Network Practice Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator is setting up the protocol for identifying routes within an autonomous system. Which of the following is this? AS EGP RIP IGP

IGP

A firewall configuration handles threat management with an active approach. Which feature operates this way? IPS Amplification Wireless Controller AAA server

IPS

A licensed wiring professional runs Cat 6A cable in lengths under 55 meters in an office building. What specification of cabling does the professional install? 1000BaseT 100BaseT 1000BaseLX 10GBaseT

10GBaseT

A network technician is trying to determine which digital communication frequencies would be best at penetrating through the solid surfaces of the walls. Which would be the best solution? 3G, 4G, 5G AC (Wifi 5) 2.4 GHz 5GHz

2.4 GHz

A company plans a network run to a warehouse behind its main office building. The distance is short and to save money, the IT engineer suggests using a specific type of fiber cabling. Which type does the engineer recommend implementing, based on the given criteria? Multimode YOU WERE INCORRECT Cat7 Cat8 Single-mode

Multimode

A network administrator is researching network virtualization and is trying to find a standard architecture for appliances to be developed against. Which of these should the administrator look at for a standard? NFV MPLS Hypervisor vswitch

NFV

When an internet customer wants to set up a small office/home office (SOHO) network, what are the main concerns with using a Pre-Shared Key (PSK) wireless local area network (WLAN) authentication to encrypt communications? (Select all that apply.) A Pre-Shared Key (PSK) fails to provide accounting. Periodically changing the key is difficult. A Pre-Shared Key (PSK) is difficult to set up in general. Distribution of the key or passphrase cannot be secured.

A Pre-Shared Key (PSK) fails to provide accounting. Periodically changing the key is difficult. Distribution of the key or passphrase cannot be secured.

A network technician is trying to ensure that each channel has sufficient power in a WDM. Which of the following should they use? Spectrum analyzer Sniffer Cable tester Tone generator

Spectrum analyzer

A network architect is looking for topologies where each node is wired to its neighbor in a closed loop. Which of the following should they use when connecting and replacing a DSL modem with a layer 2 switch? Mesh Star Bus Ring

Star

What step of the CompTIA Network+ troubleshooting methodology involves gathering information and identifying symptoms? 2 5 1 4

1

What step of the CompTIA Network+ troubleshooting methodology refers to identifying the problem? 2 3 1 4

1

A network administrator implemented video surveillance mechanisms to provide a layer of defense in the event prevention-based controls fail to work. If this security mechanism is effective, it ensures which of the following options? (Select all that apply.) Shorter response times and fewer guards needed Improving resilience of perimeter gateways Recording of movement and access Detecting attempts to penetrate a barricade

Improving resilience of perimeter gateways Recording of movement and access Detecting attempts to penetrate a barricade

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.) RC4 Advanced Encryption Stand (AES) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) RC4/TKIP

Advanced Encryption Stand (AES) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A network specialist has been installing antennas around the building to get clear coverage. Some of the operators stated that they can hear the transmission but cannot reply. What should the specialist consider? MAC filtering Geofencing Antenna placement RA guard

Antenna placement

A company named Specks has solicited the use of cloud services and has chosen a Platform as a Service (PaaS) product from Oracle with an Oracle Database. The company will use this platform to build custom applications on thin clients inbased in the cloud. Which of the following is true? Server security is handled by the Specks. All Oracle software suites are included. Servers are configurable by Specks. Application security is handled by Specks.

Application security is handled by Specks.

A systems administrator wants to put in place a procedure for patch management on a Cisco network switch. Which of the following actions should be added to that procedure when preparing to flash the chip? (Select all that apply.) Load the old image at the device startup. Make a backup of the system configuration. Complete environment and compatibility checks. Rollback the firmware version and updates.

Make a backup of the system configuration. Complete environment and compatibility checks.

A network technician purchasing a computer wants to ensure that it has enough temporary processing to fulfill the software requirement. What are they looking for? Bandwidth Memory Latency Jitter

Memory

A network technician is looking at various administrative distances to see which route would be selected first. Which of the following would have the lowest administrative distance? Unknown BGP EIGRP OSPF

BGP

A network consultant is conducting a test to determine the amount of data transferred through a connection over a given period. What is the consultant testing? Bandwidth Audit Logs Baselines Netflow data

Bandwidth

A network engineer performs maintenance of a collection of workstations that communicate together and provide a bridge to a cabled network segment. What type of set did they observe? Basic Service Channel Bonding Extended Service MIMO

Basic Service

Which type of approach is applied by looking at each layer of the OSI (Open Systems Interconnection) model, starting from Layer 1, to establish a theory of probable cause? Divide and conquer Escalation Bottom-to-top Top-to-bottom

Bottom-to-top

What describes what happens when traffic is recirculated and amplified by loops in the switching topology? Routing loop Hardware failure Asymmetrical routing Broadcast storm

Broadcast storm

A network consultant reviews and updates the policy that identifies controls and processes that enable the organization to maintain critical workflows in the face of some adverse event. What is the name of this policy/process? Business Continuity Plan Password Policy Security Policy Remote Access Policy

Business Continuity Plan

A network administrator is trying to set up IP assignments to be automatic for all broadcast domains. How can they enable this for routers? Dynamic assignment IP helper Stratum DHCP relay

DHCP relay

A server administrator has created a new virtual client to host printers on the network. When adding new printers to the server, the administrator notices that the print queue is freezing the operating system when a new job comes to the server. What could the administrator upgrade on the virtual server to help with the print queue load? CRC errors CPU usage Memory Link state

Memory

A wiring professional terminates the ends of some coaxial cables. Which one of these connectors can the professional use? F-Type RJ-11/RJ45 LC QSFP+/SFP+

F-Type

A systems administrator is setting up communications for sending content to other hosts that have identified themselves as interested in receiving the originating host's content. Which of the following should they use? Broadcast Multicast Anycast Unicast

Multicast

A network administrator looks at a device that connects a fiber optic core network with coax links to CPE. What is this device associated with? (Select all that apply.) CATV DOCSIS HFC PON

CATV HFC

A network technician suspects a short in the network cable and wants to test it. Identify which of the following tools will provide this capability. Spectrum analyzer Multimeter Loopback adapter Tone generator

Multimeter

A network technician wants to gain visual coverage for an area obscured from trees surrounding the west side of the building. What could the technician use to gain visibility in that area? Layer 3 Capable Switches HVAC Sensors SCADA Cameras

Cameras

A network administrator wants to protect the hosts and network infrastructure against attacks through an in-depth defensive strategy. Which of the following deploys systems in a secure configuration to harden the devices on the network and reduce the attack surface of service vulnerabilities that an attacker could exploit? (Select all that apply.) Change default system credentials. Setup geofencing and the default VLAN. Reduce device power levels. Disable unnecessary network protocols.

Change default system credentials. Disable unnecessary network protocols.

A network technician is tasked with determining the site technological capabilities of each building in the organization. When looking at the current building, the technician confirms that the building is currently empty but has the approved equipment install permits on site. What type of site is this? Cold Site Hot Site Warm Site Firewalls

Cold Site

A network engineer needs to procure a product that scans content using a dictionary database/algorithm that looks for confidential and sensitive company information. What type of product would the engineer purchase? Floor Plan Change Management Data Loss Prevention Logical Network Diagram

Data Loss Prevention

A systems administrator installs a connectivity device that results in a high number of data collisions. Which device did the administrator install? Hub Bridge Switch Media converter

Hub

An administrator normally working on a remote server using Remote Desktop Protocol (RDP), loses the session abruptly. The administrator pings the server and does not receive a reply. An RDP session is attempted again, and the administrator can log in. Why was the administrator unable to ping the server? TCP traffic was blocked. IP traffic was not encypted. ICMP traffic was blocked. IP traffic was not tunneled.

ICMP traffic was blocked.

Which technology offers a mode for simultaneous two-way communication? Crossover Multimode Bidirectional Duplex

Duplex

A systems administrator is attempting to set up a framework for deploying multiple types of authentication protocols and technologies. Which of the following should they use? SSO EAP TACACS+ Kerberos

EAP

A network administrator wants a network switch to authenticate attached devices before activating their port on the switch. When combined, which authentication methods provide the means to validate a client's access to the network before being allowed access? (Select all that apply.) Local authentication EAP IEEE 802.1X TACACS+

EAP IEEE 802.1X

A user gets shocked, and the computer turns off. The system administrator notices scorching on the power port of the laptop and questions the user about the power source. The user admits to using a personal power supply for the work computer. What hazard did the user introduce to the system? CPU usage Temperature Humidity Electrical

Electrical

Upon reviewing legislation, a network engineer must look for methods of detecting and suppressing fires. As part of the policy, the engineers add what system to the organization's safety plan to cover this federal mandate? Cold Site ISP State Fire Suppression

Fire Suppression

A network configuration includes the ability to inspect packets at the application layer to identify potential threats. Which of the following choices uses the new configuration? Load balancer Proxy server Firewall Switch

Firewall

An IT engineer installs equipment in a new network closet. While establishing all of the connections, the engineer utilizes a punch down tool. Considering the possible uses, which of the following does the engineer use the tool for? Checking faulty ports Determining voltage and continuity Fixing conductor connections Discovering ports

Fixing conductor connections

A network technician is installing sensors to measure environmental conditions in an equipment closet. A sensor is attached to the fire suppression system. What will this sensor detect? Temperature Electrical Humidity Flooding

Flooding

A network technician is looking at a switch that temporarily pauses traffic to avoid overwhelming its buffer and causing it to drop frames. What is this most likely? Flow Control Port Security Jumbo Frames NDP

Flow Control

There are two ways a network administrator can manage network appliances on the network. One of the options is more secure and requires him to physically go to the device and connect to it with a console cable. The second option allows him to manage the appliance remotely but is less secure and will only work if the network is up. What are the two management options described here? Authentication and authorization considerations SSH In-band vs. out-of-band management Split tunnel vs. full tunnel

In-band vs. out-of-band management

A network engineer has installed a new switch. What should the engineer check to troubleshoot the trunk port connected to the corporate network? Latency Byte count Link state Duplex/speed

Link state

A network architect needs to set up private links with guaranteed service levels. Which of the following should they use? SDWAN mGRE DMVPN MPLS

MPLS

The CEO of an organization informs IT that email is not working. Upon investigating the problem, an engineer discovers that the company's domain name system records are missing on a company owned internal DNS server. Which record type does IT fix to solve the email issue? MX TTL PTR CNAME

MX

A network architect reviews the statistics associated with a device in the Management Information Base and reviews each of the stored parameters. What are the individual numeric parameters named? OIDs Memory Link State Encapsulation Errors

OIDs

A cyber engineer tests the organization's network firewall to see if any vulnerabilities can be observed. What is the name of this test? LDAP Kerberos Penetration Honeypot

Penetration

A technician is setting up an IP camera that is operating off the 802.3at standard. Which of the following should they set up for the camera? Jumbo frame 802.1Q PoE+ LACP

PoE+

Employees of a company need remote access to the corporate network by connecting to a virtual private network (VPN). To validate credentials, the network administrator suggests installing an authentication, authorization, and accounting (AAA) server. If the server and client configure the same shared secret, what protocol should be used in this scenario? TACACS+ (Terminal Access Controller Access Control System Plus) Directory services Remote Authentication Dial-in User Service (RADIUS) Lightweight Directory Access Protocol (LDAP)

Remote Authentication Dial-in User Service (RADIUS)

Using a Windows server, a network admin is trying to test a remote server's network configuration and confirm the packet's routing path. Apply the information given to determine which of the following actions will provide the appropriate information for this test. (Select all that apply.) Run a ping command. Run a traceroute command. Run a tracert command. Run a netstat command.

Run a ping command. Run a tracert command.

A solutions architect needs to replace their hub and spoke type designs with more efficient, but still secure, connectivity to corporate clouds. What should they use? WLAN SDWAN MAN WAN

SDWAN

An administrator is installing an inventory system that will keep track of when the organization procures and implements hardware and software, upgrades or modifies it, and decommissions it. What is the inventory system tracking? Data loss prevention System lifecycle Change management Assessment report

System lifecycle

A network administrator is unable to access files on a remote system. A network firewall seems to be blocking traffic from passing through. Which of the following will the administrator most likely need to reconfigure for inbound and outbound traffic? (Select all that apply.) TFTP traffic SMTP traffic TCP port 110 TCP port 20

TFTP traffic TCP port 20

Virtual hosts on the network have system clocks that are out of sync. After further investigation, the network administrator configures the hosts to the sync system time with domain controllers. What may be causing these clocks to go out of sync? (Select all that apply.) The UDP port 123 is blocked. The TCP ports 636 and 143 are blocked. The TCP port 443 is blocked. The NTP is misconfigured.

The UDP port 123 is blocked. The NTP is misconfigured.

A company recently set up a new wireless network for guests and vendors that does not require a network key. Users have reported that connecting to this new network fails when their device connects and automatically loads the captive portal web page. What two items should be verified in troubleshooting the captive portal setup? (Select all that apply.) VPN settings are correct Client disassociation settings The captive portal page URL starts with https:// A trusted certificate is installed

The captive portal page URL starts with https:// A trusted certificate is installed

A network admin is working with a beta application at an office workstation and is unsure if the app is connecting properly to the internal web server. The ipconfig utility shows the workstation has a valid Internet Protocol (IP) address and a default gateway. Determine which command-line tool the admin can apply in this situation to show active connections and execute further troubleshooting actions. The route utility The tracert command The traceroute command The netstat command

The netstat command

A network administrator wants to prevent the signal of a wireless access point (AP) from extending over to other work areas and businesses. Analyze the scenario and determine what the admin can adjust on the AP to accommodate this requirement. The security type The power level The 802.11 standard The wireless channel

The power level

An attacker created a rogue access point (AP) with the same Service Set Identifier (SSID) as a legitimate one, and then used a Denial of Service (DoS) technique to overcome the legitimate AP. Users were forced to disconnect from the network and reassociate with the attacker's AP. What is the goal of the attacker when setting up this kind of evil twin attack? (Select all that apply.) To create an encryption protocol mismatch To deauthenticate client connections To steal user network credentials To snoop on connections with web servers

To steal user network credentials To snoop on connections with web servers

An IT help desk technician troubleshoots a computer that will not connect to the network. The computer's network adapter has the correct configuration. The technician checks the physical connection and discovers that the wall jack and network patch panel do not have a label. Which of the following tools should the technician use to locate the physical connection? Spectrum analyzer Cable tester Packet sniffer Tone generator

Tone generator

A company is considering using a co-location connection with a cloud service provider to support some virtual services in its data center. This will provide the company a private and hybrid cloud model to easily move services from the local infrastructure to the cloud during peak season by using infrastructure as code tools. Which of the following network components are most likely required for hybrid solution? (Select all that apply.) VPN VLAN MPLS Private link

VLAN MPLS Private link

A security specialist wants to enhance a company's physical security because of some failing detection-based security controls. If the network infrastructure is already in place, what is a relatively inexpensive detection-based control and effective deterrent that can improve the resilience of the perimeter gateway? Video surveillance Smart badge reader Fingerprint scanner Iris scanner

Video surveillance

A network technician wants to achieve over 1Gbps with wireless standards. Which of the following could they use? (Select all that apply.) 802.11n Wifi 5 CDMA 802.11ax

Wifi 5 802.11ax

An administrator is looking at a network diagram that shows the data path between a client and server. What kind of diagram is the administrator looking at? (Select all that apply.) IDF Wiring diagram Physical network diagram Logical network diagram

Wiring diagram Physical network diagram Logical network diagram

The marketing office reported issues regarding slow network connectivity to the Internet and inability to access the company's SharePoint site. All marketing users on the 7th floor offices are getting an "HTTP 404" warning. What is the best way the network admin can approach this incident to identify the problem? Make a plan of action to resolve the issue. Question all users on the 7th floor. Work on the slow Internet connection first. Begin at Layer 3 of the OSI model and go down.

Work on the slow Internet connection first.

A system has a network of ASICs (Application-Specific Integrated Circuits) computing nodes organized into a cluster for training Artifical Intelligence (AI) models. There are 64 devices running non-stop. In a period of 48 hours, two of the devices failed. Calculate the Mean Time Between Failures (MTBF) for the Service Level Agreement (SLA). (48*64)/2=1536 (2*48)+64=160 (64+48)/2=56 (64-48)*2=32

(48*64)/2=1536

A network analyst is concerned with security in Linux. What interest does the analyst have in the /etc/passwd file? /etc/passwd stores user settings /etc/passwd allows clients to perform name resolution /etc/passwd stores the encrypted hash password files /etc/passwd stores interactive login settings

/etc/passwd stores user settings

A data center architect is looking at access types and wants something that is cost-effective. They are a smaller company so they are willing to take some risks to have a lower cost. What would a good solution for them be? On-prem Branch office Spine and leaf Colocation

Colocation

A school with no resources stages an enterprise mobility management solution for their planned "Bring Your Own Device" (BYOD) program. A network analyst will caution them about obstacles they will need to mitigate as a successful part of this rollout. What are the obstacles? (Select all that apply.) Misconfigured firewall Compatibility Feature licensing Security

Compatibility Security

A security analyst from a major company approaches a systems administrator wanting to set up fake servers so that they can study activity which should not be happening and look for other signs of that activity in their environment. Which of the following are they trying to set up? Vulnerability assessment Penetration test Honeypot Screened subnet

Honeypot

An engineer uses a type of network adapter to connect a fiber link to a router. The transceiver fits into an optical interface on a layer 3 Ethernet router. Of the choices, which layer 1 implementation does the engineer utilize? Media converter Switch VoIP endpoint Bridge

Media converter

A company wants to provide software applications to its employees as quickly as possible. They want the applications to update regularly and be accessible via the cloud. Employees should not have to install anything new on their workstations. Which of the following cloud models will provide the best solution? PaaS Private IaaS SaaS

SaaS

A security admin has been tasked to audit a new web server on the network. The admin's task is to ensure the server does not have any unecessary open ports or services running on it. Deduce the best course of action for checking the server if the admin knows the Internet Protocol (IP) address of the server. Run the nslookup utility from the web server Run the nestat utility from a laptop Run the dig utility from the web server Run the nmap utility from a laptop

Run the nmap utility from a laptop

A security admin has been tasked to audit a new web server on the network. The admin's task is to ensure the server does not have any unecessary open ports or services running on it. Deduce the best course of action for checking the server if the admin knows the Internet Protocol (IP) address of the server. Run the nslookup utility from the web server Run the nestat utility from a laptop Run the dig utility from the web server Run the nmap utility from a laptop

Run the nslookup utility from the web server Run the nestat utility from a laptop Run the dig utility from the web server Run the nmap utility from a laptop

A company wants to leverage block level storage with jumbo frame packets. The storage must be accessible remotely and isolated only to the servers. Which type of network topology is most appropriate for this setup? CAN SAN MAN WAN

SAN

A security admin is auditing a newly deployed web server on the local network. After gaining knowledge of the server's (Internet Protocol) IP address, the admin runs the nmap utility. Which of the following objectives is the admin most likely to achieve when applying this utility? (Select all that apply.) Scan for MX records. Scan for domain information. Scan for open ports. Scan for unnecesary services.

Scan for open ports. Scan for unnecesary services.

A fancy new office floor uses high-gloss, shiny tile on the walls and on the building's inside pillars. Employees are reporting connectivity issues and slow download speeds. Identify the most likely reason for the reported issues. Signal reflection Signal absorption Signal refraction Signal mismatch

Signal reflection

A network architect is updating the organization's network to use one set of credentials to access corporate equipment, further mitigating threats and vulnerabilities. What is the architect creating for each employee? Single sign-on (SSO) Vendor assessment Vulnerability assessment Threat assessment

Single sign-on (SSO)

The IT floor of a bank building contains servers that hold confidential data and the bank needs to regulate access to sensitive areas within the building. Analyze the scenario to determine which options can be implemented to allow employees to authenticate through locked barriers. (Select all that apply.) Smart Badge Radio Frequency Identification (RFID) Biometric Device Cameras

Smart Badge Biometric Device

A Linux administrator is configuring a Linux server's network interface card. The server must have a static IP (Internet Protocol) address for a Class C network. Settings must be verified. Analyze and select which commands would be most appropriate to run in this scenario. (Select all that apply.) ifconfig eth0 broadcast 192.168.101.100 ifconfig ifconfig eth0 netmask 255.255.255.0 ifconfig eth0 192.168.101.120

ifconfig ifconfig eth0 netmask 255.255.255.0 ifconfig eth0 192.168.101.120


Set pelajaran terkait

Mental Health Unit 3 Exam: Eating Disorders & Schizophrenia

View Set

Small Parts: Scrotum (Notes pg. 68 - 81)

View Set

Information Storage and Management v5

View Set

Ap Lit poetic devices and romantic poetry

View Set