CompTIA Net+ Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

MIMO

Multiple Input Multiple Output

ARP

Network tech Salah wants to troubleshoot a problem on a workstation with the IP address of 192.168.1.45. Salah will use a packet analyzer to identify the workstation's packets but needs to the workstation's MAC address. Which of the following protocols would provide the needed information?

SMB

Port 445 is used by what protocol?

Router Configurations Throttling Policy Customer-premises equipment

Something has changed and now no one within the organization can access the Internet. The ISP has checked everything beyond the demark and found no problems. Which are likely culprits for the outage? (Select three.)

SNAT definition

Static Network Address Translation/Source Network Address

SCADA

Supervisory Control and Data Acquisition System

Broadcast Storm

The storm happens when you multiple paths to the same location

Media Gateway Control Protocol

a signaling and control protocol for VoIP sessions

Verify that the switch has power

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Turn down the signal gain Replace the WAP's antennas with directional antennas

A customer wants to have her wireless network to be accessible only in the conference room. She has placed a WAP in the conference room, but has noticed that offices across the hall also receive the wireless signal. Which of the following could be done together to solve this problem? (Select TWO.)

Cable Modem with seperate firewall DSL Modem with firewall Capabilities

A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO.)

SNMP

A management information base (MIB) is used with which technology to monitor the network?

Verify the SSID is enabled

A number of vendors visit a large university but are unable to connect to the school's wireless network. The network tech confirms that other users are connected to the network and it seems to be fully functional. What step should be taken NEXT to troubleshoot the issue?

Toner Probe Definition

A pair of devices used to determine which port on the patch panel goes with each wall outlet.

802.1q trunking

A switch is configured with VLAN 115 and 116. A second switch is configured with VLAN 115 and 117. Both switches are connected together with a high speed-link. Which setting MUST be configured for packets from all VLANs to cross the high-speed link?

VPN

A technician has been assigned to set up network monitoring for some important network devices. Due to the sensitive nature of the devices, the information must be sent in a secure fashion to the monitoring station. Which protocol will facilitate monitoring and support secure transmission of the data?

QoS

A technician needs to increase the bandwidth for traffic generated by an internal streaming video server. Which of the following network optimization methods would be BEST to implement?

Toner Probe

A technician needs to locate a specific cable in a jumble of disorganized cables in the wiring closet. Which of the following tools will help her locate the correct cable?

Certificate Services

A user is using a PKI authentication method. Which of the following will the user need to implement PKI?

Switch Loop

A user reports that the company network is down. Ace technician, Arnold Grimmer walks into a communications closet and sees that there is a short patch cable with both ends plugged into two ports on the same switch. Which term describes what he saw?

ARP definition

Address Resolution Protocol

An 802.11n compatible client can connect to the wireless netowkr only if its MAC addess is xx-xx-xx-xx-xx and the encryption key is known

An 802.11g wireless access point has the following configuration: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-a1-29-da-d3-4a Which is true about the above configuration?

Packet Filtering

An office would like to set up an unsecured wireless network for their customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office's internal network resources. Which firewall configuration can accomplish this?

Layer 2 and 3

At which layers of the OSI model would you expect to find multiprotocol label switching (MPLS)? (Select TWO.)

Wire pair 1/2 and 3/6 need to be swapped on one end of the connecting cables.

Brienne, an administrator, is attempting to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. All of the IP settings have been verified to be correct, but the two computers can't connect. Which of the following would MOST likely fix the IP connectivity problem?

MX

DNS needs to query a company's e-mail server. Which DNS record would be queried?

A Record

Host name to IP address mapping is provided by which type of DNS record?

NS Record

Host name to IP address mapping is provided by which type of DNS record?

Reservation

In order to guarantee that a computer always gets the same private IP address of 10.4.0.5, what must we define?

Mismatched SSIDs

In setting up a wireless infrastructure, there are certain problems that are bound to come up. Which of the following issues is a common problem in wireless installations?

IaaS

Infrastructure as a Service

Storage for Legal Manage Size Control Access to appropriate users

Log management includes which of the following tasks? (Select three.)

Placement

Network administrator Julius is going to install an 802.11n network. Which of the following should he consider FIRST?

Cross-talk

Network administrator Kwan suspects that one of the copper network cables is faulty. When examining the suspect cable, Kwan notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

TACACS+

Network engineer Alonzo needs to troubleshoot at a remote corporate facility across the WAN. Which of the following user authentications would be the BEST to implement?

nslookup dig

Network technician John Watson, needs to check if the domain name resolution system is functioning properly. Which of the following software tools would he use to accomplish this? (Select TWO).

FastEthernet 0/0

Of the following, which interface on a router must be modified when a technician needs to add a subnet to the corporate local area network?

SMB

Server Message Block

SNMP Definition

Simple Network Management Protocol

Switch Power Failure

Technician Stanley is troubleshooting a PoE switch used for VoIP telephones. Employees are reporting that their phones frequently turn off or reboot. Which of the following is MOST likely the cause?

Power Failure

There has been a brief brownout at the company. Power is restored and user Nick can connect to the internal network, but not the Internet. Which of the following happened to company's DSL router that is causing this issue?

Email Fax

What are typical ways of proactively communicating SNMP alerts? (Select two.)

Material Safety Data Sheet

What is an MSDS?

50 ohms

What is the impedance of RG-58 coaxial cable?

NetBIOS

What network application uses ports 137-139?

Baud Rate

What term defines signal events, cycles or signal shifts per second?

Single Point of Failure

When the loss of a piece of equipment or link can bring down an entire process, workflow or even the whole organization, that lost element is called what?

Mantrap

Which choice is a physical security control?

Light meter

Which device tests the power of fiber-optic light pulses?

Stateful Inspection

Which of the following is an example of a firewall that checks all incoming traffic, then decides if the traffic should be allowed through or dumped?

Routing Information Protocol

Which of the following routing protocols has the following characteristics:- Uses hop count as its sole metric- Broadcasts its routing table every 30 seconds by default- Has a MAXIMUM hop count of 15

IPSec

Which of the following technologies implements authentication headers and encapsulating security payloads?

SCADA ICS

Which options are used to monitor and manage factory production equipment? (Select two.)

Bottom to top of the osi model top to bottom of the osi model divide and conquer

Which options represent recommended approaches to troubleshooting? (Select three.)

2424/2727

Which port(s) are used by the Media Gateway Control Protocol (MGCP)?

SNAT

Which technique/process maps a single, routable IP address to a single machine, enabling access to that machine from outside the private network?

VRRP HSRP

Which technologies and protocols are used to achieve high availability? (Select two.)

DOCSIS

Which technology enables data to be transported over wiring that carries cable television signals?

IaaS

Which technology provides a Cloud-based computer that can be scaled-up as necessary, providing additional network capability, memory, CPUs, and storage?

cross-talk

picking up of signal in one cable from a second nearby cable


Set pelajaran terkait

Math CH 3 Review Quiz, CH 12 Quiz, CH 10 Practice Test, CH 10 review quiz, Math CH 9 practice test, Practice Test, Unit 4 Quizzes, Final Math Questions

View Set

LAW101 علاقة النظام بالعلوم الإجتماعية

View Set

AP World History Unit 1&2 Study Terms

View Set

Algorithmic complexity/Big-O/Asymptotic analysis

View Set

Supervision question for state exam

View Set

Code, Standards, and Practices 2, Level II - 2020 Lesson 4

View Set