" was introduced. In that attack, someone used a zombie farm to neutralize a server. What kind of DoS attack can "bluemoon" be described as? A.Multiplied DoS B.Reflective DoS C.Amplified DoS D. Distributed DoS

D. Distributed DoS

Your company asks you to change the WAN transmission type since there was an issue of attenuation. Which of the following types would be the best choice? A. 100Base-TX B. Satellite communication C. 100Base-FX D. Fiber optics

D. Fiber optics

While configuring a new workstation in the organization and testing for connectivity, different stations over the WAN could not be reached. However, pinging other stations in the LAN seems to work. What could be the problem? A. Incorrect DNS B. Incorrect subnet mask C. Incorrect IP address D. Incorrect default gateway

D. Incorrect default gateway

A connectivity issue on your wired network is caused by delayed packets. Which of the following terms best articulates the problem? A. De-authentication B. Instability C. No connectivity D. Jitter

D. Jitter

A malware was planted in a machine, and waited for a specific occurrence in the machine to execute. What can this type of malware be? A. Worm B. Phishing C. Virus D. Logic Bomb

D. Logic Bomb

David works in a government agency. He was asked to find a discrete way into other networks. What should David use? A. Gateway B. Router C. Hub D. Node

D. Node pg 5 and networking concepts overall

Which protocol should your home router support to be able to communicate with more than one external data source? A. SSH B. SIP C. RDP D. PPPoe

D. PPPoe Point-to-Point Protocol over Ethernet

During troubleshooting, you identify a router that seems to act abnormally. What should you do to check your suspicion? A. Try to duplicate the behavior on a different network device. B. Change the router's configuration. C. Remove the router from the network. D. Replace the router with a different one.

D. Replace the router with a different one.

Your cloud provider assures you that data stored in the cloud will be available 85% of the time. Which of the following is the term for such an agreement? A. ToS B. MTBF C. User Agreement D. SLA

D. SLA Service Level Agreement

What is the purpose of VLSM? A. Separate small-scale networks into several larger networks. B. Unite several small networks into a single larger network. C. Unite several large networks into a single smaller network. D. Separate a large network into several smaller networks.

D. Separate a large network into several smaller networks.

What is the main purpose of an SSL accelerator? A. To secure data. B. To accelerate the transfer of files to the server. C. To log in to a remote machine and execute commands. D. To receive encrypted connections and send them back to the server unencrypted.

D. To receive encrypted connections and send them back to the server unencrypted.

You were asked to create a policy regarding server hardening, and implement it. Which of the following will not be involved? A. Disabling unnecessary ports. B. Creating privileged user accounts. C. Disabling unnecessary services. D. Upgrading firmware.

D. Upgrading firmware.

The IT team that you lead requested a device that would enable them to manage access points in the company from a central location. You agree. Which one of the following would you purchase? A. Wireless hub B. Wireless server C. Wireless endpoint D. Wireless controller

D. Wireless controller

If you are connecting to a new network with internet access, which of the following is critical to establish an internet connection? A.IP address B.Default gateway C.Subnet mask D.All of the above

D.All of the above pg21


Conjuntos de estudio relacionados

Chapter 4 Cell Structure and Function

View Set

Chapter 15-Assessing Head and Neck

View Set

Chapter 24 On-Board Diagnostic and Scan Tools

View Set

TEXTBOOK: Ch. 8: Television, Cable, and Mobile Video

View Set

ACCT 2113 CHAPTER 4-6 PRACTICE MC

View Set

🎶Music Lesson 1 Chapter 1 🎻

View Set

CompTIA A+ Certification Exam 220-1101 Practice Questions 201 - 300

View Set