CompTIA Network+

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

ISAKMP

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

APIPA

Your company has installed a guest wireless network in the break room. According to company policy, employees may only connect to the network and use it during their lunch break. Which of the following policies should you have each employee sign to show they understand and accept the use conditions for this guest network?

AUP

Which media access control technology will listen to a cable to ensure there is no traffic being transmitted before sending its traffic but will implement a back-off timer if a collision does occur?

CSMA/CD

Which of the following provides a standard nomenclature for describing security-related software flaws?

CVE

A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk's wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?

MAC filtering

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

RDP

A network administrator has determined that the ingress and egress traffic of a router's interface are not correctly reported to the monitoring server. Which of the following can be used to determine if the router interface uses 64 bit versus 32-bit counters?

SNMP walk

Dion Training has just purchased a new domain name and needs to indicate which DNS server is the definitive information source for the domain. Which type of DNS record should be created?

SOA

You have been asked to select the best WAN connection for a new network at Dion Training. The company has stated that they must have a guaranteed throughput rate on their Internet connection at all times. Based on this requirement, what type of WAN connection should you recommend?

T-1

Which of the following should be implemented to allow wireless network access for clients in the lobby using a shared password as the key?

WPA2

Which of the following weaknesses exist in WPS-enabled wireless networks?

brute force occurs within 11,000 combinations

You have just finished installing a small network consisting of a router, a firewall, and a single computer. The computer is connected to the firewall and the firewall is connected to the router. What type of physical network topology have you created in this scenario?

bus

Which of the following policies or plans would dictate how an organization would respond to an unplanned outage of their primary internet connection?

business continuity plan

You have been asked to install a media converter that connects a newly installed RG-6 cable to the existing single-mode cable plant. Which type of media converter should you use?

coaxial to fiber

John is investigating a performance issue on a server and has begun by gathering its utilization statistics. John notices that the statistics are outside of the normal, acceptable ranges. What should John do next?

conduct a baseline review

Jason wants to use his personal cell phone for work-related purposes. Because of his position, Jason has access to sensitive company data, which might be stored on his cell phone during its usage. The company is concerned about this but believes that it might be acceptable with the proper security controls in place. Which of the following should be done to protect both the company and Jason if they allow him to use his personal cell phone for work-related purposes?

conduct real-time monitoring of the phone's activity and usage

Which of the following is a logical host on the network that is configured with known vulnerabilities so that an attacker's techniques can be studied in order to improve your network defenses?

honeypot

Which of the following would be the BEST addition to a business continuity plan to protect the business from a catastrophic disaster such as a fire, tornado, or earthquake?

hot sites or cold sites

Which network device operates at Layer 1?

hub

Your company has decided to begin moving some of its data into the cloud. Currently, your company's network consists of both on-premise storage and some cloud-based storage. Which of the following types of clouds is your company currently using?

hybrid

Timothy, a network technician, receives a phone call from an end-user who states their laptop cannot connect to the corporate wireless network. Which of the following should the technician do FIRST according to the troubleshooting methodology?

identify the problem

You are assisting a member of Dion Training's security team during an incident response. The team member asks you to determine if any strange TCP connections are occurring on a given workstation. You open the command prompt on the workstation. Which of the following tools would provide you with information on any TCP connections currently established on the workstation?

netstat

A client reports that half of the office is unable to access a shared printer on the network. Which of the following should the network technician use to troubleshoot the issue?

network diagrams

Which of the following policies or plans would dictate which type of virtual private network connections will be authorized for use by an organization's employees?

remote access policy

In which type of non-technical attack does an attacker attempt to trick a user into providing sensitive information?

social engineering

Which of the following types of traffic flows describes network traffic that is entering your datacenter through the firewall or router?

south

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation within the network?

spanning tree

There are two switches connected using both a Cat 6 cable and a Cat 5e cable. Which type of problem might occur with this setup?

switching loop

What is the network ID associated with the host located at 205.12.35.26/27?

205.12.35.0

(This is a simulated Performance-Based Question. On the real exam, you may be given a chart with numerous ports and protocols and be asked to drag and drop them to match the ports with the protocols.) What ports do SMTP and SNMP utilize?

25, 161

Which of the following types of telecommunication links is used to provide high-speed internet service over a traditional phone line?

DSL

You are a network administrator troubleshooting an issue with a newly installed web server. The web server is available to internal network users, but users outside the internal network (Internet users) cannot reach the server. You run an IPCONFIG and receive the configuration below: Which of the following is the MOST LIKELY reason why the server is unreachable from the Internet?

NAT has not been configured on the border firewall

Which of the following is a DNS record type?

PTR

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?

RADIUS

A network's design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?

SCADA/ICS

Which of the following protocols must be implemented for two switches to share VLAN information?

VTP

You are troubleshooting a network connectivity issue for clients on the Dion Training corporate network. You have identified a rogue DHCP server connected to the network by one of the employees. Which of the following symptoms would most likely be observed due to this rogue DHCP server operating on the network?

duplicate IP addresses

Which type of threat actor can accidentally or inadvertently cause a security incident in your organization?

insider threat

What describes an IPv6 address of ::1?

loopback

You have just moved into a new apartment in a large building. Your wireless network is acting strangely, so you are worried that it may be due to interference from the numerous other wireless networks in each of the other apartments in this building. You want to determine what wireless signals are within the walls of your apartment and their relative strength. What technique should you utilize to determine whether the nearby wireless networks are causing interference with your own Wi-Fi network?

perform a site survey

A company has just installed a VoIP system on its network. Before the installation, all of the switches were replaced with layer 3 multilayer switches to allow for the VoIP devices to be placed on separate VLANs and have the packets routed accurately between them. What type of network segmentation technique is this an example of?

performance optimization

Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?

rapid elasticity

Tim, a network administrator, is configuring a test lab that consists of three routers using RIP for dynamic routing. He connects the routers in a full mesh topology. When he attempts to ping Router 1 from Router 3 using its IP address, he receives a "Destination Unreachable" error message. Which of the following is the most likely reason for the connectivity error?

split-horizon is misconfigured

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?

video surveillance

Dion Training is adding a new screen subnet that will host a large number of VDIs and wants to assign them a small portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. There will be a total of 105 VDI clients that will each need an IP address assigned. What is the correct CIDR notation for the new subnet in order to accommodate the 105 VDI clients while allocating the minimum number of addresses?

/25

Your company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. What is the correct CIDR notation for the Sales department's subnet which requires 55 devices?

/26

Which of the following levels would an alert condition generate?

1

A network technician wants to centrally manage the switches and segment the switches into separate broadcast domains. The Dion Training network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. Their supervisor wants VLAN 100 to be the management subnet and all of the switches must share VLAN information. Which of the following should the technician configure to meet these requirements?

1. configure VLSM for the IP address range 2. configure VTP and 802.1q on the inter-switch connections with native VLAN 100

What is the broadcast address associated with the host located at 10.10.10.200/25?

10.10.10.255

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

25

Which of the following protocols are designed to avoid loops on a Layer 2 network?

802.1d

Which of the following IEEE specifications describes the use of power over ethernet (POE)?

802.3af

What would be used in an IP-based video conferencing deployment?

Codec

Alexander needs to set up two public-facing web servers and ensure that an attacker cannot access its intranet if those servers are compromised. Which of the following should he use?

DMZ

You have recently been hired as a security analyst at Dion Training. On your first day, your supervisor begins to explain the way their network is configured, showing you the physical and logical placement of each firewall, IDS sensor, host-based IPS installations, the networked spam filter, and the DMZ. What best describes how these various devices are placed into the network for the highest level of security?

Defense in depth

Dion Training's corporate network appears to be suffering from a broadcast storm and you have been asked to assist in troubleshooting. You just arrived in the main distribution frame and see another technician looking at the equipment rack. What step of the troubleshooting methodology should you perform NEXT?

Identify the problem

Which of the following needs to be configured to allow jumbo frames on a network?

MTU

What is considered a classless routing protocol?

OSPF

While working as a security analyst, you have been asked to monitor the SIEM. You observed network traffic going from an external IP to an internal host's IP within your organization's network over port 443. Which of the following protocols would you expect to be in use?

TLS

Which network element enables unified communication devices to connect to and traverse traffic onto the PSTN?

UC gateway

A network administrator is tasked with building a wireless network in a new building located next door to your company's office building. The wireless clients should not be able to communicate with other wireless clients but should be able to communicate with any wired users on the network. The users must be able to seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should the administrator configure the new wireless network in this new building?

Use the same SSIDs on different channels and AP isolation

Dion Training has a single switch that services every room within its offices. The switch contains 48 ports, but Jason wants to divide the ports based on functional areas, such as web development, instruction support, and administration. Which technology should Jason utilize to divide the physical switch into three logically divided areas?

VLAN

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements?

Wi-Fi

Which of the following communication types can only be used with IPv6?

anycast

Last night, your company's system administrators conducted a server upgrade. This morning, several users are having issues accessing the company's shared drive on the network. You have been asked to troubleshoot the problem. What document should you look at first to create a probable theory for the cause of the issue?

change management documentation

Mathan has just purchased a domain name and created an A record to bind his domain name to an IP address. Which of the following tools should he use to verify the record was created properly?

dig

A technician is attempting to resolve an issue with users on the network who cannot access websites like DionTraining.com and Google.com. The technician can ping their default gateway, DNS servers, and the website using its IP address successfully. The technician tries to use the command "ping diontraining.com" and receives an error message stating "Ping request could not find host diontraining.com." Which of the following actions should the technician attempt next to resolve this issue?

ensure port 53 is enabled on the firewall

You have been assigned to assist with deploying a new web-based application to your company's intranet. After installing the application, it was identified that the database server is becoming overloaded by the number of requests that the users create. The team lead has proposed adding a device between the web server and the database server to alleviate the issue. Which of the following is being implemented by adding this new device?

implement load balancing and provide high availability

You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the building's second floor. Currently, the office only has one network closet, which is located on the first floor. Your team spent the morning running 24 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd-floor closet. You measured the distance from the switch in the 1st-floor closet to the new 2nd-floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?

install a switch in the second-floor network closet to increase the signal

Which of the following describes the ID of a specified native VLAN when traffic passes over a trunk?

it becomes the default VLAN for untagged frames

Which of the following network performance metrics is used to represent variable delay experienced by a client when receiving packets from a sender?

jitter

Your company has purchased a new office building down the street for its executive suites. You have been asked to choose the BEST encryption for AP1, AP2, and AP3 to establish a wireless connection inside the main building for visitors to use. Your boss has stated that the main building's internal wireless network is only going to be used by visitors and should not require the visitors to set up any special configuration on their devices to connect. Which of the following is the BEST encryption to use from the options below to meet your manager's requirements for the new visitors' Wireless Network?

open

Which of the following policies or plans would dictate the complexity requirements for a wireless network's shared secret key?

password policy

Dion Training has configured a new web server and connected it to their screened subnet. A network technician wants to ensure the server is properly hardened and that it only allows inbound HTTPS requests while blocking any HTTP requests. Which of the following tools should the technician utilize?

port scanner

Dion Training wants to purchase an email marketing solution to better communicate with their students. A promising new startup has a new offering to provide access to their product from a central location rather than requiring Dion Training to host the product on their internal network. Dion Training wants to ensure that their sensitive corporate information is not accessible by any startup's other clients. Which type of cloud server should Dion Training look to purchase to meet these needs? Private SaaS (Correct) Hybrid IaaS Public SaaS Community IaaS

private SaaS

Your boss is looking for a recommendation for a cloud solution that will only allow your company's employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company?

private cloud

Today, your company's network started to experience network connectivity issues for various workstations around the company. As you begin troubleshooting, you identify that all the workstations receive their connectivity from a single switch on the 3rd floor of the office building. You start searching the 3rd floor for the cause of this issue and find a small wired router plugged into a network jack in the sales manager's office. From this small wired router, he has connected his workstation and a small Smart TV to watch Netflix while working. You question the sales manager about when he brought in the new router. He states that he just hooked it up this morning. What type of issue did the sales manager accidentally introduced into the network by installing the router?

rogue DHCP server

You are about to perform a major configuration upgrade to a network device. What should you have prepared in case the upgrade fails?

rollback plan

You need to connect your laptop to a router in order to add a static route. What type of cable would you use to connect to the router's console port?

rollover

An analyst reviews a triple-homed firewall configuration that connects to the internet, a private network, and one other network. Which of the following would best describe the third network connected to this firewall?

screened subnet

You have just installed a new switch in your company's network closet. The switch connects to your router using an SFP port on both the router and switch. Unfortunately, you only had a long cable available to make the connection, so after running the cable from the rack containing the switch to the other rack containing the router, you decide to coil up the excessive cable and use a zip tie to hold the coil to the side of the rack. You head back to your office, log into the switch over SSH, and check the log file. You notice that several messages indicate that the signal strength on the transmit portion of the SFP is registering as too weak. What is the BEST explanation for the cause of this error?

the bend radius of the cable has been exceeded

After installing some new switches in your network, you notice that a switching loop has begun to occur. You contact the manufacturer's technical support for your switches and they recommended that you enable 802.1d. Which of the following BEST represents why the manufacturer suggested this?

the spanning tree protocol uses BPDU to detect loops in network topologies

Which of the following features is supported by Kerberos but not by RADIUS?

tickets used to identify authenticated users.

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

tracert

A technician has been troubleshooting a network problem, has determined the likely cause of the issue, and implemented a solution. What is the NEXT step they should perform according to the CompTIA troubleshooting methodology?

verify system functionality

An administrator's router with multiple interfaces uses OSPF as its routing protocol. You have discovered that one of the router's interfaces is not passing traffic. You enter the "show interface eth 0/0" command at the CLI and receive the following output: Which of the following actions should you perform to allow the interface to pass traffic again?

verify the cable is connected to eth 0/0

What device is used to configure various hypervisor guests to use different VLANs in the same virtualization environment?

virtual switch

A network technician has just installed a new point-to-point 200-meter single-mode fiber link between two local routers within the Dion Training offices. The fiber has been connected to each router, but the interface fails to come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the MOST likely cause of the problem?

wavelength mismatch

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as?

zero-day


संबंधित स्टडी सेट्स

Identify the clinical outcomes occurring as a result of hyperventilation, hypoventilation, and hypoxemia.

View Set

Chapter 9 Cultural Diversity Assignment Sheet

View Set

BIOL B11 Chapter 5 The Working Cell

View Set

Neuro 13: Brainstem II: Eye Movements and Pupillary Control

View Set

FAR Unit 10 - Intangible Assets and Other Capitalization Issues

View Set

FIN 301 Exam 3 practice questions

View Set