CompTIA Network+
Why do most switches run the Spanning Tree Protocol by default?
It prevents switching loops.
What is the default network authentication protocol for Windows 2000, and later?
Kerberos
What security protocol replaced NTLM for network user authentication on Windows 2000 and later networks?
Kerberos
FF:FF:FF:FF:FF:FF is considered to be a(n) ___________________.
Layer 2 broadcast
Which principle prescribes that users should be given access only to resources required to do their job?
Least Privilege
Which of the following is a software management application running on servers that analyzes the received information from your network and puts the information in a type of phone book of information?
NetFlow
Which layer of the TCP/IP model is sometimes referred to as the Link Layer?
Network Interface layer (Layer 1)
You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. What technology will you use to implement a solution?
PAT
At which OSI layer does an active hub function?
Physical Layer
What are the colors of the eight pins in the 568A cable specification?
Pin 1 - Green/White Pin 2 - Green Pin 3 - Orange/White Pin 4 - Blue Pin 5 - Blue/White Pin 6 - Orange Pin 7 - Brown/White Pin 8 - Brown
How is a T1 crossover cable wired?
Pins 1, 2, 4, and 5 are connected to 4, 5, 1, and 2.
Wireshark is an example of a ___________________ .
Protocol Analyzer
You need to have a connection to run applications that are installed on only your desktop computer at your office. Which protocol will provide a GUI interface to your work computer?
RDP
Which of the following routing protocols will send IPv6 route updates between routers?
RIPng
Which routing protocols have an administrative distance of 120? (Choose two.)
RIPv1 and RIPv2
Which routing protocols are distance-vector protocols?
RIPv2 and EIGRP
You have two buildings connected via a wireless bridged network using omnidirectional antennas. The company complains about low throughput. What should you do to improve the link performance?
Replace the antennas with Yagis.
You need to transfer files between two systems. Which two of the following can be used? (Choose two.)
SCP and FTP
What networking protocol uses OIDs and MIBs for data collection?
SNMP
What does the acronym SFP denote?
Small Form-factor Pluggable
Which of the following devices operate at the Data Link layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)
Switch and AP (Access Point)
Which of the following are connection-oriented protocols or applications?
TCP, Telnet, FTP
A technician has tested a cable and has established that it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?
TDR
Which DoD Process/Application layer protocol provides terminal emulation and remote login capability on TCP/IP networks?
Telnet
A user is experiencing problems logging in to a Linux server. He can connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt logging in as this user from your workstation with his username and password and don't experience any problems. However, you cannot log in with either his username or yours from his workstation. What is a likely cause of the problem?
The Caps Lock key is pressed.
If you are forced to replace a router that has failed to the point that you are unable to access its current configuration to aid in setting up interface addresses on the new router, which of the following can you reference for assistance?
The best method here is to check the configuration of devices that were using the old router as a gateway to the rest of the internetwork.
What are the two advantages of bus topology?
The bus topology is cheaper and easier to install for smaller networks and it uses the least amount of cabling.
Which of the following tools enables the technician to trace cables in multiple-pair wiring?
Toner probe
How does full-duplex mode affect traffic?
Traffic can be transmitted in both directions at the same time
What is the most effective way to stop social engineering attacks?
Training
At which layer of the OSI model does UDP operate?
Transport
Segmentation of a data stream happens at which layer of the OSI model?
Transport
UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown
What does the acronym WPA denote?
WiFi Protected Access
Which IEEE 802.11b security protocol is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to a standard wired LAN?
Wired Equivalent Privacy (WEP)
Which two connectivity devices are designed to increase usable bandwidth within a network?
a bridge and a switch
Which network layout has a single cable connected to all network devices?
a bus network
What is LWAPP?
a protocol that allows a wireless LAN controller (WAC) to manage and control multiple wireless access points
Which types of IDS is based on a database of known attacks and their respective patterns?
a signature-based IDS
What is a security mechanism that is used to designate which users can gain various types of access, such as read, write, and execute access, to resources on a network?
an access control list (ACL)
What term is used to describe the situation where a wireless access point has reached the maximum number of connected devices?
device saturation
Which type of network interference is caused by fluorescent lighting?
electromagnetic interference (EMI)
What does frame tagging in a port-based switching network ensure?
ensures that a single VLAN can be distributed across multiple switches...
Which types of devices most widely use Any+?
fitness monitors or sensors, like Fitbit
What occurs when the cabling connectors are configured with the wrong individual pin in the connector sockets?
incorrect termination
Which TCP/IP utility do you use to display the current IP configuration of a Windows computer?
ipconfig
Which type of cable is used in a 10GBaseLW network?
single-mode fiber-optic
What does a wiring schematic use to represent components?
symbols
Which DHCP option is used for the default gateway configuration?
the 003 Router DHCP option...
Which channel carries Primary Rate ISDN (PRI) signaling and link-management data?
the D channel
In which phase of the DHCP client configuration is the IP addressing information assigned to the client?
the IP lease acknowledgement phase
Which address to hardware vendors assign?
the physical device or media access control (MAC) address
What is the purpose of MAC filtering?
to allow or deny a connection based on the client's Media Access Control (MAC) address.
What is the purpose of scope option in a DHCP server?
to ensure that all devices that are part of the scope will receive certain settings...
What is the purpose of the ARP table?
to map MAC addresses to IP addresses
What is the purpose of file hashing?
to provide data or file integrity
What switch would you use with the arp command to statically add an entry to the ARP cache?
-s
Which of the following describe the difference between static and dynamic routing? (Choose two.)
1. Dynamic routes are used to scale large networks. 2. Dynamic routes are added automatically to the routing table.
What is the maximum cable length in a 1000BaseT network?
100BaseT and 1000BaseT both have a maximum cable distance of 100 meters.
Which one of the following is the fiber-optic standard of the Institute of Electrical and Electronics Engineers (IEEE)?
10GBaseLR
What is the approximate throughput of the 802.11b standard?
11 Mbps
POP3 uses what well-known port number?
110
Which ports does MGCP use?
2427/2727
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
30
What is the transmission speed and maximum cable length for E3?
34.368 Mbps, 450 feet
What are the eight channels supported by the 802.11a wireless standard?
36, 40, 44, 48, 52, 56, 60, 64
What is the maximum length for VDSL?
4,000 feet
The network address of 172.16.0.0/19 provides how many subnets and hosts?
8 subnets, 8,190 hosts each
Which wireless technology standard allows for communication at both 2.4 GHz and 5 GHz frequencies?
802.11n
Which IEEE standard specifies the protocol for CSMA/CD?
802.3 standard
What is a DHCP lease?
A DHCP lease is a temporary assignment of IP address information to a DHCP client.
What infrastructure component is required by WPA Enterprise or WPA2 Enteprise?
A RADIUS server
Which type of SNMP message sets a variable in a managed device or triggers an action on a managed device?
A SET message
Which network topology consists of devices connected from point to point in a loop?
A ring network
The -g and -a switches provide the same output from which utility?
ARP
What DoD Internet layer protocol provides IP to MAC address resolution?
ARP
Which command-line utility will show the relationship between a MAC address and the corresponding IP address?
ARP
Which utility do you use to display a list of local IP addresses resolved to physical addresses on a Microsoft Windows network?
ARP utility...
HTTP, FTP, and Telnet work at which layer of the OSI model?
Application
The OSI model has seven layers and the DoD has four. At which layer does SMTP work in both models?
Application
At which layer of the OSI model does TFTP operate?
Application layer (layer7)
Which of the following uses a characteristic factor for authentication?
Biometrics
Which of the following are considered network access control methods?
CHAP, 802.1X, EAP
What does the acronym CSMS/CA denote?
Carrier Sense Multiple Access/Collision Avoidance
Which practices help secure your wireless access points from unauthorized access?
Changing the default SSID value
Which concern do you have when you encrypt data before sending it?
Confidentiality
Not a basic physical issue that can occur on a network when a user is connected via cable?
DNS
Which technology allows the transmission of digital signals over regular copper-wire phone lines?
DSL
At which layer of the OSI model do MAC addresses and EUI-64 addresses operate?
Data Link layer (Layer 2)
What is war driving?
Deliberately searching for Wi-Fi signals while driving by in a vehicle
Which protocol provides a secure connection between web server and web browser
HTTPS
Which condition leads to shorts?
High humidity
Which protocol uses port 143?
IMAP
What are the 7 steps of the seven-step troubleshooting methodology?
Identify the problem. Establish a theory of probable cause. Test the theory to determine the cause. Establish a plan of action to resolve the problem and identify potential effects. Implement the solution or escalate as necessary. Verify full system functionality, and if applicable, implement preventative measures. Document findings, actions, outcomes, and lessons learned.
What does an SOA record contain?
Information regarding a particular DNS zone's start of authority (SOA)
What does the acronym IaaS denote?
Infrastructure as a Service
A retail company is concerned about outside users gaining access to its confidential resources. The retail company hosts a Simple Mail Transfer Protocol (SMTP) server as well as a secure Internet shopping site. How can it protect its network without severely impacting business operations?
Install a firewall, and block all incoming ports except 443 and 25.
What does the acronym IDS denote?
Intrusion Detection System
If encryption is not configured on a wireless network, then in what form is wireless data transmitted?
It is transmitted in plain text