NetWork A+ Study
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query? A. 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31
10.1.2.31
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface? A. 172.15.0.0/18 B. 172.18.0.0/10 C. 172.23.0.0/16 D. 172.28.0.0/8 E. 172.32.0.0/14
172.23.0.0/16
Which of the following is the number of bits in 8KB? 64,000 8,000 32,000 16,000
64,000
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network? A. 80.87.78.0 - 80.87.78.14 B. 80.87.78.0 - 80.87.78.110 C. 80.87.78.1 - 80.87.78.62 D. 80.87.78.1 - 80.87.78.158
80.87.78.1 - 80.87.78.62
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11b b. 802.11g c. 802.11ax d. 802.11ac
802.11ax
Which of the following ports should be used to securely receive mail that is synchronized across multiple devices? A. 25 B. 110 C. 443 D. 993
993
Given the following: WMIC BIOS GET SERIALNUMBER -Which of the following describes the above sequence? A function A query Insertion of data A database dump
A query
A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. AD c. Latency d. MTU
AD
Which of the following should be used to store a list of strings? Variable Array Branch Constant
Array
The computer language that is closest to machine code is: Query Language Assembly Language Markup Language Scripting Language
Assembly language
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? Accounting Integrity Authentication Non-repudiation
Authentication
A replay attack would be the primary concern of: Authentication. Availability. Confidentiality. Integrity.
Authentication.
Which of the following describes the BEST device to configure as a DHCP relay? A. Bridge B. Router C. Layer 2 switch D. Hub
B. Router
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. OSPF b. RIPv2 c. BGP d. IP
BGP
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors? A. Bad wire on the Cat 5e cable B. The wrong VLAN assignment to the switchport C. A misconfigured QoS setting on the router D. Both sides of the switch trunk set to full duplex
Bad wire on the Cat 5e cable
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring? A. Ethernet collisions B. DDoS attack C. Broadcast storm D. Routing loops
Broadcast storm
Which of the following TCP ports is used by the Windows OS for file sharing? A. 53 B. 389 C. 445 D. 1433
C. 445
Which protocol replaced TKIP for WPA2? a. RC4 b. CCMP c. RADIUS d. WEP
CCMP
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue? A. Audit logs B. CPU utilization C. CRC errors D. Jitter
CPU utilization
Which Carrier Sense technology is used on wireless networks to reduce collisions? a. EAPoL b. CSMA/CA c. SSID d. CSMA/CD
CSMA/CA
Which of the following is used to track and document various types of known vulnerabilities? A. CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilege
CVE
Which of the following is used to track and document various types of known vulnerabilities? A. Penetration testing B. CVE C. Zero-day D. SIEM
CVE
Which of the following data is MOST likely to be stored as a string? Cat 42 x 3.1415927
Cat
Network traffic is being compromised by DNS poisoning every time a company's router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router? A. Change the device's default password. B. Disable router advertisement guard. C. Activate control plane policing. D. Disable unneeded network services.
Change the device's default password.
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information: Which of the following is MOST likely the cause of the issue? A. Wrong antenna type B. Poor signal C. Incorrect power settings D. Channel overlap
Channel overlap
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application? A. Clientless VPN B. Virtual desktop C. Virtual network computing D. mGRE tunnel
Clientless VPN
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application? A. Virtual network computing B. Virtual desktop C. Clientless VPN D. mGRE tunnel
Clientless VPN
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP? A. Multimode fiber B. Single-mode fiber C. Cat 6e D. Coaxial
Coaxial
A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate? A. Enabling port security on access ports B. Configuring DHCP snooping on the switch C. Preventing broadcast messages leaving the client network D. Blocking ports 67/68 on the client network
Configuring DHCP snooping on the switch
Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. DRDoS attack b. FTP bounce c. PDoS attack d. Ransomware
DRDoS attack
hich of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection? A. Data link B. Network C. Transport D. Session
Data link
A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration? A. Diverse paths B. Load Balancing C. Multipathing D. Virtual Router Redundancy Protocol
Diverse paths
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? Duplicate the problem. Gather information. Establish a plan of action. Find the root cause.
Duplicate the problem.
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action? Implement smart card login. Adopt a procedure for adding accounts. Enable an audit log. Enhance the granularity of user permissions.
Enable an audit log.
Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Message integrity b. Encryption c. Key distribution d. Authentication
Encryption
The manager of human resources is unable to connect to the wireless network while in the conference room. The network administrator decides to check the logs of the network. While in the log files, the administrator finds that several access points are down. Which of the following troubleshooting steps should be performed NEXT? A. Identify the problem B. Verify full system functionality C. Research the knowledge base D. Establish a plan to resolve the problem
Establish a plan to resolve the problem
When a router can't determine a path to a message's destination, where does it send the message? a. Routing table b. Default gateway c. Gateway of last resort d. Administrative distance
Gateway of last resort
Which of the following BEST describes the physical location of the data in the database? Column HDD RAM Table
HDD
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? Anti-malware Host firewall Device Manager Antivirus
Host firewall
An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF? A. Temperature B. Humidity C. Smoke D. Electrical
Humidity
Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. NFC c. Wi-Fi d. IR
IR
Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor's data center? A. DaaS B. IaaS C. PaaS D. SaaS
IaaS
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution? Answers: A. PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)
IaaS
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure? A. Incorrect VLAN B. DNS failure C. DHCP scope exhaustion D. Incorrect gateway
Incorrect VLAN
A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect: however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information: Which of the following is MOST likely causing this connection failure? A. Transmission speed B. Incorrect passphrase C. Channel overlap D. Antenna cable attenuation/signal loss
Incorrect passphrase
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding? A. Increased CRC errors B. Increased giants and runts C. Increased switching loops D. Increased device temperature
Increased CRC errors
A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue? A. Incorrect VLAN setting B. Insufficient DHCP scope C. Improper NIC setting D. Duplicate IP address
Insufficient DHCP scope
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.) A. Jitter B. Speed mismatch C. QoS misconfiguration D. Encapsulation errors E. CRC errors F. Encapsulation errors
Jitter, QoS misconfiguration
A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery? A. Link aggregation control B. Port tagging C. Jumbo frames D. Media access control
Jumbo frames
Which of the following does a NoSQL database use to organize data? Tables Primary keys Keys/values Schemas
Keys/values
Which of these cellular technologies offers the fastest speeds? a. LTE-A b. CDMA c. 4G-LTE d. GSM
LTE-A
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
Layer 2
Which of the following network devices can perform routing between VLANs? A. Layer 2 switch B. Layer 3 switch C. Load balancer D. Bridge
Layer 3 switch
Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network? Answers: A. Layer 1 B. Layer 3 C. Layer 6 D. Layer 7
Layer 6
Which of the following topologies requires the MOST connections when designing a network? A. Mesh B. Star C. Bus D. Ring
Mesh
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. AUP b. MDM c. BYOD d. NDA
NDA
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task? A. Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control Protocol D. Address Resolution Protocol
Neighbor Discovery Protocol
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution? A. Out-of-band access B. Split-tunnel connections C. Virtual network computing D. Remote desktop gateways
Out-of-band access
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform task scheduling. B. Set the system date and time. C. Perform process management. D. Set a reminder to run the script.
Perform process management.
A technician is configuring computers for a mass deployment. As part of a web-based application, several new windows need to open once a user logs in. Which of the following should the technician configure to ensure the browsers open properly? A. Unrestricted PowerShell execution policy B. Pop-up blocker exceptions C. Applications to run in private mode D. Security extensions setting to disable
Pop-up blocker exceptions
Which of the following describes the unit of containment that an application is constrained to on an operating system? Thread Console Directory Process
Process
A Chief Executive Officer and a network administrator came to an agreement with a vendor to purchase new equipment for the data center. A document was drafted so all parties would be informed about the scope of the project before it started. Which of the following terms BEST describes the document used? A. Contract B. Project charter C. Memorandum of understanding D. Non-disclosure agreement
Project charter
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member? Project management Personal information management Collaborative workspace Spreadsheet
Project management
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection. Which of the following settings should provide better network stability? A. Client association timeout B. RSSI roaming threshold C. RF attenuation ratio D. EIRP power setting
RSSI roaming threshold
An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations? A. MTTR B. RTO C. MTBF D. RPO
RTO
Which of the following describes a unique entry to a data set? Column Schema Record Index
Record
A schema is a critical part of which of the following? Document database NoSQL database Relational database Key/value database
Relational database
An administrator would like to allow Windows clients from outside the office to access workstations without using third-party software. Which of the following access methods would meet this requirement? A. Remote desktop gateway B. Split tunnel C. Site-to-site VPN D. VNC
Remote desktop gateway
A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data: Which of the following should the network technician perform to correct the issue? A. Replace the Cat 5 patch cable with a Cat 6 cable. B. Install a crossover cable between the server and the switch. C. Reset the switchport configuration. D. Use NetFlow data from the switch to isolate the issue. E. Disable MDIX on the switchport and reboot the server.
Replace the Cat 5 patch cable with a Cat 6 cable.
Which of the following information types would cause the GREATEST loss of value to an organization if encrypted by a ransomware attack? User login history Employee emergency contacts Advertising material archive Research projects database
Research projects database
Which of the following is a benefit of embedded operating systems? Easy to transfer data between systems Frequent updates Resource efficiency Ability to run multiple applications
Resource efficiency
A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue? A. Ping the client's computer from the router. B. Run the traceroute command on the server. C. Run iperf on the technician's desktop. D. Run the show interface command on the switch. E. Run a port scanner on the client's IP address.
Run the show interface command on the switch.
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue? A. MTTR B. MOU C. NDA D. SLA
SLA
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. SNMP B. Link state C. Syslog D. QoS E. Traffic shaping
SNMP
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. Syslog B. Link state C. SNMP D. QoS E. Traffic shaping
SNMP
Which of the following records can be used to track the number of changes on a DNS zone? A. SOA B. SRV C. TXT D. NS
SOA
Which of the following protocols would allow a secure connection to a Linux-based system? A. SMB B. FTP C. RDP D. SSH
SSH
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues? A. 802.1Q B. STP C. Flow control D. CSMA/CD
STP
A customer wants to log in to a vendor's server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server? A. Secure Sockets Layer B. Site-to-site VPN C. Remote desktop gateway D. Client-to-site VPN
Secure Sockets Layer
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use? A. Network access control B. Least privilege C. Multifactor authentication D. Separation of duties
Separation of duties
A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue? Off-peak internet usage Router failure Site congestion Shared bandwidth
Site congestion
A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue? Shared bandwidth Router failure Site congestion Off-peak internet usage
Site congestion
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols? A. Client-to-Site VPN B. Clientless VPN C. RDP D. Site-to-site VPN E. SSH
Site-to-site VPN
Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs? A. Split tunnel B. Full tunnel C. Site-to-site tunnel D. Virtual desktop
Split tunnel
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? Text editing software Spreadsheet software Web browsing software Visual diagramming software
Spreadsheet software
During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report: Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client? A. Electrical B. Humidity C. Flooding D. Temperature
Temperature
A large percentage of computers within an organization are suddenly reporting that their operating systems may be illegally obtained. Which of the following is the MOST likely cause? The key management server is offline. Internet access is unavailable. Hackers have stolen the organization's license. The company did not pay for the license.
The company did not pay for the license.
During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue? A. Traps B. MIB C. OID D. Baseline
Traps
A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover? A. VIP B. NAT C. APIPA D. IPv6 tunneling E. Broadcast IP
VIP
A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technician MOST likely use? A. Flow control B. Traffic shaping C. VLAN tagging D. Network performance baselines
VLAN tagging
Which of the following would be the BEST choice to connect branch sites to a main office securely? A. Bridge B. Proxy server C. VPN headend D. Load balancer
VPN headend
A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue? A. Verifying if an encryption protocol mismatch exists. B. Verifying if a captive portal is active for the WLAN. C. Verifying the minimum RSSI for operation in the device's documentation. D. Verifying EIRP power settings on the access point.
Verifying if a captive portal is active for the WLAN.
A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice? Visual diagramming software Image editing software Presentation software Word processing software
Visual diagramming software
Several wireless security cameras need to be installed in a small office. Which of the following should be used to configure the wireless encryption? Web-based interface Virtual interface IP-based HDD On-board NIC
Web-based interface
A developer embeds a query in a high-level program to extract information from a database. This is an example of: Database utility access. Database manual access. Database direct access. Database programmatic access.
database programmatic access. Database programmatic access. This approach involves using a programming language (high-level or otherwise) to interact with a database management system (DBMS) and retrieve data by sending structured queries to the database. Programmatic access allows developers to automate database interactions within their applications, enabling dynamic data retrieval and manipulation.
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer? A. ifconfig ecth0 promisc B. ifconfig eth1 up C. ifconfig eth0 10.1.2.3 D. ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
ifconfig ecth0 promisc
A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line? A. netstat B. netstat -a C. netstat -e D. netstat -n
netstat -n
An IT administrator received an assignment with the following objectives: ✑ Conduct a total scan within the company's network for all connected hosts. ✑ Detect all the types of operating systems running on all devices. ✑ Discover all services offered by hosts on the network. ✑ Find open ports and detect security risks. Which of the following command-line tools can be used to achieve these objectives? A. arp B. nmap C. netstat D. tcpdump
nmap
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.) A. tcpdump B. show config C. hostname D. show route E. netstat F. show ip arp
show config, show route
Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model? A. VPN B. VRRP C. vSwitch D. VIP
vSwitch