Practice test 1 CompTIA Network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage? a) RPO b) MTBF C) RTO D) MTTR

A) RPO

Which of the following type of network models requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network? A) Hub-and-spoke B) Client-server C) Point-to-point D) Peer-to-peer

client-server A client-server network model utilizes specific devices (servers) to provide services to requesters (clients). A server is a specialized computer that runs a networking operating system. A client is any device that requests services over a network, such as a desktop, laptop, tablet, or internet of things device. A peer-to-peer network model does not differentiate between the clients and the servers, and every node can become a client and a server when requesting and responding to service requests. A hub and spoke topology is a network topology where a central device (the hub) is connected to multiple other devices (the spokes). A point-to-point connection provides a path from one communication endpoint to another.

You have been asked to install a media converter that connects a newly installed SMF to the existing Cat 6a infrastructure. Which type of media converter should you use? a. Fiber to coaxial b. Fiber to ethernet c. Coaxial to fiber d. Coaxial to ethernet

coaxial to ethernet A media converter is a Layer 1 device that changes one type of physical network connection to another. In this case, we are converting single-mode fiber (SMF) cable to Cat 6a (ethernet) cable.

What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of its members? a) Hybrid Cloud b) Private Cloud c) Public Cloud d) Community Cloud

d) Community Cloud

Which of the following network topologies requires that all nodes have a point-to-point connection with every other node in the network? a) Star b) Ring c) Bus d) Mesh

d) Mesh

A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem? a) Group policy has not propagated to the device b) IDS is blocking RADIUS c) Username is misspelled in the device configuration file d) Shared secret key is mismatched

d) Shared secret key is mismatched

Your company is currently using a 5 GHz wireless security system, so your boss has asked you to install a 2.4 GHz wireless network to use for the company's computer network to prevent interference. Which of the following can NOT be installed to provide a 2.4 GHz wireless network? a. 802.11n b. 802.11b c. 802.11g d. 802.11ac

d. 802.11ac

Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. Which of the following commands should he enter on his workstation to resolve this connectivity issue? a. C:\windows\system32> nslookup b. C:\windows\system32> ipconfig /flushdns c. C:\windows\system32> nbtstat -R d. C:\windows\system32> route print

c. C:\windows\system32> nbtstat -R

You are working as a network technician running new unshielded twisted pair cables from the intermediate distribution frame to the individual offices on the same floor. The cable comes in 1000 foot spools. Which of the following tools should you use to break the cable into shorter distances? a. Cable crimper b. Punchdown tool c. Cable snip d. Cable stripper

c. Cable snip

A network technician is diligent about maintaining all system servers at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future? a. Configure a honeypot for application testing b. Virtualize the servers and take daily snapshots c. Configure a test lab for updates d. Configure an automated patching server

c. Configure a test lab for updates

You are conducting a wireless penetration test against a WPA2-PSK network. Which of the following types of password attacks should you conduct to verify if the network is using any of the Top 1000 commonly used passwords? a. Spraying b. Hybrid c. Dictionary d. Brute-force

c. Dictionary

Elizabeth was replacing a client's security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem? a. DNS b. DHCP c. Firewall d. Content filter

c. Firewall

Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router can recognize drives up to 4TB in size, but she cannot get her 3TB hard drive to show up on the network. Which of the following should Lynne do to solve this issue? a. Install the latest OS on her computers b. Load the latest hardware drivers for her USB drive c. Flash the latest firmware for her router d. Download a new music player on her computers

c. Flash the latest firmware for her router

Dion Worldwide has recently built a network to connect four offices around the world together. Each office contains a single centralized switch that all of the clients connect to within that office. These switches are then connected to two of the other locations using a direct fiber connection between each office. The office in New York connects to the London office, the London office connects to the Hong Kong office, the Hong Kong office connects to the California office, and the California office connects to the New York office. Which of the following network topologies best describes the Dion Worldwide network? a. Ring b. Bus c. Hybrid d. Star

c. Hybrid

A technician just completed a new external website and set up an access control list on the firewall. After some testing, only users outside the internal network can access the site. The website responds to a ping from the internal network and resolves the proper public address. What can the technician do to fix this issue while causing internal users to route to the website using its internal IP address? a. Place the server in a screened subnet or DMZ b. Adjust the ACL on the firewall's internal interface c. Implement a split-horizon or split-view DNS d. Configure the firewall to support dynamic NAT

c. Implement a split-horizon or split-view DNS

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue? a. Increase the maximum log size b. Delete the logs when full c. Install an event management tool d. Log into the DNS server every hour to check if the logs are full

c. Install an event management tool

You are troubleshooting a network connectivity issue on a student's workstation at Dion Training. You check the details for the 802.11ac wireless network interface card and it reports the current RSSI level is -95 dB. Which of the following issues would cause this RSSI level? a. Wrong SSID b. Incorrect passphrase c. Insufficient wireless coverage d. Encryption protocol mismatch

c. Insufficient wireless coverage

A network technician connects three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up, and the network technician can ping network devices in all of the office trailers. However, users are complaining that they are experiencing sporadic connectivity. What is the MOST likely cause of this issue? a. Latency b. Split horizon c. Interference d. Throttling

c. Interference

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do? a. Send out a notification to the company about the change b. Wait until the maintenance window and make the requested change c. Make the change, document the requester, and document all network changes d. First document the potential impacts and procedures related to the change

c. Make the change, document the requester, and document all network changes

Jason is a network manager leading a project to deploy a SAN. He is working with the vendor's support technician to set up and configure the SAN on the enterprise network to begin SAN I/O optimization. What should Jason provide to the vendor support technician? a. Asset management document b. Baseline documents c. Network diagrams d. Access to the data center

c. Network diagrams

What is the lowest layer (bottom layer) of a bare-metal virtualization environment? a. Hypervisor b. Guest operating system c. Physical hardware d. Host operating system

c. Physical hardware

Your company has just purchased a new building down the street for its executive suites. You have been asked to select the proper antennas to establish a wireless connection between the two buildings. Which of the following is the BEST antenna configuration to use for AP4 and AP5 to control the signal propagation and minimize the chances of the signal being intercepted? a. Pick a 5 dB Left Directional for AP4 and a 5 dB Right Direction for AP5 b. Pick a 15 dB Left Parabolic for AP4 and a 15 dB Right Parabolic for AP5 c. Pick a 15 dB Right Parabolic for AP4 and a 15 dB Left Parabolic for AP5 d. Pick a 5 dB Right Directional for AP4 and a 5 dB Left Direction for AP5

c. Pick a 15 dB Right Parabolic for AP4 and a 15 dB Left Parabolic for AP5

You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal? a. NAC b. 802.1x c. Port security d. ACL

c. Port security

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem? a. The baseband firmware needs to be updated b. The smartphone has been infected with a virus c. The data speeds are insufficient with only one bar of signal d. The cellular radio cannot connect to the cellphone towers

c. The data speeds are insufficient with only one bar of signal

A workstation is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can communicate with the VLAN gateway and access websites on the Internet. Which of the following is the MOST likely the source of this connectivity problem? a. The workstation's NIC has a bad SFP module b. The workstation's OS updates have not been installed c. The switchport is configured for 802.1q trunking d. APIPA has been misconfigured on the VLAN's switch

c. The switchport is configured for 802.1q trunking

You are working as a network administrator for Dion Training. The company has decided to allow employees to connect their devices to the corporate wireless network under a new BYOD policy. You have been asked to separate the corporate network into an administrative network (for corporate-owned devices) and an untrusted network (for employee-owned devices). Which of the following technologies should you implement to achieve this goal? a. MAC filtering b. VPN c. VLAN d. WPA2

c. VLAN

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially? a. authEncrypt b. authNoPriv c. authPriv d. authProtect

c. authPriv

You just started work as a network technician at Dion Training. You have been asked to check if DHCP snooping has been enabled on one of the network devices. Which of the following commands should you enter within the command line interface? a. show route b. show diagnostic c. show config d. show interface

c. show config

Which of the following concepts is the MOST important for a company's long-term health in the event of a disaster? a. Off-site backups b. Implementing an acceptable use policy c. Vulnerability scanning d. Uninterruptible power supplies

a. Off-site backups

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of? a. Port forwarding b. Dynamic NAT c. Dynamic DNS d. Static NAT

a. Port forwarding

Your supervisor has asked you to run a Cat 5e cable between two network switches in the server room. Which type of connector should be used with a Cat 5e cable? a. RJ-45 b. DB-25 c. F-type d. RJ-11

a. RJ-45

You are performing a high-availability test of a system. As part of the test, you create an interruption on the fiber connection to the network, but the network traffic was not re-routed automatically. Which type of routing is the system utilizing? a. Static b. Distance vector c. Hybrid d. Dynamic

a. Static

Scott is a brand new network technician at Dion Training. He has been told to remote into the edge switch from his desk and enable DHCP snooping. Which of the following commands should he use? a. telnet b. ip c. TFTP server d. nmap

a. telnet

Which protocol is used for the synchronization of clocks between different computer systems over a packet-switched, variable-latency data network? a) DNS b) NTP c) DHCP d) TFTP

b) NTP

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation? a) Encryption b) eDiscovery c) First responder d) Data transport

b) eDiscovery

You have just finished installing a new web application and need to connect it to your Microsoft SQL database server. Which port must be allowed to enable communications through your firewall between the web application and your database server? a. 1521 b. 1433 c. 3306 d. 3389

b. 1433

What is the network ID associated with the host located at 192.168.0.123/29? a. 192.168.0.112 b. 192.168.0.120 c. 192.168.0.96 d. 192.168.0.64

b. 192.168.0.120

(This is a simulated Performance-Based Question. On the real exam, you may be given a chart with numerous ports and protocols and be asked to drag and drop them to match the ports with the protocols.) What ports do FTP and SFTP utilize? a. 22, 23 b. 21, 22 c. 21, 23 d. 20, 21

b. 21, 22

Which of the following levels would an error condition generate? a. 1 b. 3 c. 7 d. 5

b. 3

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? a. Multilayer switch b. Analog modem c. DOCSIS modem d. Access point

b. Analog modem

Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times? a. Snapshots b. High availability c. Cold site d. Warm site

b. High availability

Dion Training utilizes a wired network throughout the building to provide network connectivity. Jason is concerned that a visitor might plug their laptop into a CAT 5e wall jack in the lobby and access the corporate network. What technology should be utilized to prevent users from gaining access to network resources if they can plug their laptops into the network? a. VPN b. NAC c. DMZ d. UTM

b. NAC

What type of services can allow you to get more storage and more resources added to the cloud as fast as possible? a. Metered services b. Rapid elasticity c. Resource pooling d. Measured services

b. Rapid elasticity

You are trying to select the BEST network topology for a new network based on the following requirements. The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client's requirements? a. Star b. Ring c. Bus d. Mesh

b. Ring

Which of the following remote access tools is a command-line terminal emulation program operating on port 23? a. SSH b. Telnet c. VNC d. RDP

b. Telnet

What is true concerning jumbo frames? a. They are commonly used with DHCP b. They are commonly used on a SAN c. They are commonly used with a NAS d. Their MTU size is less than 1500

b. They are commonly used on a SAN

You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist? a) 143 b) 123 c) 445 d) 514

c) 445

A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime? a) Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance b) Configure endpoints to automatically download and install the patches c) Deploy the patch in a lab environment to quickly conduct testing, get approval for an emergency change, and then immediately install it in the production environment d) Download and install all patches in the production network during the next scheduled maintenance period

c) Deploy the patch in a lab environment to quickly conduct testing, get approval for an emergency change, and then immediately install it in the production environment

An employee of a highly secure company needs to use facial recognition in addition to a username/password to establish a VPN successfully. What BEST describes this methodology? a) Federated identity b) PKI c) Two-factor authentication d) Geofencing

c) Two-factor authentication

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 54 Mbps? a. 802.11g b. 802.11ax c. 802.11a d. 802.11ac e. 802.11n f. 802.11b

c. 802.11a

A client has asked you to provide their local office with the BEST solution for a wireless network based on their requirements. The client has stated that their users will need a wireless network that provides a maximum of 54 Mbps of bandwidth and operates in the 2.4GHz frequency band. Which of the following wireless network types should you install to meet their needs? a. 802.11ac b. 802.11a c. 802.11g d. 802.11b

c. 802.11g

A home user reports to a network technician that the Internet is slow when they attempt to use their smartphone or laptop with their Wi-Fi network. The network administrator logs into the admin area of the user's access point and discovers that multiple unknown devices are connected to it. What is MOST likely the cause of this issue? a. An evil twin has been implemented b. The user is experiencing ARP poisoning c. A successful WPS attack has occurred d. The user is connected to a botnet

c. A successful WPS attack has occurred

You are installing a new LAN in a building your company just purchased. The building is older, but your company has decided to install a brand new Cat 6a network in it before moving in. You are trying to determine whether to purchase plenum or PVC cabling. Which environmental conditions should be considered before making the purchase? a. Window placement b. Workstation models c. Air duct placement d. Floor composition

c. Air duct placement

Which of the following ports is used by LDAP by default? A) 3389 B) 427 C) 53 D) 389

389 The lightweight directory access protocol (LDAP) is a protocol used to access and update information in an X.500-style network resource directory. LDAP uses port 389. The service location protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks. SLP uses port 427. The remote desktop protocol (RDP) is a protocol used for the remote administration of a host using a graphical user interface. RDP operates over TCP port 3389. The domain name system (DNS) protocol is the protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53.

Which of the following levels would a debugging condition generate? A) 0 B) 1 C) 6 D) 7

7 The severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system's primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.

You are configuring a point-to-point link between two routers and have been assigned an IP of 77.81.12.14/30. What is the network ID associated with this IP assignment? A) 77.81.12.12 B) 77.81.12.14 C) 77.81.12.13 D) 77.81.12.15

77.81.12.12 OBJ-1.4: In classless subnets using variable length subnet mask (VLSM), the network ID is the first IP address associated within an assigned range. In this example, the CIDR notation is /30, so each subnet will contain 4 IP addresses. Since the IP address provided is 77.81.12.14/30, the network ID is 77.81.12.12/30, the first router is 77.81.12.13/30, the second router is 77.81.12.14/30, and the broadcast address is 77.81.12.15/30.

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this? A) The process of discovery B) A notice of a legal hold C) A chain of custody breach D) A data transport request

A notice of a legal hold A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted. The process of discovery is the formal process of exchanging information between the parties about the witnesses and evidence they will present at trial. The chain of custody is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. A data transport request is a formalized request to initiate a data transfer by establishing a circuit or connection between two networks.

Which of the following must be added to a VLAN's gateway to improve the security of the VLAN? A) Spanning tree protocol B) Split Horizon C) Hold Down Timer D) Access Control List

Access control list Without a properly configured ACL, there is no additional security provided by a VLAN. A VLAN (virtual local area network) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). Adding a VLAN to a network provides segmentation of the traffic and traffic must be routed between the VLANs. This allows network administrators the opportunity to allow or deny traffic into or out of a given VLAN for additional security by using access control lists. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks and operates at layer 2 of the OSI model. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned. A hold down timer is a function of a router that prevents a route from being updated for a specified length of time (in seconds). A hold down timer allows for the routers in a topology to have sufficient time to reach convergence and be updated when a route fails.

The UPS that provides backup power to your server is malfunctioning because its internal battery has died. To replace the battery, you must shut down the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the server's availability in the future. Which of the following recommendations would BEST increase the server's availability based on your experience with this UPS battery replacement? A) Add a redundant power supply to the server B) Replace the UPS with a generator C) Install a second UPS in the reack D) Install a surge protector instead

Add a redundant power supply to the server The BEST recommendation would be to install a redundant power supply in the server. Adding a second UPS would not solve the problem if the server still only has one power supply available. Switching from a UPS to a generator will not solve this issue, either, because generators also require scheduled maintenance and downtimes. Finally, adding a surge protector won't provide power when you need to power off a UPS for a battery replacement.

A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected? A) Analyze Packet captures B) Review the ID3 logs on the network C) Utilize netstat to locate active connections D) Use Nmap to query known ports

Analyze packet captures Packet captures contain every packet that is sent and received by the network. By using a program like Wireshark to analyze the packet captures, you can see what kind of information and metadata is contained within the packets. By conducting this type of packet analysis, an attacker (or cybersecurity analyst) can determine if software versions are being sent as part of the packets and their associated metadata.

What is a common technique used by malicious individuals to perform an on-path attack on a wireless network? a. Amplified DNS attacks b. ARP spoofing c. An evil twin d. Session hijacking

c. An evil twin

Dion Training has a single-mode fiber-optic connection between its main office and its satellite office located 30 kilometers away. The connection stopped working, so a technician used an OTDR and found that there is a break in the cable approximately 12.4 kilometers from the main office. Which of the following tools is required to fix this fiber optic connection? a. Fusion splicer b .Media converter c. Cable snips d. Cable crimper

a. Fusion splicer

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk? A) Enable HIPS to protect the server until the patch is released B) Utilize WAF restrict malicious activity to the internet server C) Downgrade the server and defer the new feature testing D) Enable the host-based firewall on the internet server

Downgrade the server and defer the new feature testing Since the vendor stated that the new version introduces vulnerabilities in the environment, it is best to downgrade the server to the older and more secure version until a patch is available.

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first? a. Install an access control vestibule at the entrance b. Install an RFID badge reader at the entrance c. Install CCTV to monitor the entrance d. Require all employees to wear security badges when entering the building

a. Install an access control vestibule at the entrance

Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (SELECT TWO) a. NAC b. GPS location c. Geo-IP d. Port security

a. NAC b. GPS location

Dion Training is trying to connect two geographically dispersed offices using a VPN connection. You have been asked to configure their networks to allow VPN traffic into the network. Which device should you configure FIRST? A) Firewall B) Modem C) Router D) Switch

Firewall You should FIRST configure the firewall since the firewall is installed at the network's external boundary (perimeter). By allowing the VPN connection through the firewall, the two networks can be connected and function as a single intranet (internal network). After configuring the firewall, you will need to verify the router is properly configured to route traffic between the two sites using the site-to-site VPN connection. A modem modulates and demodulates electrical signals sent through phone lines, coaxial cables, or other types of wiring. A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer 2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It uses hardware-based switching techniques to connect and transmit data in a local area network (LAN).

Andy is a network technician who is preparing to configure a company's network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should be able to reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions would work for this particular network configuration? A) Classlesss B) Private C) APIPAD D) Teredo Tunneling

Private A private IP address is an IP address reserved for internal use behind a router or other Network Address Translation (NAT) devices, apart from the public. Private IP addresses provide an entirely separate set of addresses that still allow access to a network without taking up a public IP address space. Automatic Private IP Addressing (APIPA) is a feature in operating systems (such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when their DHCP server isn't reachable. Classless IP addressing solutions allow for the use of subnets that are smaller than the classful subnets associated with Class A, Class B, or Class C networks. Teredo is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network.

Which type of network device operates at layer 1 of the OSI model and requires connected devices to operate at half-duplex using CSMA/CD? a. Bridge b. Switch c. Hub d. Router

Hub A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. A hub operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, therefore they must use half-duplex for communication and CSMA/CD. A switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A switch operates at the data link layer (Layer 2) of the OSI model and makes switching decisions based upon MAC addresses. Each switchport on a switch is a separate collision domain, but all switchports are in a common broadcast domain. A switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A switch operates at the data link layer (Layer 2) of the OSI model and makes switching decisions based upon MAC addresses. Each switchport on a switch is a separate collision domain, but all switchports are in a common broadcast domain. A router is networking hardware that connects computer networks and forwards data packets between those networks. A router operates at the network layer (Layer 3) of the OSI model and makes routing decisions based upon IP addresses. Each switchport on a router is a separate collision domain and a separate broadcast domain.

A technician needs to ensure wireless coverage in the green space near the center of the college campus. The antenna is being installed in the middle of the field on a pole. Which type of antenna should be installed to ensure maximum coverage? A) Omnidirectional B) Unidirectional C) Bi-Directional D) Yagi

Omnidirectional Omnidirectional antennas send the signal out equally in all directions. Therefore, it will provide the best coverage since it is located in the center of the field. Unidirectional antennas transmit the signal in only one direction and would not provide adequate coverage. Bidirectional antennas transmit the signal in only two directions and would not provide adequate coverage. A Yagi antenna is a type of unidirectional antenna that can focus the transmission over a longer distance but would not be appropriate in this case since you need 360-degree coverage.

What is the flag used to terminate a connection between two hosts when the sender believes something has gone wrong with the TCP connection between them? A) SYN B) FIN C) ACK D) RST

RST A reset (RST) flag is used to terminate the connection. This type of termination of the connection is used when the sender feels that something has gone wrong with the TCP connection or that the conversation should not have existed in the first place. For example, if a system receives information that is outside of an established session, it will send a RST flag in response. A finish (FIN) flag is used to request that the connection be terminated. This usually occurs at the end of a session and allows for the system to release the reserved resources that were set aside for this connection. A synchronization (SYN) flag is set in the first packet sent from the sender to a receiver as a means of establishing a TCP connection and initiating a three-way handshake. Once received, the receiver sends back a SYN and ACK flag set in a packet which is then sent back to the initiator to confirm they are ready to initiate the connection. Finally, the initial sender replies with an ACK flag set in a packet so that the three-way handshake can be completed and data transmission can begin.

Which of the following policies or plans would describe the access requirements for connecting a user's laptop to the corporate network? A) Onboarding Policy B) Bring your own device policy C) Password Policy D) Remote Access Policy

Remote Access Policy A bring your own device (BYOD) policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops. A remote access policy is a document that outlines and defines acceptable methods of remotely connecting to the internal network. A password policy is a set of rules created to improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly. This document promotes strong passwords by specifying a minimum password length, complexity requirements, requiring periodic password changes, and placing limits on the reuse of passwords. An onboarding policy is a documented policy that describes all the requirements for integrating a new employee into the company and its cultures, as well as getting that new hire all the tools and information they need to begin their job successfully.

Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device? A) IDS B) IPS C) Syslog D) UTM

UTM A Unified Threat Management (UTM) appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention. A UTM centralizes the threat management service, providing simpler configuration and reporting than isolated applications spread across several servers or devices. An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them. An intrusion prevention system (IPS) conducts the same functions as an IDS but can also block or take actions against malicious events. A Syslog server is a server that collects diagnostic and monitoring data from the hosts and network devices across a given network.

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented? A) WEP B) WPA2 filtering C) WPA2 Enterprise D) WPA Personal

WPA personal Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used with individual usernames and passwords for each client. MAC filtering does not use a password or preshared key. WEP uses a pre-shared key to secure a wireless network, but WPA uses a stronger encryption standard than WEP.

(This is a simulated Performance-Based Question. If this was on the real exam, you would be asked to drag and drop the steps into the proper order from step one to step seven.) Dion Training's email server is not sending out emails to users who have a Yahoo email address. What is the proper order that you should follow to troubleshoot this issue using the CompTIA troubleshooting methodology? a) (1) Identify the problem; (2) Establish a theory of cause; (3) Test the theory to determine the cause; (4) Establish a plan of action to resolve the problem; (5) Implement the solution; (6) Verify system functionality; (7) Document findings and actions (Correct) b) (1) Establish a theory of cause; (2) Test the theory to determine the cause; (3) Identify the problem; (4) Establish a plan of action to resolve the problem; (5) Verify system functionality; (6) Implement the solution; (7) Document findings and actions c) (1) Verify system functionality; (2) Identify the problem; (3) Establish a theory of cause; (4) Establish a plan of action to resolve the problem; (5) Test the theory to determine the cause; (6) Implement the solution; (7) Document findings and actions d) (1) Identify the problem; (2) Establish a plan of action to resolve the problem; (3) Implement the solution; (4) Establish a theory of cause; (5) Test the theory to determine the cause; (6) Document findings and actions; (7) Verify system functionality

a) (1) Identify the problem; (2) Establish a theory of cause; (3) Test the theory to determine the cause; (4) Establish a plan of action to resolve the problem; (5) Implement the solution; (6) Verify system functionality; (7) Document findings and actions

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? a) De-encapsulation b) Tagging c) Encapsulation d) Tunneling

a) De-encapsulation

Your company is experiencing slow network speeds of about 54Mbps on their wireless network. You have been asked to perform an assessment of the existing wireless network and recommend a solution. You have recommended that the company upgrade to an 802.11n or 802.11ac wireless infrastructure to obtain higher network speeds. Which of the following technologies allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps? a) MIMO b) WPA2 c) LWAPP d) PoE

a) MIMO

You are working as a wireless networking technician and have been sent to a user's home to install a brand new 802.11ac wireless access point to replace their old access point. To ensure all of the current devices on the network will automatically connect to the new network, you set the SSID, encryption type, and password to the same ones as the existing access point. You turn the new access point on and notice most of the devices connect automatically, but one older wireless printer won't connect. You notice that the printer is about 7 years old, but the user says it has always worked great over the old wireless network. What is the MOST likely reason that the printer will not connect to the new access point? a) The access point and the wireless printer have a frequency mismatch b) The incorrect channel is configured on the access point c) The transmit power on the access point is too low d) The wireless printer is configured with the wrong password

a) The access point and the wireless printer have a frequency mismatch

Rick is configuring a Windows computer to act as a jumpbox on his network. He implements static routing to control the networks and systems the jumpbox communicates with. Which of the following commands did he use to configure this on the Windows machine? a) route b) ip c) tracert d) nslookup

a) route

Several users at an adjacent office building report intermittent connectivity issues after a new flag pole was installed between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption, and channels are all correct. Which of the following is MOST likely the cause of this issue? a) Signal attenuation b) DHCP exhaustion c) Bandwidth saturation d) Incorrect antenna type

a) signal attenuation

Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps? a. 802.11ac b. 802.11b c. 802.11a d. 802.11n e. 802.11ax f. 802.11g

a. 802.11ac

Your company wants to create highly available datacenters. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down? a. BGP b. Load balancer c. OSPF d. VRRP

a. BGP

Your network is currently under attack from multiple hosts outside of the network. Which type of attack is most likely occurring? a. DDoS b. Wardriving c. On-path attack d. Spoofing

a. DDoS

An administrator has configured a new 250 Mbps WAN circuit, but a bandwidth speed test shows poor performance when downloading larger files. The download initially reaches close to 250 Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the interface on the router and sees the following: DIONRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000F.33CC.F13A Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding Which of the following actions should be taken to improve the network performance for this WAN connection? a. Shutdown and then re-enable this interface b. Replace eth1/1 with a 1000Base-T transceiver c. Configure the interface to use full-duplex d. Assign the interface a 802.1q tag to its own VLAN

d. Assign the interface a 802.1q tag to its own VLAN

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera's security concerns? (Select TWO) a. Configure the thermostat to use the WEP encryption standard for additional confidentiality b. Disable wireless connectivity to the thermostat to ensure a hacker cannot access it c. Enable two-factor authentication on the device's website (if supported by the company) d. Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password e. Configure the thermostat to use a segregated part of the network by installing it into a screened subnet f. Upgrade the firmware of the wireless access point to the latest version to improve the security of the network

d. Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password e. Configure the thermostat to use a segregated part of the network by installing it into a screened subnet

A technician is configuring a computer lab for the students at Dion Training. The computers need to be able to communicate with each other on the internal network, but students using computers should not be able to access the Internet. The current network architecture is segmented using a triple-homed firewall to create the following zones: ZONE INTERFACE, IP address --------------------------------------- PUBLIC, eth0, 66.13.24.16/30 INSTRUCTORS, eth1, 172.16.1.1/24 STUDENTS, eth2, 192.168.1.1/24 What rule on the firewall should the technician configure to prevent students from accessing the Internet? a. Deny all traffic from eth1 to eth0 b. Deny all traffic from eth2 to eth1 c. Deny all traffic from eth0 to eth2 d. Deny all traffic from eth2 to eth0

d. Deny all traffic from eth2 to eth0

A company has a secondary datacenter in a remote location. The datacenter staff handles cable management and power management. The building's security is also handled by the datacenter staff with little oversight from the company. Which of the following should the technician do to follow the best practices? a. Secure the patch panels b. Secure the UPS units c. Ensure power monitoring is enabled d. Ensure locking cabinets and racks are used

d. Ensure locking cabinets and racks are used

Which type of wireless technology are OFDM, QAM, and QPSK examples of? a. RF interference b. Spectrum c. Frequency d. Modulation

d. Modulation

A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue? a. ipconfig /dhcp b. ipconfig /renew c. ipconfig /all d. ipconfig /release | ipconfig /renew

d. ipconfig /release | ipconfig /renew

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps? a. 802.11ac b. 802.11n c. 802.11ax d. 802.11b e. 802.11a f. 802.11g

f. 802.11g

Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building? A) Physical Network diagram B) Site survey report C) Wiring Diagram D) Logical Network Diagram

physical network diagram A physical network diagram is used to show the actual physical arrangement of the components that make up the network, including cables and hardware. A logical diagram is used to illustrate the flow of data across a network and is used to show how devices communicate with each other. These logical diagrams usually include the subnets, network objects and devices, routing protocols and domains, voice gateways, traffic flow, and network segments in a given network. Wiring diagrams are used to clearly label which cables are connected to which ports. The more in-depth wiring diagrams will include a floorplan or rack diagram, so you can see how the cables are run in the physical environment. A wireless site survey is the process of planning and designing a wireless network to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability, and quality of service (QoS). The site survey report will contain a floorplan of the areas surveyed with the wireless coverage areas and signal strengths notated on it.


Ensembles d'études connexes

Understanding Religion in Communities Dr. Miles EXAM 1

View Set

Mother Baby Final chapters 1-4 questions

View Set

ECON 201 CHAPTER 8 GRADED HOMEWORK

View Set

Marketing Cloud Developers Cert Test

View Set

IP: Pathway of Blood Through the Heart

View Set