CompTIA Network+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Why do most switches run the Spanning Tree Protocol by default?

It prevents switching loops.

What is the default network authentication protocol for Windows 2000, and later?

Kerberos

What security protocol replaced NTLM for network user authentication on Windows 2000 and later networks?

Kerberos

FF:FF:FF:FF:FF:FF is considered to be a(n) ___________________.

Layer 2 broadcast

Which principle prescribes that users should be given access only to resources required to do their job?

Least Privilege

Which of the following is a software management application running on servers that analyzes the received information from your network and puts the information in a type of phone book of information?

NetFlow

Which layer of the TCP/IP model is sometimes referred to as the Link Layer?

Network Interface layer (Layer 1)

You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. What technology will you use to implement a solution?

PAT

At which OSI layer does an active hub function?

Physical Layer

What are the colors of the eight pins in the 568A cable specification?

Pin 1 - Green/White Pin 2 - Green Pin 3 - Orange/White Pin 4 - Blue Pin 5 - Blue/White Pin 6 - Orange Pin 7 - Brown/White Pin 8 - Brown

How is a T1 crossover cable wired?

Pins 1, 2, 4, and 5 are connected to 4, 5, 1, and 2.

Wireshark is an example of a ___________________ .

Protocol Analyzer

You need to have a connection to run applications that are installed on only your desktop computer at your office. Which protocol will provide a GUI interface to your work computer?

RDP

Which of the following routing protocols will send IPv6 route updates between routers?

RIPng

Which routing protocols have an administrative distance of 120? (Choose two.)

RIPv1 and RIPv2

Which routing protocols are distance-vector protocols?

RIPv2 and EIGRP

You have two buildings connected via a wireless bridged network using omnidirectional antennas. The company complains about low throughput. What should you do to improve the link performance?

Replace the antennas with Yagis.

You need to transfer files between two systems. Which two of the following can be used? (Choose two.)

SCP and FTP

What networking protocol uses OIDs and MIBs for data collection?

SNMP

What does the acronym SFP denote?

Small Form-factor Pluggable

Which of the following devices operate at the Data Link layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)

Switch and AP (Access Point)

Which of the following are connection-oriented protocols or applications?

TCP, Telnet, FTP

A technician has tested a cable and has established that it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?

TDR

Which DoD Process/Application layer protocol provides terminal emulation and remote login capability on TCP/IP networks?

Telnet

A user is experiencing problems logging in to a Linux server. He can connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt logging in as this user from your workstation with his username and password and don't experience any problems. However, you cannot log in with either his username or yours from his workstation. What is a likely cause of the problem?

The Caps Lock key is pressed.

If you are forced to replace a router that has failed to the point that you are unable to access its current configuration to aid in setting up interface addresses on the new router, which of the following can you reference for assistance?

The best method here is to check the configuration of devices that were using the old router as a gateway to the rest of the internetwork.

What are the two advantages of bus topology?

The bus topology is cheaper and easier to install for smaller networks and it uses the least amount of cabling.

Which of the following tools enables the technician to trace cables in multiple-pair wiring?

Toner probe

How does full-duplex mode affect traffic?

Traffic can be transmitted in both directions at the same time

What is the most effective way to stop social engineering attacks?

Training

At which layer of the OSI model does UDP operate?

Transport

Segmentation of a data stream happens at which layer of the OSI model?

Transport

UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

What does the acronym WPA denote?

WiFi Protected Access

Which IEEE 802.11b security protocol is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to a standard wired LAN?

Wired Equivalent Privacy (WEP)

Which two connectivity devices are designed to increase usable bandwidth within a network?

a bridge and a switch

Which network layout has a single cable connected to all network devices?

a bus network

What is LWAPP?

a protocol that allows a wireless LAN controller (WAC) to manage and control multiple wireless access points

Which types of IDS is based on a database of known attacks and their respective patterns?

a signature-based IDS

What is a security mechanism that is used to designate which users can gain various types of access, such as read, write, and execute access, to resources on a network?

an access control list (ACL)

What term is used to describe the situation where a wireless access point has reached the maximum number of connected devices?

device saturation

Which type of network interference is caused by fluorescent lighting?

electromagnetic interference (EMI)

What does frame tagging in a port-based switching network ensure?

ensures that a single VLAN can be distributed across multiple switches...

Which types of devices most widely use Any+?

fitness monitors or sensors, like Fitbit

What occurs when the cabling connectors are configured with the wrong individual pin in the connector sockets?

incorrect termination

Which TCP/IP utility do you use to display the current IP configuration of a Windows computer?

ipconfig

Which type of cable is used in a 10GBaseLW network?

single-mode fiber-optic

What does a wiring schematic use to represent components?

symbols

Which DHCP option is used for the default gateway configuration?

the 003 Router DHCP option...

Which channel carries Primary Rate ISDN (PRI) signaling and link-management data?

the D channel

In which phase of the DHCP client configuration is the IP addressing information assigned to the client?

the IP lease acknowledgement phase

Which address to hardware vendors assign?

the physical device or media access control (MAC) address

What is the purpose of MAC filtering?

to allow or deny a connection based on the client's Media Access Control (MAC) address.

What is the purpose of scope option in a DHCP server?

to ensure that all devices that are part of the scope will receive certain settings...

What is the purpose of the ARP table?

to map MAC addresses to IP addresses

What is the purpose of file hashing?

to provide data or file integrity

What switch would you use with the arp command to statically add an entry to the ARP cache?

-s

Which of the following describe the difference between static and dynamic routing? (Choose two.)

1. Dynamic routes are used to scale large networks. 2. Dynamic routes are added automatically to the routing table.

What is the maximum cable length in a 1000BaseT network?

100BaseT and 1000BaseT both have a maximum cable distance of 100 meters.

Which one of the following is the fiber-optic standard of the Institute of Electrical and Electronics Engineers (IEEE)?

10GBaseLR

What is the approximate throughput of the 802.11b standard?

11 Mbps

POP3 uses what well-known port number?

110

Which ports does MGCP use?

2427/2727

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

30

What is the transmission speed and maximum cable length for E3?

34.368 Mbps, 450 feet

What are the eight channels supported by the 802.11a wireless standard?

36, 40, 44, 48, 52, 56, 60, 64

What is the maximum length for VDSL?

4,000 feet

The network address of 172.16.0.0/19 provides how many subnets and hosts?

8 subnets, 8,190 hosts each

Which wireless technology standard allows for communication at both 2.4 GHz and 5 GHz frequencies?

802.11n

Which IEEE standard specifies the protocol for CSMA/CD?

802.3 standard

What is a DHCP lease?

A DHCP lease is a temporary assignment of IP address information to a DHCP client.

What infrastructure component is required by WPA Enterprise or WPA2 Enteprise?

A RADIUS server

Which type of SNMP message sets a variable in a managed device or triggers an action on a managed device?

A SET message

Which network topology consists of devices connected from point to point in a loop?

A ring network

The -g and -a switches provide the same output from which utility?

ARP

What DoD Internet layer protocol provides IP to MAC address resolution?

ARP

Which command-line utility will show the relationship between a MAC address and the corresponding IP address?

ARP

Which utility do you use to display a list of local IP addresses resolved to physical addresses on a Microsoft Windows network?

ARP utility...

HTTP, FTP, and Telnet work at which layer of the OSI model?

Application

The OSI model has seven layers and the DoD has four. At which layer does SMTP work in both models?

Application

At which layer of the OSI model does TFTP operate?

Application layer (layer7)

Which of the following uses a characteristic factor for authentication?

Biometrics

Which of the following are considered network access control methods?

CHAP, 802.1X, EAP

What does the acronym CSMS/CA denote?

Carrier Sense Multiple Access/Collision Avoidance

Which practices help secure your wireless access points from unauthorized access?

Changing the default SSID value

Which concern do you have when you encrypt data before sending it?

Confidentiality

Not a basic physical issue that can occur on a network when a user is connected via cable?

DNS

Which technology allows the transmission of digital signals over regular copper-wire phone lines?

DSL

At which layer of the OSI model do MAC addresses and EUI-64 addresses operate?

Data Link layer (Layer 2)

What is war driving?

Deliberately searching for Wi-Fi signals while driving by in a vehicle

Which protocol provides a secure connection between web server and web browser

HTTPS

Which condition leads to shorts?

High humidity

Which protocol uses port 143?

IMAP

What are the 7 steps of the seven-step troubleshooting methodology?

Identify the problem. Establish a theory of probable cause. Test the theory to determine the cause. Establish a plan of action to resolve the problem and identify potential effects. Implement the solution or escalate as necessary. Verify full system functionality, and if applicable, implement preventative measures. Document findings, actions, outcomes, and lessons learned.

What does an SOA record contain?

Information regarding a particular DNS zone's start of authority (SOA)

What does the acronym IaaS denote?

Infrastructure as a Service

A retail company is concerned about outside users gaining access to its confidential resources. The retail company hosts a Simple Mail Transfer Protocol (SMTP) server as well as a secure Internet shopping site. How can it protect its network without severely impacting business operations?

Install a firewall, and block all incoming ports except 443 and 25.

What does the acronym IDS denote?

Intrusion Detection System

If encryption is not configured on a wireless network, then in what form is wireless data transmitted?

It is transmitted in plain text


Ensembles d'études connexes

Unit 6 Lesson 2; 11 Evaluate: Graded Quiz

View Set

POSC 344 Hulsey JMU Politics of the EU

View Set

Reading Bowl - The Epic Fail of Arturo Zamora

View Set

Lab 6: Blood Pressure & Pulse Lab

View Set

Newton's Laws Of Motion & Forces

View Set

Chapter 56: Management of Patients with Dermatologic Disorders

View Set