COMPTIA Network Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How many bits of a class A IP address are used for host information? -24 bits -16 bits -32 bits -8 bits

24 bits

What decimal number corresponds to the binary number 11111111? -256 -255 -127 -11,111,111

255

What is one advantage offered by VDI over RDS and VNC? -Supports remote access to mobile devices -Provides open source flexibility -Offers access to multiple OSs in VMs -Allows multiple users to sign in at once

Offers access to multiple OSs in VMs

Which type of DoS attack orchestrates an attack bounced off uninfected computers? -DRDoS attack -PDoS attack -FTP bounce -Ransomware

DRDoS attack

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network? -Default gateway -DHCP server -DNS server -Root server

Default gateway

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? -Time to Live -Traffic Class -Priority Code Point -DiffServ

DiffServ

When shopping for a new router, what does the MTBF tell you? -How long it will usually take to repair that device -How long devices like this one will last on average until the next failure -How much it will cost to repair that device -How long until that device fails

How long devices like this one will last on average until the next failure

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? -ifconfig /release -ipconfig /release -ipconfig /renew -ifconfig /renew

ipconfig /release

Which policy ensures messages are discarded when they don't match a specific firewall rule? -Explicit deny -Implicit allow -Implicit deny -Explicit allow

Implicit deny

What information in a transmitted message might an IDS use to identify network threats? -Signature -FIM - Port mirroring -ACL

Signature

Which protocol's header would a layer 4 device read and process? -ARP -TCP -IP -HTTP

TCP

Which of the following wireless technologies does not use the 2.4 GHz band? -ZigBee -Z-Wave -Bluetooth -Wi-Fi

Z-Wave

Which of these commands has no parameters in Windows? -ipconfig -hostname -nslookup -ping

hostname

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack? -AC adapter -Rack ears -Large fans -Padded feet

rack ears

Which of these categories of twisted-pair cable can support Gigabit Ethernet? -Cat 6, Cat 7a, Cat 5 -Cat 5e, Cat 6a, Cat 7 -Cat 5e, Cat 6, Cat 3 -Cat 5, Cat 6, Cat 7

Cat 5e, Cat 6a, Cat 7

What type of attack relies on spoofing? -Deauth attack -Pen testing -Tailgating -Friendly DoS attack

Deauth attack

What is the first step of inventory management? -List all components on the network -List an administrative account's username and password for each device on a network -Interview users -Identify network requirements

List all components on the network.

Which of these is considered a secure place to store a list of documented network passwords? -Sticky note under the keyboard -CEO's smartphone -MDF -Password manager

A password manager

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? -Guest network -Evil twin -Captive portal -Brute force attack

Evil twin

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself? -2000::/3 -::1/128 -FE80::/64 -FF00::/8

FE80::/64

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? -BYOD -NDA -MDM -AUP

NDA

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack? -Cat 5e twisted-pair cable -Cat 6 twisted-pair cable -Passive twinaxial cable -RG-6 coaxial cable

Passive twinaxial cable

What specifications define the standards for cable broadband? -DOCSIS -PSTN -FTTC -HFC

DOCSIS

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? -Top listeners -Top talkers -Jabbers -Giants

Top listeners

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? -Flow control -Power management -Congestion control -Traffic shaping

Traffic shaping

What is the Internet standard MTU? -65,535 bytes -9,198 bytes -1,522 bytes -1,500 bytes

1,500 bytes

Which protocol replaced TKIP for WPA2? -RC4 -CCMP -WEP -RADIUS

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions? -SSID -CSMA/CA -EAPoL -CSMA/CD

CSMA/CA

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? -Cold site -Hot site -Standby site -Warm site

Cold site

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable? -Dirty connectors -Fiber type mismatch -Wavelength mismatch -TX/RX reverse

Fiber type mismatch

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? -Generator -Dual power supplies -Standby UPS -Online UPS

Online UPS

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this? -Tailgating -Quid pro quo -Baiting -Phishing

Phishing

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? -Channel -RSSI -EIRP -Band

RSSI

What method does a GSM network use to separate data on a channel? -SIM -TDMA -TDM -CDMA

TDMA

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? -iPerf -NetFlow -Wireshark -Spiceworks

Wireshark

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet? -VoIP phone -Voice gateway -Dedicated telephone switch -Legacy PBX

voice gateway

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? -10 bits -0 bits -8 bits -9 bits

8 bits

A routing protocol's reliability and priority are rated by what measurement? -MTU -Latency -AD -Routing table

AD

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? -SYN flags -Application data -ICMP message -Destination IP address

Application data

Which log type is used to prove who did what and when? -System log -Audit log -Syslog -Traffic log

Audit log

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? -BGP -OSPF -IP -RIPv2

BGP

Which transmission characteristic is never fully achieved? -Bandwidth -Latency -Throughput -Bit rate

Bandwidth

Which assignment technique requires a RADIUS server? -Static VLAN assignment -Dynamic IP address assignment -Dynamic VLAN assignment -Static IP address assignment

Dynamic VLAN assignment

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them? -Work area -CEO's office -EF -IDF

EF

When a router can't determine a path to a message's destination, where does it send the message? -Gateway of last resort -Administrative distance -Routing table -Default gateway

Gateway of last resort

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? -Vulnerability -Insider threat -Principle of least privilege -Denial of service

Insider threat

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? -Integrity -Confidentiality -Symmetric -Availability

Integrity

Active Directory and 389 Directory Server are both compatible with which directory access protocol? -LDAP -AD DS -RADIUS -Kerberos

LDAP

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? -Layer 4 -Layer 5 -Layer 2 -Layer 3

Layer 3

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? -Layer 2 -Layer 3 -Layer 4 -Layer 1

Layer 3

At what layer of the OSI model do proxy servers operate? -Layer 4 -Layer 3 -Layer 2 -Layer 7

Layer 7

What do well-chosen subnets accomplish? -IP address spaces overlap for easier management. -Network documentation is easier to manage. -Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. -Problems affect the entire network, making them more difficult to pin down.

Network documentation is easier to manage.

At which OSI layer does IP operate? -Network layer -Application layer -Data link layer -Transport layer

Network layer

Which OSI layer is responsible for directing data from one LAN to another? -Network layer -Physical layer -Transport layer -Data link layer

Network layer

Which cloud service model gives software developers access to multiple platforms for testing code? -XaaS -IaaS -PaaS -SaaS

PaaS

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. -Security audit -Vulnerability assessment -Red team-blue team exercise -Pen testing

Pen testing Red team-blue team exercise

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? -Data breach -Exploit -Posture assessment -Security audit

Posture assessment

Which DNS server offers the most current resolution to a DNS query? -Root DNS server -Caching DNS server -TLD DNS server -Primary DNS server

Primary DNS server

Which type of switch connects all devices in a rack to the rest of the network? -Spine switch -Core switch -EoR switch -ToR switch

ToR switch

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? -TDR -Tone locator -Tone generator -Toner

Tone locator

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? -Virtual load balancer -Virtual firewall -Virtual switch -Virtual router

Virtual switch

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? -access-list acl_2 permit icmp any any -access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www -access-list acl_2 permit https any any -access-list acl_2 deny tcp any any

access-list acl_2 permit https any any

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? -Plenum-rated cable -Patch cable -Fiber-optic cable -Backbone cable

patch cable

Which fiber connector contains two strands of fiber in each ferrule? -SC -LC -ST -MT-RJ

MT-RJ

Which port mode on a switch enables that port to manage traffic for multiple VLANs? -Access -Private -Community -Trunk

Trunk

Which type of DNS record identifies an email server? -PTR record -MX record -AAAA record -CNAME record

MX record

Which of the following is not one of the AAA services provided by RADIUS and TACACS+? -Accounting -Authorization -Administration -Authentication

Administration

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? -No devices -All devices on the internet -The one device that is configured with this IP address -All devices on your local network

All devices on your local network

Which formulas can be used to calculate the magic number? Choose two -256 - the interesting octet -2h -2h - 2 -2n

256 - the interesting octet 2h

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? -802.11b -802.11ax -802.11g -802.11ac

802.11ax

Which of these cellular technologies offers the fastest speeds? -CDMA -LTE-A -GSM -4G-LTE

LTE-A

Which of the following is considered a secure protocol? -FTP -SSH -Telnet -HTTP

SSH

Which device would allow an attacker to make network clients use an illegitimate default gateway? -RA guard -DHCP server -Network-based firewall -Proxy server

DHCP server

What is the formula for determining the number of possible hosts on a network? -2h = Z -2h - 2 = Z -2n = Y -2n - 2 = Y

2h - 2 = Z

Which encryption protocol does GRE use to increase the security of its transmissions? -SSH -SSL -SFTP -IPsec

IPsec

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? -Load balancer -Firewall -Router -Switch

Load balancer

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? -Logic bomb -Ransomware -Virus -Worm

Logic bomb

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply. -PowerShell -Microsoft Edge -Command Prompt -Zenmap

PowerShell, Command Prompt, Zenmap

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? -Rogue AP -Evil twin -War driving -Hidden node

Rogue AP

Which kind of multiplexing assigns slots to nodes according to priority and need? -CWDM (coarse wavelength division multiplexing) -WDM (wavelength division multiplexing) -TDM (time division multiplexing) -STDM (statistical time division multiplexing)

STDM (statistical time division multiplexing)

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? -Smart locker -Access control vestibule -Locking rack -Locking cabinet

Smart locker

What kind of device can monitor a connection at the demarc but cannot interpret data? -CSU/DSU -Line driver -DTE -Smartjack

Smartjack

What kind of route is created when a network administrator configures a router to use a specific path between nodes? -Trace route -Default route -Static route -Dynamic route

Static route

Which of the following devices are you likely to find in the MDF? Choose all that apply. -Switches -Routers -Network Printer -KVM switch

Switches, Routers, KVM switch

Which part of a MAC address is unique to each manufacturer? -The OUI -The network identifier -The physical address -The device identifier

The OUI

Who is responsible for the security of hardware on which a public cloud runs? -It depends -Both the cloud customer and the cloud provider -The cloud customer -The cloud provider

The cloud provider

Which hexadecimal block in an IPv6 address is used for the Subnet ID? -The fourth one -The first one -The third one -The eighth one

The fourth one

Which of the following is not a good reason to segment a network? -To narrow down the location of problems on a network -To limit access to broadcast domains -To reduce the demand on bandwidth -To increase the number of networking devices on a network

To increase the number of networking devices on a network

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address? -arp -a -telnet 192.168.1.56 -netstat -n -tracert 192.168.1.56

arp -a

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? -Terminal emulation -SDN (software-defined networking) -Hypervisor -NFV (Network Functions Virtualization)

Hypervisor

Which two protocols manage neighbor discovery processes on IPv4 networks? -NDP and Ethernet -IPv4 and IPv6 -TCP and UDP -ICMP and ARP

ICMP and ARP

Which kind of crosstalk occurs between wire pairs near the source of the signal? -Alien -TX/RX reverse -FEXT -NEXT

NEXT

Which one of the following wireless transmission types requires a clear LOS to function? -NFC -Bluetooth -Wi-Fi -IR

IR

What information does the switchport port-security command use to restrict access to a switch's interface? -IP address -MAC address -Port number -Broadcast address

MAC address

With which network connection type does the VM obtain IP addressing information from its host? -Managed mode -Bridged mode -NAT mode -Isolation mode

NAT mode

Which function of WPA/WPA2 security ensures data cannot be read in transit? -Encryption -Key distribution -Message integrity -Authentication

Encryption

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? -Stop-and-wait -Choke packet -Go-back-n sliding window -Selective repeat sliding window

Selective repeat sliding window

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin? -White/green -Brown -Blue -White/orange

White/green

Which cloud management technique executes a series of tasks in a workflow? -Automation -Orchestration -SLA -IaC

Orchestration

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters? -Cat 6 -Cat 7 -Cat 6a -Cat 5e

Cat 6a

What type of diagram shows a graphical representation of a network's wired infrastructure? -Nework map -Rack diagram -Netowrk topology -Wiring diagram

Wiring diagram

Which IEEE standard determines how VLANs work on a network? -802.1Q -802.3af -802.1X -802.11

802.1Q

Which remote file access protocol is an extension of SSH? -SFTP -TFTP -HTTPS -FTPS

SFTP

Which of the following features of a network connection between a switch and server is not improved by link aggregation? -Availability -Bandwidth -Speed -Fault tolerance

Speed

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? -The web server and primary DNS server because the web server is requesting zone transfers from the primary DNS server -The caching and primary DNS servers because the caching server is requesting zone transfers from the primary server -The root and primary DNS servers because the primary server is requesting zone transfers from the root server -The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? -Principle of least privilege -Shared responsibility model -Separation of duties -Defense in depth

Separation of duties

What command requests the next record in an SNMP log? -SNMP Trap -SNMP Get Next -SNMP Get Response -SNMP Get Request

SNMP Get Next

What port do SNMP agents listen on? -Port 161 -Port 20 -Port 162 -Port 21

Port 161


Kaugnay na mga set ng pag-aaral

الثبات على الحق - سورة الأحزاب - 1

View Set

Social Influence: Norms, Obedience and Conformity

View Set

AP Biology Classification Review

View Set

Madness of Crowds by Douglas Murray quotes

View Set

1.3.5 Quiz - Week Three: Inductive & Deductive Reasoning

View Set

Apologia Biology Module 10 Study Guide for Emma

View Set