Assignment: Quiz: CompTIA Network+ N10-008 Post-Assessment Quiz

Ace your homework & exams now with Quizwiz!

sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. Which of the following might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP?

MIB (Management Information Base)

Talia has just returned from a meeting with her manager where they discussed the various vulnerabilities that might impact the organization. They agreed that they were concerned that users might give out information or click on malicious links that they should not click. Which of the following types of testing might help to identify weak areas where the company could improve its employee awareness programs?

a. social engineering

Which of the following provide SSO capabilities for a system?

b. Kerberos

Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into?

b. Layer 3

Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific northwest. She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. Which of the following types of connections might she choose to include in the configuration?

b. WAN (Wide Area Network)

In which of the following types of technologies would a network technician configure an ESSID?

b. WLAN controller

At the beginning of a pandemic, a company has realized that they do not have enough Windows computers to ship out to employees in order to allow them to work from home. Which of the following might the company choose to implement to allow their users to continue to work from home until more computers can be purchased and shipped out to these employees?

b. remote desktop gateway

Which of the following IEEE standards defines how VLAN information is added to the header of frames being sent across a network?

c. 802.1q

Beri is analyzing some network traffic statistics and sees a metric that appears to indicate that frames are being corrupted as they're being sent across the network. Which of the following might be the metric that causes her to believe that is the case?

CRC (Cyclic Redundancy Check)

Which of the following ports are used by the Simple Network Management Protocol?

a. UDP 161

Tan works for a telecommunications provider and noticed one of the communication links to a branch office 10 miles away has just gone down. Which of the following tools might help him determine what the problem could be?

a. Use an OTDR on the fiber optic cable.

Ehred is a network technician for a hotel chain and has been notified that one of the locations is having issues with the guests' ability to join the Wi-Fi network. Guests are usually prompted to enter their room number and last name on the reservation, but this does not appear to be happening. Which of the following might best describe the issue occurring in this hotel?

a. captive portal issues

Which of the following types of cable might you expect to see connected to a cable modem from the ISP?

b. RG-6

Carolina wants to determine which services are running on the Linux servers in a certain subnet. Which of the following tools would best perform this task?

b. nmap

Which of the following types of cables might be used to run from cubicles into a drop ceiling and then routed across to an IDF?

b. plenum

Kumail wants to check his bank account balance to see if a transaction has cleared from a purchase he made the previous day. Which of the following protocols would most likely be used to do this?

c. HTTPS

Which of the following is not a technology used to connect servers to a SAN?

c. IR

Zara is having trouble accessing her company's website through her web browser. She has already pinged the static IP address of the web server and it appears to be online. Which of the following might she look at next?

d. Ensure that DNS for the domain is configured correctly.

Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individual VLANs appear to be tagging the traffic correctly. However, there are still some frames being transmitted across the network that are not tagged to any particular VLAN. Which of the following describes the term by which a switch will categorize these frames?

d. Native VLAN

Which of the following documents might a company use to solicit vendors to submit a solution of products and services that the company is looking to purchase?

d. RFP

Savannah manages multiple wireless networks within her company's warehouse to ensure that certain devices are isolated and segmented off from each other. A junior technician has just added a new device to the network but cannot seem to get it to communicate with the other devices. Which of the following is the most likely reason that it cannot communicate with these devices?

d. incorrect SSID

Janvi is attempting to connect to one Linux server from another but is getting a message "destination host unreachable". Which of the following tools might he use next to determine the cause of the issue?

d. netstat

Tyler is a junior network engineer and has been reading about the ability to connect two ports on one switch to two ports on another switch using ethernet cables to double the amount of bandwidth available between the switches. He has not yet set up a port aggregation protocol and notices an increasing amount of broadcast traffic being sent back and forth between the two switches. Which of the following is likely not set up on these switches that would have prevented this until he configures some sort of port or link aggregation method?

A. ERGIP

Toni needs to connect to a Cisco switch to make configuration changes. Which of the following protocols will most likely be used when she authenticates into the switch?

a. TACACS+

All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use?

a. star topology

Which of the following expresses the subnet mask 255.255.255.224 in CIDR notation?

c. /27

Kaleb is looking at the list of WiFi devices currently connected to the network. He sees a lot of devices that all appear to be made by the same manufacturer, even though the manufacturer name is not listed on the screen. How could he have determined that they were made by the same manufacturer?

c. There are a large number of devices that have the same OUI.

Carlos currently manages an 802.11n wireless network. He has been asked to see if there is a way to increase the speed of the network without upgrading to another Wi-Fi standard. Which of the following would allow him to do this if supported by the current technologies in use?

c. channel bonding

Jamie needs to subnet the network 192.168.3.0/24 into 4 equally sized subnetworks. Which of the following would be the subnet ID for the address 192.168.3.201?

d. 192.168.3.192

Tuan is a network administrator for a large organization. The company currently has 4 T-1 lines providing Internet access at a manufacturing facility but is seeing issues with the newly deployed Voice over IP (VoIP) system. Which of the following might Tuan want to consider that will not require additional bandwidth?

d. Implement QoS(Quality of service)

Cari is a system administrator for an organization that has been seeing large amounts of growth but has multiple legacy systems running on older hardware. There is a concern that there is not much physical space left in the data center. Her manager has asked her to come up with a way that the company could continue to expand the ability to deliver services to end users without having to grow into another data center. Which of the following might be a component of Cari's plan?

a. Hypervisor

Bob wants to allow devices at a branch office to query publicly available DNS servers from a large cloud provider. Which of the following ports should he open in the firewall in order to enable this?

c. 53

Tevin has been tasked with ensuring that his company's web applications are always online - even when their data center loses power and network connectivity due to some unforeseen disaster. Which of the following is the most cost-effective solution that he could recommend that would meet this requirement?

D. cloud site

Which of the following is the best action a company can take to prevent social engineering attacks from being carried out against the organization successfully?

a. employee awareness training

Tejas wants to be able to manage a variety of devices on his network while ensuring that the communications of the management system are encrypted. Which of the following should he implement?

b. SNMPv3

Annette wants to expand her company's current on-premises cloud infrastructure by adding a well-known cloud service provider into the design, rather than building or leasing another datacenter. Which of the following cloud deployment models best describes the type of infrastructure that she wants to move towards?

c. Hybrid cloud

Which of the following protocols might someone use to send an email?

b. SMTP

Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet. Which of the following would be the best choice for him to implement?

b. VPN

Terrance is trying to troubleshoot an issue on his company's network. He has narrowed it down to a few segments of the overall larger network. He connects with a rollover cable to one of the routers and wants to check the status of the connection to another router. Which of the following commands might help him troubleshoot that connection?

c. show interface

Sandra is attempting to resolve an issue on her company's network: several users are unable to access one of the company's intranet web servers. She has developed a theory and tested it to determine the cause. Which of the following steps should she complete next?

d. Establish a plan for resolving the problem

Giuseppe is architecting the network for a new headquarters building that is currently in design. He wants to ensure that there is redundancy built into the network while also ensuring that there are no routing loops. Which of the following methodologies can he make use of to ensure the configuration is free of routing loops?

d. Implement split horizon

Priya is planning the cabling design for the company's new headquarters. One of the runs of cable needs to go behind the elevator bank's hydraulics and motors to the reception area computer. Which of the following types of cable would be the best choice?

d. STP

Pano has just installed a switch for a new network segment at a branch office. Which of the following describes the traffic flow being sent from one computer on that network segment to another computer on the same network segment?

c. east-west

gorge is analyzing the traffic statistics on one of the networking devices and sees a category for the number of Runts that the device has seen. Runts are packets that are smaller than _______ bytes.

64 bites

Zachariah has been asked to assess whether the backup process at his organization is sufficient to meet all of the company's goals and objectives, which support their key performance indicators. One of the topics that he is analyzing is the frequency of backups to ensure that the company does not lose any more than 6 hours of data in the case of a hard drive or other system failure. Which of the following describes the particular metric that he is concerned about?

RPO (Recovery Point Objective)

Toby is drafting the physical network topology plans for the new headquarters building for his company. Which of the following will there be the most of within the building?

b. IDF

eri is a network administrator for a large company that is attempting to switch to a VoIP technology recommended by one of their vendors. She knows that this particular traffic can be sensitive to latency and jitter. Which of the following might she decide to do that incurs the least cost to ensure that there are no issues with this new technology?

b. Implement a voice VLAN for the VoIP traffic.

Bert is a network administrator for a company that has just acquired another smaller company. Upon doing an inventory of one of the branch offices of the acquired company he finds an unmanaged switch in one of the IDFs. At which of the following layers does this device operate?

b. Layer 2

At which of the following OSI model layers is the protocol data unit referred to as a segment?

b. Transport Layer

Anosh needs to deploy a new web application that is publicly accessible from the Internet. The web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. Which of the following devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet?

c. SQL Server

Ava is unable to pull up her company's website, theoretical.com, in her web browser. She wants to check that the server is online and responding to requests. Which of the following could she try?

c. ping the IP address of the web server

Tijuan has just gotten back from a networking security seminar where he learned about a common concept that states that people should only be given the access that they need to do their job and nothing more. Which of the following concepts did he learn about?

c. principle of least privilege

Which of the following is the default subnet mask for a class C network?

d. 255.255.255.0

Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service. Which of the following types of programs might he use to do so?

d. terminal emulator

Tevan cannot connect to the core router located in the MDF at his company. Which of the following might be useful in troubleshooting this connection?

d. rollover cable

Which of the following concepts assumes all network traffic is potentially malicious until proven otherwise?

zero trust security model

Which of the following is the most secure password that an administrator might choose to use?

YM100%oftheSH0tzUdontTakE!

Kali is wanting to edit the configuration of a web server running Linux. Which of the following ports is the best choice for her to connect to the Linux web server?

a. 80

Which of the following ports is used by a website that has implemented TLS certificates?

c. 443

Hobart has just created a network segment for a new group of file servers. These servers should only be accessible from the internal network. Connections coming in from the Internet should not be able to access these file servers. Additionally, the servers should be able to perform automatic updates from the operating system and software vendors. Which of the following should he consider implementing in order to accomplish this task?

c. stateful firewall

Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down constantly. When the fiber status is up, the data rate is slower than what she expected. Which of the following might be a factor in the issues she is seeing?

d. low optical link budget

Jan needs to connect two offices together that are approximately 21 km, or 13 miles, apart from each other. Which of the following would be the best choice of physical mediums that could be used to connect these locations?

d. single mode fiber

Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible. Which of the following is the total number of usable IP addresses that will remain free after creating this subnet?

c. 40

Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a ticket granting ticket system that relies on time synchronization in order to prevent replay attacks. Which of the following protocols might he implement to ensure that Kerberos will work correctly?

d. NTP (Network Time Protocol)

Leonard has configured a switch with multiple VLANs and needs to route traffic between the different VLANS through a router on a stick. Which of the following does he need to configure on the router to enable this?

a. subinterfaces

Jorge has been tasked with purchasing a new wireless access point that provides the fastest access speeds and also operates on the 2.4 GHz spectrum. Which of the following specifications should he look for?

d. 802.11ax

Which of the following types of transceivers can be used for connections that require a data rate of 400 Gbps?

d. CFP (Certified Financial Planner)

Cora is a network engineer for a large company and has been given instructions on how to configure a private fiber connection between her company's data center and the cloud service provider her company uses. She needs to configure an ASN on one of the core routers in the data center as part of the connection. Which of the following protocols is she most likely being instructed to configure for use with the CSP?

c. BGP (Broder Gateway Protocol)

Dilan is a network administrator for a large company. On a couple of different occasions, he noticed that users were getting odd IP addresses when attempting to join the corporate network. He found that the development team had created virtual machines that were offering out IP addresses. Which of the following, if enabled, would have prevented this from happening?

DHCP snooping

Jason has just been hired as the Director of IT. He is reviewing existing policies and procedures to determine how well the company has defined the roles of its employees in order to keep the organization secure and operating efficiently under any scenario. He finds that the company does not have an existing plan for how their offices in a hurricane-prone area will continue to operate during a hurricane. Which of the following plans should he consider implementing to ensure that employees at this location and supporting locations will be well prepared to both handle and continue to operate through whatever situations may arise as a result of natural disasters?

BCP (Business Continuity Planning)

Terrance has been tasked with upgrading his company's Wi-Fi network that provides network access for several devices that are located somewhat far apart from each other. He knows that they all need to stream a large amount of data simultaneously. Which of the following capabilities should he look for when shopping for new hardware?

b. MU-MIMO

Lisa is a network administrator and has been reviewing the types of data being transmitted over the network. She discovers that there are a number of email attachments and files being uploaded to a remote server via FTP that potentially contain PII. Which of the following might help her to prevent these files and confidential information from being transmitted outside the organization?

c. DLP (Data Loss Prevention)

Dahlia has just installed gigabit routers and switches at the company's headquarters. Which of the following might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds?

a. Install a NIC on each of the computers

Gary has been tasked with ensuring that the sales team can use their laptops from as many places as possible - even when there is not a Wi-Fi or wired network available at customer sites. Which of the following technologies, if included as part of a laptop, would allow them to access the systems, applications, and information they need while on the go?

a. LTE(long term evaluation)

Aaron, a junior network technician, is troubleshooting a network. He seems to have tracked down the issue to the core router that connects to the line from the ISP, however, he's not sure where the core router might be located. Which of the following should he ask a senior technician for help locating?

b. demarcation point

The helpdesk at a large company is looking for ways to increase the efficiency of their technicians. They have found that different technicians have different ways of doing the same task. Some of these technicians take twice as long as others. There is also no documentation on how to perform tasks, so when a new helpdesk technician is hired it is up to the technician training them to pass on that knowledge. Which of the following might this company decide to implement to resolve these issues?

b. SOPs

Varghese has just returned from a meeting with senior management. The management team is concerned that the current systems in place may not be identifying all of the weaknesses that exist in the current infrastructure and want to determine to what extent the company could be attacked. Which of the following might Varghese decide to employ in making this determination?

b. penetration test

Caleb has just installed an open-source application on a web server to host a wiki for the customer service department. Which of the following should he do to harden the application after installation? a. Configure SNMPv1 on the server to help with automation and management. b. Change the default password. c. Disable SSH and enable telnet on the server for remote administration. d. Block port 443 on the firewall in front of the web server.

b. Change the default password.

Homer is revising some internal documentation at his company. He has been asked to verify whether a certain key performance indicator is currently being met in regard to the average amount of time it takes to repair a device or service after it has experienced a non-fatal error. Which of the following is the term which best describes this KPI?

b. MTTR (Mean Time To Repair)

Bryan has just purchased a new firewall for his organization and installed it in the datacenter. He spent many hours researching to find the best option with all the features his company needs. However, after installing the firewall, several items he needs are missing from the configuration options. Which of the following is the most likely cause?

d. He purchased the incorrect license type for this firewall.

Jeni works for a company that has seen rapid growth, beginning as a very small startup and expanding into a large company with what is forecasted to be thousands of employees by the end of its second year. She is trying to ensure that the fast-paced growth doesn't overburden administrators when onboarding new employees. Which of the following would require the least administrative effort in their day-to-day jobs of onboarding employees and managing permissions for these users, groups, and departments while maintaining the highest level of security?

RBAC (Roll based acess protocol)

Jafar has just been hired as a junior network engineer for a large company. He has been advised that due to a pandemic he will be working remotely and needs to ensure he has a high-speed broadband Internet connection with low latency at home in order to connect by VPN. The local cable company has not yet built out his neighborhood, so he needs to look for an Internet service that meets the requirements. Which of the following choices would most likely best suit his needs?

a. DSL (Digital Subscriber Line)

Genghis wants to develop a new application that requires a database. He does not, however, want to be responsible for managing the patching and security of the operating system for yet another server. Which of the following would best serve his needs?

d. PaaS (Platform as a Service)

Antje has been asked to review the cybersecurity infrastructure deployed to ensure that they are looking at every layer in their defense in-depth strategy. He finds that there is adequate protection at the perimeter of each zone but is concerned that zero-day network-based attacks may still make it into the network segment. Which of the following should he recommend implementing?

d. host-based firewalls

The network administrator for an organization needs to install a network at his company's new branch office. The branch office will have 30 computers that will all connect to the Internet, where they will share a single public IP address. Which of the following devices must the network administrator install to ensure the devices are able to send traffic out to the Internet and receive the corresponding traffic back?

c. router

Tabitha has been trying to connect to a server by FTP for the past two hours, but it says that the maximum number of connections are already established. She connects via SSH and sees a single IP address has all of the connections open. Which of the following describes the type of attack that is currently in progress against this server?

DoS (Dnial Of Servive)

Tonia has been tasked with setting up a wireless network at a new branch office. She wants to make the network secure while requiring the least administrative effort. Which of the following might she choose to implement?

b. WPA2-Enterprise

Mylinh manages a growing corporate network. As the network grows, it is getting more and more difficult to manage the configurations on the various routers and switches within the network. Which of the following might help centralize the approach to managing the traffic flows across the network?

a. SDN (Software Difiened Network)

Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. Which of the following, if performed, would still not allow him to deploy these new cameras to the selected location?

b. Replace the unmanaged switch with a managed switch.

Benjamin has been receiving reports from users at one of the rural branches of his company that their VoIP telephone conversations have been experiencing distortion and some lost connections. He pulls up the monitoring tool and sees that recently there has been a lot of video streaming from a popular social media site and that the bandwidth for the ISP connection to that office appears to be maxed out during the timeframe when users are experiencing issues. Which of the following could help resolve the issues with the telephone conversations without discarding any traffic?

b. traffic shaping


Related study sets

strength and conditioning test 3

View Set

Ch 11: Retailing and Wholesaling DSM

View Set

NU 214 PART TWO Chapter 15 cancer PRACTICE QUESTIONS

View Set