CompTIA Network+ set 1 practice questions

Ace your homework & exams now with Quizwiz!

Which series of Windows commands would an administrator use to reset the TCP/IP configuration of a system in order to ensure the system changes its configuration for a new DHCP server? "ping /r," then "ping /t" "ifconfig eth0 down," then "ifconfig eth0 up" "ipconfig /release," then "ipconfig /renew" "intestate /stop," then "intestate /reset"

"ipconfig /release," then "ipconfig /renew"

What is the loopback address for IPv6? (Select two.) 127.0.0.1 0:0:0:0:0:0:0:1 0:0:0:0:0:0:0:0 ::1

0:0:0:0:0:0:0:1 ::1

Which of the following is the recommended distance limit for CAT 5 cabling in Ethernet service? 100 meters (328 feet) 50 meters (164 feet) 1000 meters (3280 feet) 10 meters (32 feet)

100 meters (328 feet)

Rebecca needs to spec the equipment for the installation of a complete network system: cables, switches, PCs... everything. The network only needs to be 100BaseT but must be easy to upgrade to 1000BaseT in the future. Which one of the following, although good to have, would be the least important element for Rebecca to buy now? CAT5e patch panel 100/1000 Mbps switch CAT5e UTP horizontal cabling 100/1000 Mbps NICs

100/1000 Mbps switch

Which of the following Ethernet standards use UTP cable? (Select two.) 1000BaseT 100BaseTX 10GBaseER 10GBaseLW 10GBaseSW

1000BaseT 100BaseTX

Which cable standard is limited to 10 Mbps, has a maximum segment distance of 100 meters, and uses UTP cable? 10BaseFL 10BaseT 100BaseFX 10Base2 1000BaseCX

10BaseT

FTP uses ports ____ and ____ for transferring data and control signals. (Select two.) 20 23 110 53 80 21

20 21

Which of the following is an example of an IPv4 address? 167.34.284.49 20.168.4.13 2001:FE34:C4E8:8CF1:30A4:A09E:12FD:8E9A 00-50-56-A3-04-0C

20.168.4.13

Which of the following ports are MOST commonly used by communications applications to interactively manage network devices? (Select TWO.) 67 23 22 21 53

23 22

HTTPS requires you to open which additional port in your firewall? 3389 143 443 80

443

A Class B block assignment allows for how many hosts? 65534 More than 16 million 254 14

65534

You are going to visit the http://www.totalsem.com Web site. Which TCP port number will your Web browser use to complete the request? 80 121 69 161 123 21

80 121

Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening? WPA2 802.3ad 802.1x TKIP

802.1x

Which IPv6 address is the loopback address (using the :: rule)? ::1 :: 1080::8:800:200C:417A 127:0:0:1

::1

What do you call a snapshot of your systems and network when they are working correctly? A Proxy A Baseline A network map A syslog

A Baseline

Sherman has configured his network hosts to use DHCP. Now he wants to ensure that his users can use names like www.totalsem.com instead of IP addresses when using their Web browsers. He needs to install what kind of server? A DNS server A WINS server A DHCP server An FTP server

A DNS server

Sandy is going to connect her network to the Internet. To keep her network secure, what should install between her network and the Internet connection? A firewall A VLAN A router A gateway

A firewall

Which is the best description of a VLAN? A group of ports that behaves as an independent switch A collection of computers that utilizes an experimental protocol A conceptual LAN that is created in a CAD environment An Ethernet network that uses PPTP encapsulation

A group of ports that behaves as an independent switch

Users are seeing messages and warnings on their computers about duplicate IP addresses and are encountering connectivity problems. A quick check of the change management log shows that network technician Ursula installed a new DHCP server on the network last week. Which of the following would cause duplicate IP addresses on the network? The network IP leases are expiring and not renewing. The DHCP server has run out of IP addresses to issue to clients. The DNS record A pointers are incorrect. A second DHCP server is on the network.

A second DHCP server is on the network.

Marsha wants to place certain restrictions on communication between client computers and the main file server. Which of the following will enable her to accomplish her goal? DHCP DNS ACL NAT

ACL

In which document would you expect to find a privacy/consent-to-monitoring section? Service-level agreement Acceptable-use policy Memorandum of understanding Statement of work

Acceptable-use policy

You recently installed a keypad lock on the door to the telecom room. You only give the code to authorized network administrators. What type of prevention is this? Separation of Duties Access control hardware Social engineering protection Principle of Least Privilege

Access control hardware

Which IT changes should be documented by the change-management team? (Select three.) User password changes Additions to the network Network configuration Replacement of a failed monitor Physical-location changes

Additions to the network Network configuration Physical-location changes

Where would a patch antenna for 802.11 usually be placed? In the middle of a room Against a wall Pointing at another patch antenna on another building 802.11 does not use patch antennas

Against a wall

You want to go implement Wi-Fi in your office. What device do you need to connect your clients to the network? An access point A hub A router A bridge

An access point

E-mail programs and FTP work on which layer of the OSI 7-layer model? Application Layer Presentation Layer Network Layer Data Link Layer Session Layer Transport Layer

Application Layer

A user is no longer able to access the shared accounting files, but others still have normal access to the share. What is the FIRST step in troubleshooting this issue? Escalate the issue to the vendor. Notify senior management of the issue. Develop a probable cause theory. Ask the user if anything has changed on the system.

Ask the user if anything has changed on the system.

Your company has just purchased 800 new PCs for a roll-out you are about to make. Of the following choices, which should you update accordingly? Wire schemes Baselines Change management Asset management

Asset management

Which two of the following should you do first when you are designing and implementing a new network? (Select two.) Run a network analyzer. Begin documentation on your system and network. Buy all new NICs. Determine the company's network needs and expectations.

Begin documentation on your system and network. Determine the company's network needs and expectations.

Which of the following is the MOST common type of WAN connection used in homes? T1 Cable Modem MPLS SDH

Cable Modem

Network technician Angelina needs to make and customize some different long and short cables. She then needs to verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO.) Cable certifier Punch-down tool Loopback plug Crimper Multimeter

Cable certifier Crimper

A network printer will be installed in the sales department. The switch port, server, and printer NIC have all been configured properly, but no link light illuminates when the printer's network cable is plugged into the wall port. Which of the following tools would administrator Julie use to diagnose the problem? Cable tester OTDR Crimper Protocol analyzer

Cable tester

The link lights on the front of your network switch are an example of which of the following principles of Ethernet? Carrier Sense Collision Avoidance Collision Detection Multiple Access

Carrier Sense

A user is using a PKI authentication method. Which of the following will the user need to implement PKI? A RADIUS server Access control lists Various router commands Certificate services

Certificate services

What elements would be found in a change request? (Select three.) Configuration procedures Funding mechanism Change-team members Notification Rollback process

Configuration procedures Notification Rollback process

Network administrator Kwan suspects that one of the copper network cables is faulty. When examining the suspect cable, Kwan notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following? Dispersion Cross-talk dB loss Collisions

Cross-talk

What would you use to create a direct connection between two client 10/100 network workstations? Crossover Cable Straight-through cable Fiber Optic Cable Coaxial Cable

Crossover Cable

Elsa needs to connect two switches together with no MDIX ports. Which of the following might she use? Bridge Spanning Tree Straight-through cable Crossover cable

Crossover cable

A computer user, Zaphod, is unable to log on to the domain from his desktop computer. A cable certifier is used to check his network cable and it shows a high value of NEXT. Which of the following is most likely the cause? Split cables TX/RX reversed DB loss Crosstalk

Crosstalk

Switches operate at the ________________ layer in the OSI model. Physical Layer Data Link Layer Network Layer Presentation Layer Transport Layer Session Layer

Data Link Layer

A network technician, Ellen, receives a support ticket. The ticket does not provide enough information for Ellen to determine the problem. Which of the following should she perform FIRST before responding to the ticket? Test a theory to determine a cause. Determine if anything has changed. Establish a plan of action to resolve the problem. Escalate the problem if necessary.

Determine if anything has changed.

Margaery is a user who is experiencing very slow network access. She has spoken with other users and learned that no one else is having the same issue. Which of the following is the NEXT step in troubleshooting this issue? Upgrade the user to a gigabit speed. Set the switch port to full-duplex. Replace the user's network card. Determine if anything has changed.

Determine if anything has changed.

Which options represent recommended approaches to troubleshooting? (Select three.) Divide and conquer Power supply, video, memory, storage, CPU, peripherals Top-to-bottom of the OSI Model Bottom-to-top of the OSI Model Gather information, reproduce symptoms, establish and test theory, implement solution, document results

Divide and conquer Top-to-bottom of the OSI Model Bottom-to-top of the OSI Model

Your company has just experienced an attack that caused the Web site www.yourwebsite.com to go down. What term BEST describes this? War driving Man in the Middle DoS attack Bluesnarfing

DoS attack

Which of the following is a benefit of fault tolerance? Elimination of a single point of failure Ability to restore data after a disk crash Efficient use of network bandwidth Ability to distribute CPU load across multiple servers

Elimination of a single point of failure

Theo must send highly sensitive data over his PPTP connection. What feature of PPTP will give him confidence that his data won't be stolen in route? Encryption Tunneling Unlisted Number Account password

Encryption

Network technician Raj has tested a theory of probable cause and discovered that the theory was incorrect. Which of the following would be the NEXT step in the troubleshooting process? Implement the solution Establish a plan Escalate the issue Document findings

Escalate the issue

Gwen is a corporate user who cannot access any network resources. The technician has determined that the problem is isolated to Gwen. There have been no changes to her workstation or switch port recently. Which of the following steps in the troubleshooting should the technician do NEXT? Implement preventative measures. Establish a theory of probable cause. Establish a plan of action to resolve the problem. Implement the solution or escalate as necessary.

Establish a theory of probable cause.

If John's boss asks him to install the networking technology defined by IEEE 802.3, what is he asking him to install? Wireless Spanning Tree Protocol Ethernet Fiber optic

Ethernet

Which of the following is a valid IPv6 address? 225.25.15.87 43A6.0000.DA30.0012.0063.3GA4.0D32.12E2 197.169.94.82 FEDC:BA98:7654:3210:FEDC:BA98:7654:3210

FEDC:BA98:7654:3210:FEDC:BA98:7654:3210

In order to broadcast to all nodes on a LAN, which MAC address will be used? 00:00:00:00:00:00 127.0.0.1 255.255.255.255 FF:FF:FF:FF:FF:FF

FF:FF:FF:FF:FF:FF

HTTP can be used to transfer files, but it is not as reliable or as fast as what protocol? DNS IPSec HTTPS FTP SMTP Telnet

FTP

You are setting up a network in a very large building. You have a server that is 1 kilometer away from the client machines. You don't want to use a repeater. What is the best type of cabling for you to use? UTP STP Coaxial cable Fiber-optic cable

Fiber-optic cable

Which device or software program is BEST described as restricting traffic moving between a local network and the Internet? Firewall Router VLAN Switch

Firewall

You have just installed a new device that performs stateful packet filtering on your company's network. Which of the following describes this device? Proxy server Firewall DNS server IDS

Firewall

Which term describes the rate at which usable information bits are delivered from one node to a destination? Goodput Bit rate Throughput Baud rate

Goodput

What does HVAC have to do with a rack installation? Heating, ventilation, and air conditioning (HVAC) manages environment temperatures. High-volume atmospheric control (HVAC) governs the entire facility's environmental conditions. High-voltage alternating current (HVAC) is required to power the rack equipment. High-authority atmospheric control (HVAC) governs the entire facility's environmental conditions.

Heating, ventilation, and air conditioning (HVAC) manages environment temperatures.

Your company wants to test out the security of your network by allowing attackers to hit a fake network that you create. Which technology would you need to use? Honeynet NMAP NIDS Honeypot

Honeynet

Which protocol is used with the ping command? ICMP HTTP TCP UDP

ICMP

If I wanted to find my IP address and subnet mask on a Linux PC, which command would I use? Ipconfig Netstat Ifconfig Dig

Ifconfig

The boss has just read an article about zero-day attacks and rushes into your office in a panic, demanding to know what you'll do to save the company network. What security technique would best protect against such attacks? Implement effective security policies. Keep antivirus definitions updated. Implement user awareness training. Use aggressive patch management.

Implement effective security policies.

Clark is a user who took his laptop on a vacation to Wally World. He configured the laptop to match the wireless setting at the hotel. Clark can reach his FTP server using the FTP server's IP addresses, but he cannot access any Internet resource by their URL. Duplicate IP address Incorrect subnet mask Incorrect DNS Incorrect SSID

Incorrect DNS

CHAP, MS-CHAP, and PAP are all authentication protocols for remote connectivity. However, the EAP authentication protocol offers something the other three do not. What is it? It uses a strong 512-bit encryption It requires two passwords for extra security It supports special authentication devices such as smart cards It scans the encrypted data for viruses

It supports special authentication devices such as smart cards

A user is concerned that his password is being sent in clear text when he connects to the RADIUS server using PAP. Which of the following is true about security using RADIUS? It uses a CSU/DSU to encrypt the data between the client and server. It uses a shared secret to encrypt messages between the client and server. It uses a Public key to encrypt messages between the client and server. It uses a Private key to encrypt messages between the client and server.

It uses a shared secret to encrypt messages between the client and server.

A private network has which of the following traits? Its IP addresses must be assigned by IANA. Its IP addresses are exposed to the Internet. Its IP addresses are not exposed to the Internet. It uses only static IP addresses.

Its IP addresses are not exposed to the Internet.

Which of the following services is most likely to need an NTP server? Kerberos EAP-TLS 802.1x PKI

Kerberos

Which of the following protocols enables tunneling and encryption? TFTP Telnet L2TP FTP

L2TP

At which layer of the OSI model does an unmanaged switch operate? Layer 2 Layer 4 Layer 3 Layer 1

Layer 2

At which layer of the OSI model does IP address-based routing occur? Layer 2 Layer 5 Layer 4 Layer 3

Layer 3

Which device tests the power of fiber-optic light pulses? Light meter Power monitor Wi-Fi analyzer Looking glass site

Light meter

What routing algorithm does OSPF use? EIGRP Distance vector Hybrid Link State

Link State

4F:AC:13:34:AA:54 is most likely a(n) _____________ address. IP EUI-64 Frame MAC

MAC

Of the following network access security methods, which involves checking the physical addresses? RADIUS MAC filtering RTP IP filtering

MAC filtering

Which options represent common hashing techniques? (Select two.) PAP MD5 SNMP SFTP SHA

MD5 SHA

Which of the following connectors would be found on a fiber-optic cable? MT-RJ RJ-11 RS-232 BNC

MT-RJ

Clark is troubleshooting a user's PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening? Honey Pot Zombie Man in the Middle Smurf

Man in the Middle

Which of the following is most likely to effect your company's IP-based surveillance cameras? Man-in-the-middle Phishing Social engineering FTP bounce

Man-in-the-middle

Which of the following attacks enables a malicious person to view network traffic if the attacker is on the same network as the users? DoS attack Smurf attack Xmas attack Man-in-the-middle attack

Man-in-the-middle attack

Which of the following functions may be performed by a typical firewall? (Select all that apply.) May block specified users from using the internet Hides the LAN from unauthorized users on the outside Controls network password functions Blocks specified TCP ports

May block specified users from using the internet Hides the LAN from unauthorized users on the outside Blocks specified TCP ports

When enabled on an Aruba wireless access point, 802.11a-ht and 802.11g-ht is more commonly known as what? Mixed mode MUMIMO mode Cellular-phone mode Multiple-antenna mode

Mixed mode

Your company requires the use of a smart card, biometric device, and a user name/password to login to your system. What kind of authentication are they using? Two-factor authentication Multifactor authentication Kerberos Single sign-on

Multifactor authentication

Buck needs to provide connectivity to computers within a SOHO that is over 850 feet (259 meters) away from the main switch. Which of the following would he install to provide connectivity without using repeaters? CAT 6 CAT 5e Multimode fiber Coaxial

Multimode fiber

Many of your users have to spend a great deal of time on the Internet doing research. Your company deals with very sensitive data and fears hackers penetrating the network. Which of the following can you use so that only one IP address is exposed to the Internet? (Select two.) NAT IDS NESSUS DMZ NMAP

NAT DMZ

What protocol would a technician use to synchronize the local date and time of a client workstation to a server that is set up to provide accurate time? ARP NTP TFTP RTP

NTP

Which part of the IP address does the router use to determine where to send data packets? Subnet mask Network ID Host ID RIP

Network ID

You notice that there has been heavier traffic than usual this week. Network utilization has slowed down the network significantly. Which document would you refer to in order to see how the network normally operates? Syslog Network Monitoring Log Performance Monitor output Network Performance Baseline

Network Performance Baseline

Which elements would you expect in an acceptable-use policy? (Select three.) Network access Work completion timetable Equipment ownership Illegal use Change management procedures

Network access Equipment ownership Illegal use

Which OSI layer adds unique identifiers to the packets, enabling the packets to be routed to the correct system? Presentation layer Physical layer Session layer Transport layer Network layer Data Link layer

Network layer

Which OSI layer do routers function on? Presentation layer Network layer Physical layer Application layer Data Link layer Transport layer

Network layer

Steve in the shipping department reports that his office is having a hard time connecting to the Internet, but they are able to connect to the network. Which of the following pieces of documentation would be the most useful in figuring out his problem? (Select two.) Network maps Acceptable Use Policy Baselines Asset management Wire schemes

Network maps Wire schemes

There is a broadcast storm using much of the network bandwidth. Network technician Kelly needs to determine the MAC address of a device that is generating the storm. Which of the following tools will provide the needed information? Traffic shaping History logs Network sniffer Network maps

Network sniffer

Of the technologies listed, which would be the BEST when protecting your large corporate network from outside attacks? Network-based firewall Network-based IPS Online vulnerability scanner Host-based IDS

Network-based firewall

You are concerned with security at your company and want to implement a technology that requires no configuring on the user's side and will filter out specified port ranges. Which technology will enable this? Host-based IDS Host-based firewall Network-based firewall Network-based IDS

Network-based firewall

Ripley is a corporate network tech. She receives a report in the morning about Internet service being down at the site. Ripley got an e-mail yesterday that there was a water main break in front of the site, and repair work was going to be performed. On arrival at the site, she sees that there are workers performing repairs to the water system. She performs a test to make sure there are no internal network issues. The internal network is functional, but the laptop fails to connect to the Internet. Which of the following should be performed according to the network troubleshooting methodology? Verify the Internet is fully-restored and notify employees of the restoration. Notify employees of the outage and contact the service provider of the demarc. Question the employees of the severity of the Internet outages by e-mail. Ask the accounting department if all bills were paid to the Internet service provider.

Notify employees of the outage and contact the service provider of the demarc.

What Windows utility enables you to query information from the DNS server and change how your system uses DNS? Arp Nslookup Tracert Nbtstat

Nslookup

Which of the following are dynamic routing protocols? (Select two.) OSPF HTTP DNS RIP

OSPF RIP

SNMP uses management information bases (MIBs) to categorize the data that can be queried. What is used to uniquely number individual data pieces within a MIB? Object identifiers (OID) MIB Labeler SNMP Manager VLAN ID

Object identifiers (OID)

Everyone in a department is suddenly finding it difficult to connect to the WAP and the connection is slow for those who succeed. What are likely causes for these problems? (Select three.) Metal Studs Window Film Overlapping channels Device saturation Signal-to-noise ration

Overlapping channels Device saturation Signal-to-noise ratio

This authentication protocol is supported by most network operating systems, but is never used because it sends all passwords in clear text. MS-CHAP EAP PAP Kerberos

PAP

Why was PAP replaced by CHAP for PPP connections? CHAP is much faster than PAP. PAP sent the username and password in the clear. CHAP uses certificates while PAP did not. CHAP works with more than just TCP/IP.

PAP sent the username and password in the clear.

What kind of authentication method uses two keys to verify a sender's identity, a public key and a private key? Kerberos CHAP EAP PKI

PKI

Which of the following OSI layers converts the ones and zeros into the type of signals needed for the network cable, and then places these signals on the cable? Data Link layer Physical layer Session Layer Network layer Presentation Layer Transport layer

Physical layer

Starting with Layer 1 (Physical Layer), which answer lists the layers of the OSI 7-Layer model in the correct order? Physical, Network, Data Link, Transport, Session, Presentation, Application Physical, Transport, Network, Data Link, Presentation, Session, Application Physical, Transport, Data Link, Presentation, Session, Application, Network Physical, Data Link, Transport, Network, Presentation, Session, Application Physical, Data Link, Network, Transport, Session, Presentation, Application Application, Presentation, Session, Transport, Network, Data Link, Physical

Physical, Data Link, Network, Transport, Session, Presentation, Application

Which of the following are benefits of patch panels? (Select two.) Protects the horizontal cabling from over handling Protects the horizontal cabling from ESD Protects the hub from ESD Organizes the horizontal cabling

Protects the horizontal cabling from over handling Organizes the horizontal cabling

A __________ enables the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently, because the information can be downloaded once for use by multiple hosts. Proxy server NAT server DNS server SMTP server

Proxy server

Bullwinkle is trying to cut down on the amount of web traffic going between his network and the Internet, while still allowing all users to obtain the information they need. What might he use to accomplish this? Proxy server Gateway Bridge Router

Proxy server

This server acts as a go-between on Rocky's network, enabling the clients on his network to connect through it to access web pages instead of connecting to Web sites directly. WINS server Proxy server SMTP server DNS server

Proxy server

Which technology acts as a go-between to handle HTTP requests and responses for a network client? Proxy server DNS server Bandwidth shaper Load balancer

Proxy server

Which of the following would be considered firewall technology? (Select all that apply.) Dynamic routing Proxy server Network Address Translation (NAT) Port filtering Packet filtering

Proxy server Network Address Translation (NAT) Port filtering Packet filtering

Bob wants to setup a wireless network for his business. The network technician he has hired suggests that he utilizes the 802.1X standard for wireless authentication. Which of the following would he want the tech to setup? WEP TACACS+ RADIUS WPA2

RADIUS

Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a separate authentication server to gain access to the network. Which method would work BEST? RADIUS WEP2 Kerberos AES

RADIUS

Which of the following methods of authentication will also provide AAA and uses UDP? RADIUS RAS TACACS+ Kerberos

RADIUS

Which routing protocol allows a gateway host to send its entire routing table to the next closest host? IS-IS OSPF EIGRP RIP v2

RIP v2

Which of the following is NOT a coaxial cable connector? RJ-45 Barrel BNC F

RJ-45

Your network administrator has decided to remove WINS from the network and replace it with DNS. Your WINS server resolves requests to 20 address locations on your network segment. What's the BEST way to ensure that users can reach those addresses by host name automatically? Enter the three hostnames and addresses in the LMHOSTS file. Request that the hostnames and addresses be added into DNS. Add a WINS proxy to your network segment. Enter the three hostnames and addresses in the HOSTS files of the other systems on the network.

Request that the hostnames and addresses be added into DNS.

How can technician Sandy ensure that a particular IP address is not leased out from the active scope? Configure the DNS options Reservations Remove IP addresses from the active leases Lease times

Reservations

When data arrives at the entrance to a network, what device determines the next network point to send the data to? Hub NIC card Switch Router

Router

Which of the following network devices does NOT send data based only on the MAC Address? Unmanaged switch Router Managed switch Bridge

Router

Which of the following is the oldest routing protocol, rarely used anymore? Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Enhanced Interior Gateway Routing Protocol (EIGRP) Border Gateway Protocol (BGP)

Routing Information Protocol (RIP)

Of the following connectors, which two are used with fiber-optic cable? SC ST RJ-11 RJ-45 F-Type BNC

SC ST

Why is it important to isolate a SCADA or ICS system from the other corporate networks? Isolating the SCADA networks from other networks will prevent overload of network traffic. Data packets on a SCADA network are incompatible with data packets on traditional IT networks. SCADA traffic appears differently to loggers and analyzers than does traditional data traffic. SCADA networks should be isolated to reduce security threats to the production line.

SCADA networks should be isolated to reduce security threats to the production line.

You have 20 new employees that need e-mail accounts. Which of the following protocols do you need to set up the e-mail accounts? (Select two.) FTP SMTP SNMP POP3 ICMP

SMTP POP3

What protocol would enable Jill, the administrator of the Bayland Widget Corporation's network, to monitor her routers remotely? FTP DNS NFS SNMP

SNMP

Which of the following protocols is associated with monitoring devices on a network? RDP SMTP SNMP EIGRP

SNMP

Edward has read about secure polling of network devices and wants to implement this on his network. What protocol should he use? SNMPv2 IMAPv4 POPv3 SNMPv3

SNMPv3

Which of the following is good copper cabling for environments with heavy electrical interference? UTP Fiber-optic Wireless STP

STP

Which layer of the OSI seven-layer model keeps track of a system's connections in order to send the right response to the right computer? Data Link Layer Presentation layer Application layer Physical Layer Transport layer Session layer

Session layer

A new office's wireless network is causing interference with the medical office's wireless network located next door. Which of the following should be changed to BEST prevent the interference? MAC address filtering Signal strength WEP key WPA encryption

Signal strength

What can you change on your WAP to help limit war driving? Frequency Channel SSID Signal strength

Signal strength

Which of the following cable types has the LONGEST effective distance for a gigabit Ethernet connection? CAT 6a Multimode fiber Coaxial Single-mode fiber

Single-mode fiber

Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack? FTP bounce Man-in-the-middle DDoS Smurf

Smurf

An accountant for a large corporation receives a call from an individual claiming to be John, a network technician in HQ. John tells the accountant that they have been having some problems with the active directory for a few employees and her account is one of the accounts experiencing problems. John then asks for her username and password so that he can resolve the problem with the account. What is this scenario an example of? Remote exploitation Man-in-the-middle attack Smurf attack Social engineering

Social engineering

You have been asked to provide employee training to users to better protect the network and their accounts. Which topic would be the BEST one to focus on? Social engineering threats Malicious e-mails Knowing the network address Following company procedure

Social engineering threats

Your new firewall has just been installed on the corporate LAN. Based on the rules you've implemented, the firewall takes an incoming packet on port 25 and inspects the entire data packet, then allows the corresponding outgoing packet to pass through. What firewall technology best describes what is happening in this scenario? Stateful filtering Stateless filtering MAC filtering IDS

Stateful filtering

A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following? Content filtering Packet sniffing Stateful inspecting Packet filtering

Stateful inspecting

Which of the following routing methods is the most difficult to manage? Dynamic IP Protocols Static

Static

Which two of the following settings must be set correctly before a TCP/IP host can communicate with another host on the same network? (Select two.) Default Gateway DNS Server Subnet Mask IP address

Subnet Mask IP address

Which of the following multiport devices works at the Data Link Layer (Layer 2) and is responsible for filtering, forwarding, and sending frames? Repeater Server Hub Switch Router

Switch

Which of the following methods of authentication will also provide AAA and uses TCP? RADIUS NTP TACACS+ IPSec

TACACS+

Network technician Kyle is troubleshooting a connectivity problem with a new data circuit. Kyle confirms that the ST fiber jumper is good. Which of the following is the problem? TX/RX reversed Interference Cable length Bad connectors

TX/RX reversed

Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these? Native VLAN Default VLAN Untagged VLAN Tagged VLAN

Tagged VLAN

Given a network problem scenario, a technician should identify the problem, then establish a theory for the cause of the problem. What is the next logical troubleshooting step? Implement a solution with potential effects. Test the theory to determine the cause. Implement an action plan. Document the outcome.

Test the theory to determine the cause.

Connie has a typical home network that consists of a Linksys WRT54G wireless router and two systems: one is wirelessly connected, and the other is wired. The internal network ID is 192.168.16.0/24. Both systems can access the Internet. While trying to determine why she cannot access a known Web site, Connie decides to run a tracert. The tracert stops at a particular router: 14.21.343.6. She tries to ping the router but gets no response. Which of the following is the most likely problem? The WRT54G is not passing ping commands to the Internet. That router is down. The router isn't using OSPF Ping is not used on the Internet.

That router is down.

A large office has a group of 15 users. Some of the users complain of poor performance. After scanning the network's performance, the network engineer discovers that many of the computers show moderate to weak signals even though there are two APs less than 15 feet (4 meters) away in either direction. Which of the following is MOST likely the cause? There is an SSID mismatch. The closest APs are down. The receiver sensitivity is too high. The local antennas are not powerful enough.

The closest APs are down.

You have just installed a new router in your MDF and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network? The router forwards it. The router sends it back to its origin. The router records it for later analysis. The router discards it.

The router discards it.

How can a single NIC in a server transmit packets from multiple different source MAC addresses? The server contains several virtual machines and the MAC addresses are from the virtual machines. The server is hosting a Web server and the MAC addresses are from connected browsers. The server NIC is starting to fail and should be replaced. The server is hosting a proxy server and the MAC addresses are from the connected clients.

The server contains several virtual machines and the MAC addresses are from the virtual machines.

Indira, an administrator, just installed a new switch. She has connected two servers with IP addresses of 192.168.105.20 and 192.168.105.30. The servers are able to communicate with each other, but are unable to reach the Internet. Indira checks the switch configuration and sees the following information: - Interface: VLAN 105 - IP address: 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem? A routing loop has occurred. Jeff used a crossover cable to connect the switch to the gateway. The server is missing default gateway information. The subnet mask is incorrect.

The server is missing default gateway information.

You recently installed wireless network cards for laptop users. The help desk receives a call from a user who couldn't access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem? The user is using the wrong encryption key for remote access to the access point. The modem was unplugged. The CAT 5 cable may be defective. The user moved out of range of the access point.

The user moved out of range of the access point.

Your company has to move the heavily-used intranet Web server from one computer to a new, faster system. You make the changeover and send out an e-mail to let everyone know. You then start getting a number of e-mails back saying users cannot access the new Web site by DNS name, even though you updated the "A" record in the DNS server. What's the most likely problem? The users must manually query the DNS server. The users must update their DHCP settings. The DNS server hasn't broadcast the new DNA name yet. The users DNS cache still holds the old IP address to name association.

The users DNS cache still holds the old IP address to name association.

An organization upgrades its wireless security by switching from WPA encryption to WPA2. The organization sets the new encryption standard on all WAPs and gives the users new passwords. Most of its users can connect using the new authentication, but some users report that they cannot connect. Which of the following MOST likely causes this problem? The users who cannot connect have not been placed in the correct VLAN. The users who cannot connect are in areas without wireless coverage. The users who cannot connect have not specified the correct signal strength. The users who cannot connect are using older NICs without WPA2 support.

The users who cannot connect are using older NICs without WPA2 support.

A home user is experiencing performance issues with her wireless network. She has checked the following issues: - Checked to make sure the laptop is within the appropriate wireless network range - Checked the connected SSID and wireless channel - Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues? She has misconfigured the setting on the wireless client resulting in the WPA-TKIP password being incorrectly entered. Another computer is on the network and is downloading video content. This is overloading and flooding the wireless link. She has put in a static IP address on the wireless NIC, which is not within the appropriate home network IP range. There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.

There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.

The best (most secure) passwords have which of the following characteristics? (Select all that apply.) They should be based on personal information such as the names of spouses and pets. They should always include an exclamation point at the end. They should not be common words from the dictionary. They should include a combination of letters and numbers.

They should not be common words from the dictionary. They should include a combination of letters and numbers.

The process of arranging data into segments or datagrams occurs at which OSI model layer? Presentation Transport Network Datagram

Transport

Which layer of the OSI model ensures packets are delivered in sequence, error free, and without losses? Application Layer Network Layer Data Link Layer Transport Layer Presentation Layer Session Layer

Transport Layer

A rancher wants to use a wireless camera he has installed in his barn which is about 100 yards from his house. What kind of antennas should he use on the house and barn to get the best signal? MIMO antenna Unidirectional Omnidirectional antenna Pandirectional antenna

Unidirectional

What should you do after adding a new cable segment to a network? Update the network monitoring policies. Update the wiring schematics. Contact a supervisor. Create a new baseline document.

Update the wiring schematics.

You are working with your network administration team to create a new procedure for updating physical network diagrams. During the brainstorming session, your fellow teammates list the following ideas. Which of the these is the most appropriate for updating the diagrams? Update whenever new network equipment is installed or changed. Update before your network administrator runs an audit on the network infrastructure. Update after your network administrator runs an audit on the network infrastructure. Update after your HR department has hired new employees.

Update whenever new network equipment is installed or changed.

Shelly has several users that are complaining about someone tampering with their computers. She knows that their passwords are not very secure and are easy to guess. She explains the recommended password practices. Which of the following statements should she include in her recommendations? (Select three.) Use a family member's name as your password to make it easy to remember. Use a password length of at least 8 characters. Use a password with a combination of upper and lower case, numbers and special symbols. Change your password every 30 days at least. Write the password down and keep it somewhere safe.

Use a password length of at least 8 characters. Use a password with a combination of upper and lower case, numbers and special symbols. Change your password every 30 days at least.

Mike wants to connect two hubs. Which of the following will work? (Select two.) Use a crossover cable from an MDIX port to a normal port. Use a straight-through cable between two normal ports. Use a patch cable between two normal ports. Use a patch cable from an MDIX port to a normal port. Use a crossover cable between two normal ports.

Use a patch cable from an MDIX port to a normal port. Use a crossover cable between two normal ports.

Which of the following are security threat mitigation techniques? Setting a PPP authentication server using PAP Letting clients update their own virus definitions User training, updating policies and procedures Allowing unauthorized devices to connect to the LAN

User training, updating policies and procedures

A network administrator for a small Internet café has one switch, but wants the public computers to be separated from the back office machines. What feature would help her achieve her goal? VLAN PoE Port authentication IDS

VLAN

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue? Verify the subnet mask Verify VLAN assignment Verify that the switch has power Verify there is not a duplicate IP address

Verify that the switch has power

Jim is about to install a wireless network. A fellow network administrator warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers? WAP placement MAC address filtering Authentication method Encryption type

WAP placement

Which IEEE 802.11 encryption standard uses dynamic encryption key generation and offers much stronger security than its predecessor? WAP WEP Spread Spectrum WPA

WPA

A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, she notes that the laptop is trying to reconnect to the wireless network. Which of the following is a common wireless problem that can cause this issue? Weak signal strength Mismatched SSID Increased latency Incorrect encryption type

Weak signal strength

You work as an assistant network administrator for a medium sized company. You have been tasked with maintaining your company's configuration management documentation. When would it be a good time to make updates to your network maps? Before your network administration team runs an audit When a router has been moved to another location After 50 new employees have just been added to the Active Directory After your network administration teams runs an audit

When a router has been moved to another location

A chain-of-custody document includes what information? (Select three.) When was evidence taken into custody. To whom was evidence passed and when. What is/are the age(s) of the accused. What is/are name(s) of the accused. What was taken into custody.

When was evidence taken into custody. To whom was evidence passed and when. What was taken into custody.

Brienne, an administrator, attempts to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. She verified the IP settings as correct, but the two computers still cannot connect. Which of the following would MOST likely fix the connectivity problem? Configure the laptop to receive a DHCP address from the server, rather than manually setting one. Manually adjust the duplex mode on the server's link. Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.

Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables.

Extensible Authentication Protocol, or EAP is a type of authentication/security protocol used in _______ networks. Infrared Windows Kerberos Wireless

Wireless

A network technician is trying to determine which TIA/EIA standard is being used for his MDF's patch panels. Where should he look to find this information? Network Map Asset Management Baselines Wiring schemes

Wiring schemes

Cassius Smith is complaining about someone getting into his system. As the network administrator, you tell Cassius Smith to set his password to "something secure." Which of the following would be the most secure password for Cassius? cassiussmith csmith cassius cs654soup

cs654soup

Network technician John Watson, needs to check if the domain name resolution system is functioning properly. Which of the following software tools would he use to accomplish this? (Select TWO). netstat dig route nslookup arp

dig nslookup

A NIC creates _____________ in the data link layer. layers packets frames segments

frames

A network administrator, is having intermittently lost connections with a local Linux server. She decides to check the IP address on the server to see if it conflicts with any other IP addresses on the network. Which of the following commands should Lisa use? ipconfig traceroute ifconfig tracert

ifconfig

What Linux command is used to check or change the IP address settings of a network-interface card? ipconfig traceroute ifconfig ping

ifconfig

While working on your LAN, you notice that you cannot access your file server. Which of the following utilities would you use FIRST to troubleshoot the problem? nslookup netstat ipconfig tracert

ipconfig

User Leia is trying to map a drive to a known NetBIOS share, but is unsuccessful. She pings the server that holds the share and gets a quick response. Which tool should she use to check if NetBIOS is enabled? arp nbtstat netstat nslookup

nbtstat

If you run "route print" at a Windows command prompt, you will get this output: Route Table =========================================================================== Interface List 0x1 ........................... MS TCP Loopback interface 0x10003 ...00 11 d8 30 16 c0 ...... NVIDIA nForce Networking Controller - Virt l Machine Network Services Driver =========================================================================== =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 10.12.14.1 10.12.14.101 1 10.12.14.0 255.255.255.0 10.12.14.101 10.12.14.101 1 10.12.14.101 255.255.255.255 127.0.0.1 127.0.0.1 1 10.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.0.0 255.255.0.0 10.12.14.101 10.12.14.101 30 224.0.0.0 240.0.0.0 10.12.14.101 10.12.14.101 1 255.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 Default Gateway: 10.12.14.1 =========================================================================== Persistent Routes: None What other command will give you the exact same output? netstat -p netstat -r netstat -n netstat -a

netstat -r

Which of following types of cabling would be best to use near ventilation ducts to reduce toxic gases during a fire? smart jack plenum single-mode polyvinyl chloride

plenum

Users who are retrieving information from a company server on the network are experiencing slow access times. Which tool would provide access time information on each segment of the network to reach the server? arp route tracert ipconfig

tracert


Related study sets

Security+ Assessment Exam 2 (DG)

View Set

FEMA IS-0700.b: An introduction to NIMS

View Set

Interactions Between Humans and the Environment 8.3

View Set

California Real Estate Principles - Chapter 5 - Encumbrances

View Set

IT 150: Pneumatic Actuators and Control Valves

View Set

Trends in 21st Century - Long Quiz

View Set

Social media marketing hub spot exam

View Set