Ucertify Net+ 10-008 Test C

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following would be the most efficient subnet mask for a subnetwork accommodating eight hosts?

/28

Which of the following IP addresses is reserved for private use?

10.100.200.0

A network technician in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following addresses would fulfill these requirements? This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

172.18.0.0/23

A technician is troubleshooting a customer's network connectivity issue. He needs to determine the IP address of the customer's router. The customer has an IP address of 192.168.1.55/24. Which of these is the address of the customer's router?

192.168.1.1

A company is setting up a new branch office. The new office will have two departments, Finance and Engineering. The Finance department will have 55 employees and the Engineering department will have 5 employees. The IP subscribed from the ISP is 192.168.1.0/29. The network administrator is configuring the subnets for the two departments starting with the Finance department. What will be the last host address on the Engineering subnet?

192.168.1.78

Which of the following statements is correct about the OSI model in networking? Each correct answer represents a complete solution. Choose all that apply.

A communication protocol or network appliance can be described by the layer it occupies i.t is made up of seven layers arranged vertically in what is called a stack.

Which of the following statements is true about the networking concepts?

A repeater is a node on the physical network.

Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?

AAAA

An attacker floods a switch with frames in an attempt to redirect traffic to his server. Which of the following attacks is the attacker most likely using?

ARP spoofing

Members of a basic service set share a 48-bit identifier compatible with the MAC standard and included in every Wi-Fi frame sent by its members. What is this identifier called?

BSSID

Why is a routing table more complicated than a MAC table on a switch? This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

Because each entry has to have more pieces of information

Which of these are some of the calamities that the users should escalate while implementing the solution during network troubleshooting?

Broadcast storms Routing problems Routing loops

Which of these implies a line topology with reference to the point-to-point connections?

Bus

A company wants to secure its WLAN network by implementing a method that will provide a web page before the users ask for authentication credentials while allowing them access to the network. Which of these will help in satisfying this requirement?

Captive portal

What should you do if you cannot connect to an AP and you've verified that your DHCP configuration and WEP key are correct?

Check the MAC address filtering on the AP.

Which of these is not a general guideline for establishing the probable cause of a network problem?

Consider only the most relevant approach.

Which of the following services provides the desktop and other resources?

DaaS

Which of the following statements is true about the twisted-pair cables?

Each balanced pair is warped around itself for the cable's length, so even a nearby source, such as a parallel cable, will, on average, balance out.

Which of these is not a distinct function of the layer 2 switches

Easy maintenance

An attacker, after gaining access to a facility, places a wireless access point to make it look as though it belongs to the network. He then begins eavesdropping on the wireless traffic. Which of the following attacks has the attacker performed?

Evil twin

The important troubleshooting process for Network+ is CompTIA's five-step model. This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

False

A network technician configured a network device. After restarting, the device was unresponsive. Even after doing a hard reset, the device was not restored to factory defaults and did not display any output. Which of these has the technician most likely performed?

Firmware update

Which of the following standards are used within the telecommunication networks? Each correct answer represents a complete solution. Choose all that apply.

Frame Relay MPLS

What is the correct distance range of 1000BaseLX?

From 3 km up to 10 km

Which of the following protocols allows active-active load balancing? This task contains the radio buttons and checkboxes for options. Press the enter key to select the option. optionA VRRP

GLBP

Which of the cellular technologies is a type of cell phone that contains a SIM chip?

GSM

Which of these are the common representations of binary values? Each correct answer represents a complete solution. Choose all that apply.

Hexadecimal Octal

A network administrator is setting up a web-based application that needs to be continually accessible to the end-users. Which of the following concepts would best ensure this requirement?

High availability

Which of the following statements is true regarding network convergence?

High-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.

On the network, you don't just need to know what the matter is, but you need to know how many users are affected. Which of the following steps of problem identification is explained in the given information?

Identify the symptoms.

Which of the following actions are taken by a learning bridge when it checks the destination address against its MAC table?

If the destination is on the same segment as the source, it filters the frame by ignoring it. If the destination is in the table and on a different segment from that source, it forwards the frame to only that segment. If the destination address isn't in the table, it floods the frame to all other segments except the source.

Which of the following statements is true about access control hardware?

It comprises a category of devices that are used to identify and authenticate users.

Which of the following statements are not true about the OSI model? Each correct answer represents a complete solution. Choose all that appl

It describes network communication in terms of the underlying network technology or structure. It is a suite of protocols that serves as the world's primary network standard

Which of the following statements is true about RBAC?

It is commonly used in networks to simplify the process of assigning new users the permission required to perform a job role.

Which of the following statements is true about the data link layer of the OSI model? This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

It is subdivided into two sublayers, namely, MAC and LLC.

Which of the following statements are true about a logical network? Each correct answer represents a complete solution. Choose all that apply.

It is the network from the perspective of the computers that use it. It is the path that the information follows It is the information carried by the physical network.

Why is the TCP/IP model in such wide use, despite its limitations?

It proved so robust and scalable that it was quickly adopted by the US government and research networks that formed the early Internet.

Which of the following are the resource-sharing protocols? Each correct answer represents a complete solution. Choose all that apply.

LDAP SMB

A network technician has to perform maintenance on many of the company's web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?

Load balancer

James, a network engineer, is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following networks will James implement?

MAN

Which type of network scope is often used to connect all or parts of a city

MAN

A network administrator has to implement a physical security control method that can prevent an attacker from gaining access to a network closet or server room. Which of these will help the network administrator in achieving this goal?

Mantrap

Which of the following is not the step for testing a theory when troubleshooting?

Measure the plausibility of the theory against the most obvious cause of the problem.

Which of these is not considered a network device?

Media

Which of these best describes network reliability?

Minimal transmission errors, and detection and correction of any that do occur

A network technician has to set up a firewall on a company's network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of these should the network technician use to achieve this goal?

NAT

Which of these is a technique that writes data patterns over the entire media, thereby eliminating any trace data?

Overwriting

Which of the following technologies is used to connect private devices?

PAN

Which of these describes the resolution of a problem while troubleshooting the network?

Planning and implementing a fix for the problem

Which type of cable uses low-smoke and fire-retardant materials?

Plenum

Which of these is a standardized rule for formatting data? This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

Protocol

Which of the following procedures are employed when identifying a network problem?

Question users. Determine if anything has changed. Approach multiple problems individually.

Which of the following statements are true about networks? Each correct answer represents a complete solution. Choose all that apply.

Radio signals are part of the physical network In a logical network, connections are the protocols that guide data to its destination address.

Which of these is a primary concern for WANs?

Security

Which of the following statements is true about RIP?

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.

Which of the following combinations will form a two-factor authentication process?

Smart card and PIN

A hospital has installed CCTVs on all the entrances and hallways to monitor the people entering and leaving the facility. The camera feeds go to the surveillance room where security personnel monitors the activities. One of the security personnel notices a man wearing a doctor's lab coat whose identity cannot be verified by looking through the video feed. The man is seen interacting and mobilizing with other people around him. What kind of attack is the security personnel witnessing?

Social engineering

An employee at a company received a call from someone in the IT department asking for information about the company's network. The caller explained that the information would be used to improve the connection speed, thus improving performance. However, the caller ID on the phone indicated that the call came from outside the company. Which of the following types of attack has occurred in the given scenario?

Social engineering

Which of the following statements is true about the dial-up access?

Some ISPs offer dial-up access to users who subscribe to other services.

Which of these are installed in racks, such as servers, firewall appliances, and redundant power supplies?

System labeling

What is the port number of SMB?

TCP 445

Which of these is not a category of the cause of disaster in a disaster recovery plan?

Technical

Which of the following statements is true about SNR?

The higher the SNR, the lower the noise floor with respect to the signal.

Which of the following statements are true about network troubleshooting? Each correct answer represents a complete solution. Choose all that apply.

The important thing is that the specific methods find a complete process and stick to it, especially during the diagnosis process. The users can solve a surprising amount of problems by fiddling with one piece of a system after another until things work. Using a systematic process will give the users quicker and more consistent results.

Which of the following statements is true about authentication in a client-server fashion?

The server hosting resources ask for credentials, and the client provides them.

Which of the following statements is correct about sessions in the session layer of the OSI model?

They must be created, maintained separately from other sessions, and ended.

Which of the following statements is true about the input errors?

They often indicate high-level errors, such as CRCs.

A LAN could have hundreds or thousands of nodes.

True

A WAN operates using leased lines from a telecommunication provider, connecting to the LANs in each site. This task contains the radio buttons and checkboxes for options. Press the enter key to select the option.

True

A laser transmission would stay in a tight beam and only suffer attenuation due to absorption by the air.

True

APC connectors can be used only with other APC connectors.

True

An effective network's topology is a matter of planning, not organic growth

True

Both RIPv1 and RIPv2 are distance-vector protocols, which means that each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.

True

Decibels can be used to describe the absolute power level of a signal that's being sent or received or the relative losses due to the transmission medium. This task contains the radio buttons and checkboxes for options. Press the enter key to select the option. optionA False

True

Essential WAN technologies include user-level connections, such as cable, DSL, or 4G.

True

Ethernet addressing uses the MAC address burned into each and every Ethernet NIC.

True

Ethernet is not only the standard used for almost all modern wired LANs, it's also increasingly being used for telecommunications and storage networks and is even increasingly adopted as a WAN technology.

True

High memory utilization can be as severe as a saturated CPU.

True

Internet is an example of the largest WAN.

True

Loopback adapters are only useful to verify that the port transmits and receives electronics successfully.

True

QoS refers to the way the resources are controlled so that the quality of service is maintained.

True

SDWAN is a virtual WAN architecture that uses software to manage connectivity, devices, and services and can make changes in the network that is based on the current operations.

True

Tasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.

True

The MIB is a database with a set of predefined questions that the NMS can ask the agents regarding the health of the device or network.

True

The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.

True

The most effective way to control both authentication of remote users and the application of their permissions is to provision an AAA server.

True

The original intention of NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses.

True

The transport layer of the OSI model translates the data between network packets and also the data used by applications.

True

While troubleshooting a network, it's important to view the identification of a problem as an ongoing process.

True

Which of the following networks connects multiple LANs using long-range transmission media?

WAN

Which of the following TCP/IP tools is a more powerful alternative to nslookup for performing DNS lookups?

dig

Which TCP/IP tool supersedes the ifconfig, arp, and route commands?

ip

Which of the following statements is correct about SMB?

it allows folders or hard drives to be shared over the network and accessed as if they were local drives

Which of the following TCP/IP tools tests the reachability and latency of a given host?

ping


Ensembles d'études connexes

Orange County Sheriff's Department | PHONETIC ALPHABET

View Set

Electricity and Electronics Exam #1

View Set

unit 1 : communicating with other / english 10 post test

View Set

POSC 2306 Texas State & Local Government Exam #2 Chapters 7,8,9 Thursday March 3,2020

View Set

Environmental Politics of the USA

View Set