Net+ 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What step of the CompTIA Network+ troubleshooting methodology involves approaching multiple problems individually?

1

A network technician is implementing a software-defined network. Which of the following layers would apply business logic to make decisions about how traffic should be prioritized?

Application The application layer applies the business logic to make decisions about how traffic should be prioritized and secured and where it should be switched.

A network engineer performs maintenance of a collection of workstations that communicate together and provide a bridge to a cabled network segment. What type of set did they observe?

Basic Service The AP mediates communications between client devices and can also provide a bridge to a cabled network segment. In 802.11 documentation, this is referred to as an infrastructure Basic Service Set (BSS).

A network engineer conducts a redundancy check and identifies that interference exists due to a poor-quality cable. What is this finding called?

CRC Interference usually causes CRC errors. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.

An IT engineer works with desktop installation technicians who deploy new computers to users. The installation technicians report that users in one area of the building do not achieve network speeds above 100 Mbps. After evaluating the cabling choices, the IT engineer determines that the problem area uses which type of cabling?

Cat 5

At the request of management, a senior server engineer deploys a proxy server for all users in the organization. The proxy provides many benefits for a uniform user experience and for IT management. Of the choices, which statements describe features the proxy provides? (Select all that apply.)

Content filtering Caching of web content Most web proxy servers provide caching engines, which retain frequently requested web pages, negating the need to re-fetch those pages for subsequent requests. Web proxies, act as a web security gateway. Their primary functions prevent viruses or Trojans from infecting computers from the Internet, block spam, and restrict web use to authorized sites, thereby acting as a content filter.

Networks are vulnerable to several types of malicious attacks, and network engineers must prevent such attacks by various means. One means of protection available prevents denial of service (DOS) against a route processor over control or management plane protocols and packets. What answer choice describes this security method?

Control plane policing Control plane policing is a security method that prevents DoS attacks against a route processor over control or management plane protocols and packets.

A working physical server is experiencing network connectivity issues after switching connections to another physical port on a basic layer 2 switch. Identify the most likely problem with the switch.

Hardware failure A bad physical port or a hardware failure is most likely the cause of the issue, as the connection to the previous physical switch port was working fine.

A network administrator wants a network switch to authenticate attached devices before activating their port on the switch. When combined, which authentication methods provide the means to validate a client's access to the network before being allowed access? (Select all that apply.)

IEEE 802.1X EAP The Institute of Electrical and Electronics Engineers (IEEE) 802.1X uses authentication, authorization, and accounting (AAA) architecture that are made up of three components: a supplicant, network access point, and AAA server. The Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies, many of which use a digital certificate on the server and/or client machines

A network technician is conducting maintenance on the bonded cabled links to a single logical channel. What can be used to auto-negotiate the bonded link between the switch ports and the end system, detect configuration errors, and recover from the failure of one of the physical links?

LACP Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

A network engineer has installed a new switch. What should the engineer check to troubleshoot the trunk port connected to the corporate network?

Link state Link state measures whether an interface is working (up) or not (down). You should configure an alert if an interface goes down so that you can investigate immediately. You may also want to track the uptime or downtime percentage so that you can assess a link's reliability over time.

A network administrator is measuring Key Performance Indicators (KPI) for an industrial network. Which of the following are examples of a KPI? (Select all that apply.)

Mean Time to Repair (MTTR) Mean Time Between Failures (MTBF) Mean Time Between Failures (MTBF) is a Key Performance Indicator measuring the expected lifetime of a product. This is intended for assets meant to be replaced rather than repaired. The calculation is the total lifetime of all devices combined divided by the number of failures. Mean Time to Repair (MTTR) is a measurement of the mean time it takes to repair assets or correct a fault to the point of restoration and recovery of network services. It is another Key Performance Indicator (KPI).

A security administrator is investigating anomalous activity from a particular host. They look in DNS and see the following address "1.100.51.198.in-addr.arpa". What type of record is this?

PTR A reverse DNS query returns the hostname associated with a given IP address. This information is stored in a reverse lookup zone as a pointer (PTR) record.

A company uses several Windows Servers for Active Directory, SQL Server, RADIUS, DHCP, and DNS. Management pushes to move to the cloud. IT suggests moving services in a staggered fashion as to not cause disruption. IT moves SQL server instances to the cloud as a start. IT migrates this specific function to which of the following service types?

PaaS Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. A SQL database is an example of PaaS. Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. Office 365 is an example of SaaS.

An engineer plans to configure a device as transparent, rather than non-transparent, at an organization. Which device does the engineer configure?

Proxy server A proxy server is used as a middle-man for Internet access. A transparent proxy is configured on an inline device, while a nontransparent proxy is configured on a client machine.

Which of the following are characteristics of cloud services as opposed to local services? (Select all that apply.)

Rapid elasticity Pay-per-use Cloud service provides rapid elasticity. This means it can scale quickly to meet peak demand. A company may operate a single web server for part of the year but provision additional instances for the busy periods. Pay-per-use is a feature provided by many cloud services like Amazon Web Services and Microsoft Azure Cloud. Customers only use services as needed, making it cost efficient.

This protocol is now deprecated by the more secure protocol, Transport Layer Security (TLS), which was developed by Netscape in the 1990s.

Secure Socket Layer (SSL) Transport Layer Security (TLS) was developed from SSL and ratified as a standard by the IETF.

A security analyst is looking at multiple packets from the same packet group. Which of the following fields correspond to a conversation where it is broken apart due to the MTU size?

Sequence number The sequence number of the last byte in the segment allows the receiver to rebuild the message correctly and deal with out-of-order packets.

A user reports they cannot open the shared drives. After investigating the issue, the engineer found that the workstation had its network information misconfigured. The incorrect information was 255.255.255.255, instead of 255.255.255.0. What was most likely incorrectly set on the workstation?

Subnet mask Subnet addressing refers to the division of a single IP network into two or more smaller broadcast domains by using longer netmasks within the boundaries of the network. Also called a subnet mask. This is usually signified by the numbering scheme 255.255.255.0 or similar

A security analyst is setting up detections to look for unauthorized domain transfers from their external-facing DNS servers. Which of the following ports should they monitor?

TCP 53 Some DNS servers are also configured to allow connections over TCP port 53, as this allows larger record transfers (over 512 bytes).

A systems administrator is planning a change to a resource record. Which value should they modify prior to the change in order to speed up caching replacement?

TTL Each resource record can be configured with a default time to live (TTL) value, measured in seconds. If there is a change to a resource record, server and client caching means that the updated record can be relatively slow to propagate.

A network technician patches the vulnerability and verifies full system functionality after identifying a vulnerability on a network switch operating system. Justify the technician's decision to document any findings, actions, or outcomes that may have taken place during the process. (Select all that apply.)

They establish a new baseline for the template. They create installation procedures. A new baseline is established and documented any time a change is made to a device's settings and/or software. This is beneficial for security audits and future installations of the same device. Creating installation instructions for this type of patching, especially recording the file name and version of the patch, will ensure the process can be duplicated with a high success rate.

A company is considering using a co-location connection with a cloud service provider to support some virtual services in its data center. This will provide the company a private and hybrid cloud model to easily move services from the local infrastructure to the cloud during peak season by using infrastructure as code tools. Which of the following network components are most likely required for hybrid solution? (Select all that apply.)

VLAN MPLS Private link Co-location between the company's data center and the cloud service offers a higher bandwidth solution by providing a direct or private link. The data center installs a cross-connect cable or virtual LAN (VLAN) between the local service (e.g. virtual infrastructure) and the cloud provider, establishing a low latency, high bandwidth (typically up to 10 Gbps), secure link. The MPLS provider can apply traffic shaping policies to communications between enterprise LANs and the cloud service to guarantee a service level and provide link redundancy.

An administrator configured a group of routers so that one router is the master, and all other routers are prioritized backups that monitor to the master and if the master loses connectivity one of the backups becomes the new master based on priority. What is the administrator using?

VRRP The administrator is using Virtual Router Redundancy Protocol (VRRP) where the active router is known as the master and all other backup routers monitor the status of the master.


संबंधित स्टडी सेट्स

MGMT 53600 Employment Law chap 6

View Set

Chapter 1 - Managing and the Manager’s Job

View Set

Which number is bigger? Three Digits

View Set

Marketing 380 Comprehensive Quiz Review

View Set

6.4 Social Effects of Industrialization

View Set

Digestive System Review McGraw Hill Connect

View Set

Exam 3 Physics! 1 more to go!! ALMOST THERE!!!

View Set

Module 50 and 51: Quality Improvement and Safety (NURS2700)

View Set