NetWork A+ Study

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query? A. 10.1.2.0 B. 10.1.2.1 C. 10.1.2.23 D. 10.1.2.255 E. 10.1.2.31

10.1.2.31

A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface? A. 172.15.0.0/18 B. 172.18.0.0/10 C. 172.23.0.0/16 D. 172.28.0.0/8 E. 172.32.0.0/14

172.23.0.0/16

Which of the following is the number of bits in 8KB? 64,000 8,000 32,000 16,000

64,000

A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network? A. 80.87.78.0 - 80.87.78.14 B. 80.87.78.0 - 80.87.78.110 C. 80.87.78.1 - 80.87.78.62 D. 80.87.78.1 - 80.87.78.158

80.87.78.1 - 80.87.78.62

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11b b. 802.11g c. 802.11ax d. 802.11ac

802.11ax

Which of the following ports should be used to securely receive mail that is synchronized across multiple devices? A. 25 B. 110 C. 443 D. 993

993

Given the following: WMIC BIOS GET SERIALNUMBER -Which of the following describes the above sequence? A function A query Insertion of data A database dump

A query

A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. AD c. Latency d. MTU

AD

Which of the following should be used to store a list of strings? Variable Array Branch Constant

Array

The computer language that is closest to machine code is: Query Language Assembly Language Markup Language Scripting Language

Assembly language

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? Accounting Integrity Authentication Non-repudiation

Authentication

A replay attack would be the primary concern of: Authentication. Availability. Confidentiality. Integrity.

Authentication.

Which of the following describes the BEST device to configure as a DHCP relay? A. Bridge B. Router C. Layer 2 switch D. Hub

B. Router

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. OSPF b. RIPv2 c. BGP d. IP

BGP

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors? A. Bad wire on the Cat 5e cable B. The wrong VLAN assignment to the switchport C. A misconfigured QoS setting on the router D. Both sides of the switch trunk set to full duplex

Bad wire on the Cat 5e cable

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring? A. Ethernet collisions B. DDoS attack C. Broadcast storm D. Routing loops

Broadcast storm

Which of the following TCP ports is used by the Windows OS for file sharing? A. 53 B. 389 C. 445 D. 1433

C. 445

Which protocol replaced TKIP for WPA2? a. RC4 b. CCMP c. RADIUS d. WEP

CCMP

A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue? A. Audit logs B. CPU utilization C. CRC errors D. Jitter

CPU utilization

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. EAPoL b. CSMA/CA c. SSID d. CSMA/CD

CSMA/CA

Which of the following is used to track and document various types of known vulnerabilities? A. CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilege

CVE

Which of the following is used to track and document various types of known vulnerabilities? A. Penetration testing B. CVE C. Zero-day D. SIEM

CVE

Which of the following data is MOST likely to be stored as a string? Cat 42 x 3.1415927

Cat

Network traffic is being compromised by DNS poisoning every time a company's router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router? A. Change the device's default password. B. Disable router advertisement guard. C. Activate control plane policing. D. Disable unneeded network services.

Change the device's default password.

A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information: Which of the following is MOST likely the cause of the issue? A. Wrong antenna type B. Poor signal C. Incorrect power settings D. Channel overlap

Channel overlap

A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application? A. Clientless VPN B. Virtual desktop C. Virtual network computing D. mGRE tunnel

Clientless VPN

A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application? A. Virtual network computing B. Virtual desktop C. Clientless VPN D. mGRE tunnel

Clientless VPN

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP? A. Multimode fiber B. Single-mode fiber C. Cat 6e D. Coaxial

Coaxial

A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate? A. Enabling port security on access ports B. Configuring DHCP snooping on the switch C. Preventing broadcast messages leaving the client network D. Blocking ports 67/68 on the client network

Configuring DHCP snooping on the switch

Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. DRDoS attack b. FTP bounce c. PDoS attack d. Ransomware

DRDoS attack

hich of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection? A. Data link B. Network C. Transport D. Session

Data link

A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration? A. Diverse paths B. Load Balancing C. Multipathing D. Virtual Router Redundancy Protocol

Diverse paths

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? Duplicate the problem. Gather information. Establish a plan of action. Find the root cause.

Duplicate the problem.

A security administrator is adding accounting features to a web application. Which of the following would be the BEST action? Implement smart card login. Adopt a procedure for adding accounts. Enable an audit log. Enhance the granularity of user permissions.

Enable an audit log.

Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Message integrity b. Encryption c. Key distribution d. Authentication

Encryption

The manager of human resources is unable to connect to the wireless network while in the conference room. The network administrator decides to check the logs of the network. While in the log files, the administrator finds that several access points are down. Which of the following troubleshooting steps should be performed NEXT? A. Identify the problem B. Verify full system functionality C. Research the knowledge base D. Establish a plan to resolve the problem

Establish a plan to resolve the problem

When a router can't determine a path to a message's destination, where does it send the message? a. Routing table b. Default gateway c. Gateway of last resort d. Administrative distance

Gateway of last resort

Which of the following BEST describes the physical location of the data in the database? Column HDD RAM Table

HDD

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? Anti-malware Host firewall Device Manager Antivirus

Host firewall

An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the following sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF? A. Temperature B. Humidity C. Smoke D. Electrical

Humidity

Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. NFC c. Wi-Fi d. IR

IR

Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor's data center? A. DaaS B. IaaS C. PaaS D. SaaS

IaaS

Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution? Answers: A. PaaS B. IaaS C. SaaS D. Disaster recovery as a Service (DRaaS)

IaaS

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure? A. Incorrect VLAN B. DNS failure C. DHCP scope exhaustion D. Incorrect gateway

Incorrect VLAN

A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect: however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information: Which of the following is MOST likely causing this connection failure? A. Transmission speed B. Incorrect passphrase C. Channel overlap D. Antenna cable attenuation/signal loss

Incorrect passphrase

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding? A. Increased CRC errors B. Increased giants and runts C. Increased switching loops D. Increased device temperature

Increased CRC errors

A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue? A. Incorrect VLAN setting B. Insufficient DHCP scope C. Improper NIC setting D. Duplicate IP address

Insufficient DHCP scope

A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.) A. Jitter B. Speed mismatch C. QoS misconfiguration D. Encapsulation errors E. CRC errors F. Encapsulation errors

Jitter, QoS misconfiguration

A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery? A. Link aggregation control B. Port tagging C. Jumbo frames D. Media access control

Jumbo frames

Which of the following does a NoSQL database use to organize data? Tables Primary keys Keys/values Schemas

Keys/values

Which of these cellular technologies offers the fastest speeds? a. LTE-A b. CDMA c. 4G-LTE d. GSM

LTE-A

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7

Layer 2

Which of the following network devices can perform routing between VLANs? A. Layer 2 switch B. Layer 3 switch C. Load balancer D. Bridge

Layer 3 switch

Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network? Answers: A. Layer 1 B. Layer 3 C. Layer 6 D. Layer 7

Layer 6

Which of the following topologies requires the MOST connections when designing a network? A. Mesh B. Star C. Bus D. Ring

Mesh

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. AUP b. MDM c. BYOD d. NDA

NDA

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task? A. Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control Protocol D. Address Resolution Protocol

Neighbor Discovery Protocol

A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution? A. Out-of-band access B. Split-tunnel connections C. Virtual network computing D. Remote desktop gateways

Out-of-band access

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform task scheduling. B. Set the system date and time. C. Perform process management. D. Set a reminder to run the script.

Perform process management.

A technician is configuring computers for a mass deployment. As part of a web-based application, several new windows need to open once a user logs in. Which of the following should the technician configure to ensure the browsers open properly? A. Unrestricted PowerShell execution policy B. Pop-up blocker exceptions C. Applications to run in private mode D. Security extensions setting to disable

Pop-up blocker exceptions

Which of the following describes the unit of containment that an application is constrained to on an operating system? Thread Console Directory Process

Process

A Chief Executive Officer and a network administrator came to an agreement with a vendor to purchase new equipment for the data center. A document was drafted so all parties would be informed about the scope of the project before it started. Which of the following terms BEST describes the document used? A. Contract B. Project charter C. Memorandum of understanding D. Non-disclosure agreement

Project charter

Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member? Project management Personal information management Collaborative workspace Spreadsheet

Project management

A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection. Which of the following settings should provide better network stability? A. Client association timeout B. RSSI roaming threshold C. RF attenuation ratio D. EIRP power setting

RSSI roaming threshold

An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations? A. MTTR B. RTO C. MTBF D. RPO

RTO

Which of the following describes a unique entry to a data set? Column Schema Record Index

Record

A schema is a critical part of which of the following? Document database NoSQL database Relational database Key/value database

Relational database

An administrator would like to allow Windows clients from outside the office to access workstations without using third-party software. Which of the following access methods would meet this requirement? A. Remote desktop gateway B. Split tunnel C. Site-to-site VPN D. VNC

Remote desktop gateway

A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data: Which of the following should the network technician perform to correct the issue? A. Replace the Cat 5 patch cable with a Cat 6 cable. B. Install a crossover cable between the server and the switch. C. Reset the switchport configuration. D. Use NetFlow data from the switch to isolate the issue. E. Disable MDIX on the switchport and reboot the server.

Replace the Cat 5 patch cable with a Cat 6 cable.

Which of the following information types would cause the GREATEST loss of value to an organization if encrypted by a ransomware attack? User login history Employee emergency contacts Advertising material archive Research projects database

Research projects database

Which of the following is a benefit of embedded operating systems? Easy to transfer data between systems Frequent updates Resource efficiency Ability to run multiple applications

Resource efficiency

A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue? A. Ping the client's computer from the router. B. Run the traceroute command on the server. C. Run iperf on the technician's desktop. D. Run the show interface command on the switch. E. Run a port scanner on the client's IP address.

Run the show interface command on the switch.

A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue? A. MTTR B. MOU C. NDA D. SLA

SLA

Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. SNMP B. Link state C. Syslog D. QoS E. Traffic shaping

SNMP

Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue? A. Syslog B. Link state C. SNMP D. QoS E. Traffic shaping

SNMP

Which of the following records can be used to track the number of changes on a DNS zone? A. SOA B. SRV C. TXT D. NS

SOA

Which of the following protocols would allow a secure connection to a Linux-based system? A. SMB B. FTP C. RDP D. SSH

SSH

An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues? A. 802.1Q B. STP C. Flow control D. CSMA/CD

STP

A customer wants to log in to a vendor's server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server? A. Secure Sockets Layer B. Site-to-site VPN C. Remote desktop gateway D. Client-to-site VPN

Secure Sockets Layer

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use? A. Network access control B. Least privilege C. Multifactor authentication D. Separation of duties

Separation of duties

A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue? Off-peak internet usage Router failure Site congestion Shared bandwidth

Site congestion

A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue? Shared bandwidth Router failure Site congestion Off-peak internet usage

Site congestion

Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols? A. Client-to-Site VPN B. Clientless VPN C. RDP D. Site-to-site VPN E. SSH

Site-to-site VPN

Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs? A. Split tunnel B. Full tunnel C. Site-to-site tunnel D. Virtual desktop

Split tunnel

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? Text editing software Spreadsheet software Web browsing software Visual diagramming software

Spreadsheet software

During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. A field technician has submitted the following report: Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client? A. Electrical B. Humidity C. Flooding D. Temperature

Temperature

A large percentage of computers within an organization are suddenly reporting that their operating systems may be illegally obtained. Which of the following is the MOST likely cause? The key management server is offline. Internet access is unavailable. Hackers have stolen the organization's license. The company did not pay for the license.

The company did not pay for the license.

During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue? A. Traps B. MIB C. OID D. Baseline

Traps

A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover? A. VIP B. NAT C. APIPA D. IPv6 tunneling E. Broadcast IP

VIP

A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technician MOST likely use? A. Flow control B. Traffic shaping C. VLAN tagging D. Network performance baselines

VLAN tagging

Which of the following would be the BEST choice to connect branch sites to a main office securely? A. Bridge B. Proxy server C. VPN headend D. Load balancer

VPN headend

A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue? A. Verifying if an encryption protocol mismatch exists. B. Verifying if a captive portal is active for the WLAN. C. Verifying the minimum RSSI for operation in the device's documentation. D. Verifying EIRP power settings on the access point.

Verifying if a captive portal is active for the WLAN.

A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice? Visual diagramming software Image editing software Presentation software Word processing software

Visual diagramming software

Several wireless security cameras need to be installed in a small office. Which of the following should be used to configure the wireless encryption? Web-based interface Virtual interface IP-based HDD On-board NIC

Web-based interface

A developer embeds a query in a high-level program to extract information from a database. This is an example of: Database utility access. Database manual access. Database direct access. Database programmatic access.

database programmatic access. Database programmatic access. This approach involves using a programming language (high-level or otherwise) to interact with a database management system (DBMS) and retrieve data by sending structured queries to the database. Programmatic access allows developers to automate database interactions within their applications, enabling dynamic data retrieval and manipulation.

A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer? A. ifconfig ecth0 promisc B. ifconfig eth1 up C. ifconfig eth0 10.1.2.3 D. ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6

ifconfig ecth0 promisc

A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line? A. netstat B. netstat -a C. netstat -e D. netstat -n

netstat -n

An IT administrator received an assignment with the following objectives: ✑ Conduct a total scan within the company's network for all connected hosts. ✑ Detect all the types of operating systems running on all devices. ✑ Discover all services offered by hosts on the network. ✑ Find open ports and detect security risks. Which of the following command-line tools can be used to achieve these objectives? A. arp B. nmap C. netstat D. tcpdump

nmap

A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.) A. tcpdump B. show config C. hostname D. show route E. netstat F. show ip arp

show config, show route

Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model? A. VPN B. VRRP C. vSwitch D. VIP

vSwitch


Set pelajaran terkait

**IMPORTANT** REVIEW Chapter 9: Maternal and Fetal Nutrition NCLEX 59Qw/exp QfromPP

View Set

Mental Health Test 2 Mon. 2/27/17

View Set

Marketing Research Final Exam MSU

View Set

CoursePoint: Chapter 18: Evaluating - ML3

View Set

Implementing Supplemental Servers - Chapter 10

View Set

Physics conceptual questions 1-9

View Set

Week 5: Assessing + Selecting Employees

View Set