Net+ Exam Cram

Ace your homework & exams now with Quizwiz!

A network administrator performs a site survey to determine the optimal position for an access point (AP). The AP must be able to reach the manager's office in the far corner of the office floor. Which of the following should the network administrator consider when selecting a wireless router that can reach all users in the office and is compatible with most wireless devices? (Select all that apply)

2.4 Ghz frequency band 5.0 Ghz frequency band Omnidirectional antennas

A small startup that provides online gaming services is developing a disaster recovery plan. It includes a recovery site and protocols for setting up the recovery site. Setting up the recovery site involves a contract with a similar sized company to assist funding the lease and setup of spare hardware in the event of failover of either company. What is this agreement called?

A reciprocal arrangement

A security specialist wants to enhance the physical and network security of a company, but detection-based security controls are failing. If the infrastructure is already in place, what is a relatively inexpensive detection-based control and quite effective deterrent that can improve the resilience of the perimeter gateway?

A video surveillance camera

In terms of radio wave signals, which term describes the impact of thick walls and ceilings?

Absorption

The administrator of a small but fast-growing company sets out to develop a privileged user agreement (PUA) to ensure correct classification of network resources and information assets and that the correct staff member handles them. Which of the following scenarios demonstrates proper behavior according to common rules that might be found in a PUA. (Select all that apply)

An employee is forced to take mandatory vacation time. A privileged user utilizes network resources to perform the job function.

A user calls to report that email is not working and that there is a printer jam. Which troubleshooting approach is best?

Approach multiple problems individually.

An IT engineer uses the Nmap utility to document a network. The documentation will then help the engineer plan network improvements. Which of the following describes the use of Nmap for this purpose?

Systems hardening

Mobile users in an organization complain about limited functionality in a company's headquarters. The IT staff decide to extend mobile access capabilities by widening the current wireless network. When evaluating the expansion configuration, a wireless access point media access control (MAC) address relates to which option?

Basic Service Set Identifier (BSSID)

Which of the following describes how all hosts, within the boundaries established by routers at the OSI Network layer, receive the same broadcast packets?

Broadcast domains

A college is upgrading their high-speed network infrastructure to support direct-connect Internet in all student buildings and dormitories. The network will connect to high-performing school servers that will provide computer lab environments for classes. What type of network is the school continuing to maintain?

CAN

A network administrator is setting up new address pools on a Dynamic Host Configuration Protocol (DHCP) server and is having difficulty remembering available Internet Protocol (IP) addresses. Which of the following would make the management of allocated IP addresses on the network easier?

CSU/DSU

Which of the following would be found only in a Physical Network Diagram?

Cable Links

An engineer hires an electrician to wire a building. The engineer requests that the electrician use 1000BASE-T media. Evaluate the different unshielded twisted pair (UTP) cable choices and conclude which media would satisfy the request? (Select all that apply)

Cat 6 Cat 5e

A wireless engineer implements a new Wi-Fi network organization. The engineer carefully planned the deployment of access points (APs) to maintain a configuration spacing of 25 MHz. Consider the given wireless network symptoms and determine which relates to the configured value.

Channel overlap

A company has an Active Directory domain called specks.com. The company has an on-demand subscription for cloud services and wants to ensure their internal applications are accessible to their remote employees via their Fully Qualified Domain Names (FQDNs) in the cloud. The company will control all these services and applications. Which of the following will the company most likely be using throughout their organization? (Select all that apply)

Cloud-hosted DNS server Internal DNS server

A company is growing and needs to update their physical security policies and procedures. Which of the following, if implemented, helps make it obvious to security guards which zones users can access?

Color-coding badges

A systems administrator wants to put in place a procedure for patch management on a Cisco network switch. Which of the following should the administrator perform before flashing the chip? (Select all that apply)

Complete environment and compatibility checks. Make a backup of the system configuration.

In terms of Configuration Management, what are assets stored in a Configuration Management Database called?

Configuration Item (CI)

On the multi-floor office, the staff is deploying multiple switches and there must be multiple broadcast domains. The Layer 2 switch with a single broadcast domain requires more bandwidth as more hosts are connecting to it. How can these switches be set up to accommodate the network architecture?

Configure multiple VLANs.

An IT engineer configures connectivity between network devices. During the process, the engineer uses RJ-45 connectors and an entire spool of Cat 7 cable. Considering how to achieve connectivity, which of the following tools should the engineer utilize?

Crimper Cable tester

A misconfigured firewall is not accessible via a traditional web-based interface. To gain access, an engineer needs to use a serial cable directly connected to the firewall by using a com port on a PC. Which of the following is the connector type the engineer will need to connect to the PC?

DB9

A group of hackers used Trojan backdoor malware to compromise thousands of zombie agent PCs with bot tools to create a botnet. This caused services on internet hosts to fail and become unavailable to legitimate users. Which of the following describes this kind of attack?

DDoS (Distributed Denial of Service)

A network administrator is designing a set of Internet Protocol (IP) addresses for a Class C network in order to lease it out to clients when booting. A set of printers will require the same IP address upon renewing the lease. Which of the following network components will support this design?

DHCP IP reservation

An organization has a remote office that uses higher frequencies available in a copper telephone line as a data communications channel to connect to the main office. Which physical technology does the remote office utilize?

DSL

A machine learning cloud application provides meaningful data with the company's local customer information and purchase history. The company considers this data sensitive. How should the company manage this data when interfacing with the cloud service?

Data remains on local storage.

A security engineer wants to research and investigate malware threats, software exploits, and spammers' abuse of open relay mail systems on the corporate network. Which of the following can help the organization to improve its security systems in this way?

Deploy a honeynet

When following standard troubleshooting guidelines, an IT support technician asks a user "Did it ever work?" and "When did it last work?" These questions help with which of the following troubleshooting approaches?

Determine if anything has changed.

The network security team of a company wants to reduce the system attack surface to limit the ways an attacker can connect to the network. How can the team achieve this to harden the network? (Select all that apply)

Disable unused IP ports Close unused device ports

When an internet customer wants to set up a small office/home office (SOHO) network, what are the main concerns with using a Pre-Shared Key (PSK) wireless local area network (WLAN) authentication to encrypt communications? (Select all that apply)

Distribution of the key or passphrase cannot be secured. A Pre-Shared Key (PSK) fails to provide accounting. Periodically changing the key is difficult.

When identifying a network problem which of the following would help pinpoint or isolate the actual issue a user, system, or organization may be experiencing? (Select all that apply)

Duplicate the problem. Question users.

Multiple routers are setup in the company's internal network. Offices in the building should be able to communicate with each other in a robust network architecture. The network should require minimum maintenance for the time being. Which of the following network types would provide such a network? (Select all that apply)

Dynamic routing table Packet-switched network

A network engineer needs to integrate the corporate wireless local area network (WLAN) with the wired local area network (LAN) authentication scheme, but wants both the client and server to use public key certificates. Which of the following is an authentication protocol that would allow this type of mutual authentication?

Extensible Authentication Protocol Transport Layer Security (EAP-TLS)

In Linux terminal, what does the "-e" in the command netstat -a -i -e represent?

Extra information

A technician tries the suggested troubleshooting steps to remedy a computer issue. The steps do not fix the problem. Additional suggestions are at a support website that discuss a different cause and potential fix for the problem. What troubleshooting path should the technician follow?

If the theory is not confirmed, reestablish a new theory or escalate.

A temporary 2.4 gigahertz wireless access point (WAP) is in the center of the office to carry out a site survey. This set up will allow administrators to plan for a wireless network to connect employees' laptops and smart phones for basic email. What type of information will the site survey provide? (Select all that apply)

Heat map Sources of interference

A junior engineer new to virtualization needs to set up a virtualized environment for product testing. When implementing such an environment, what does the engineer configure first?

Hypervisor

An administrator normally working on a remote server using Remote Desktop Protocol (RDP), loses the session abruptly. The administrator pings the server and does not receive a reply. An RDP session is attempted again, and the administrator can log in. Why was the administrator unable to ping the server?

ICMP traffic was blocked.

A network administrator wants a network switch to perform authentication of attached devices before activating their port on the switch. Which of the following is a means of ensuring only valid hosts are connecting to a network?

IEEE 802.1X

A company technical support representative troubleshoots a wireless network. Users state that the wireless signal barely spans across a large auditorium. According to the owner's manual, the signal should go beyond the current space. Which of the following wireless properties is likely causing the signal problem?

Incorrect antenna placement

A network administrator implements a storage area network (SAN) in a data center. The selected technology to create the links will use Host Channel Adapters (HCA) and Target Channel Adapters (TCA). Which does the admin implement?

Infiniband

Cloud offerings, such as Amazon's Elastic Compute Cloud and Microsoft's Azure Virtual Machines, are examples of what type of service?

Infrastructure

A company is considering using a co-location connection with a cloud service provider to support some virtual services in its data center. This will provide the company a hybrid cloud model to easily move services from the local infrastructure to the cloud during peak season. Which of the following network components are most likely required for hybrid solution? (Select all that apply)

MPLS Private link VLAN

How can deploying a honeypot or honeynet within a demilitarized zone (DMZ) help an organization improve its security systems? (Select all that apply)

It provides an early warning of an attacker. It provides evidence of penetration to a security zone. It provides detection of internal fraud.

Which of the following is an advantage of an incremental backup method?

It takes less time to back up with an incremental backup, but several archive sets may need to be restored before the system is operational.

A large university campus experiences communication problems between two buildings over a fiber connection. A cabling engineer uses a optical time domain reflectometer to troubleshoot the problem. For wich purpose does the engineer use this piece of equipment?

Location of a line break

An attacker used a malicious host with a spoofed physical address to perform cache poisoning and perpetuate a Man-in-the-Middle attack. Which of the following can prevent these types of attacks? (Select all that apply)

Media Access Control (MAC) filtering Address Resolution Protocol (ARP) inspection

A disgruntled system administrator left a malicious file on the company computer that will execute if anyone disables their user account. Knowing that anti-virus software is unlikely to detect it, what type of malicious program does this describe?

Logic bomb

A university has numerous locations within a city. IT engineers propose an E-LAN implementation to connect the locations. Which overall approach do the engineers use?

Metropolitan Ethernet

An IT systems engineer considers virtualizing a server farm. Which of the following satisfy the use of a type I hypervisor? (Select all that apply):

Microsoft Hyper-V VMWare ESX Server

A network administrator is working directly with programmers on an IoT project in a manufacturing setting. The project involves IoT modules that communicate with a Linux server and pass messages regarding the status of the machinery that the modules connect to. The programmers require the administrator's assistance reviewing the network performance baselines during the testing process. Which of the following would NOT be a tool or method the administrator would be likely to use to review baselines?

On the server CLI, use the top command in the terminal to view server CPU utilization of all processes.

A network administrator must open ports on the network firewall to test for peer-to-peer Voice over Internet Protocol (VoIP) communication. The following week, the administrator must also install MCU-based VoIP communication hardware. How can the network administrator do all the work required for both setups? (Select all that apply)

Open TCP port 5060. Open TCP port 1720.

A user requires a dial-up connection to an Internet service provider for remote access. The connection uses a data link protocol over a broadband connection. An IT support technician evaluates the configuration options on the user's laptop. Which of the following will provide successful connectivity?

PPPoE

IT engineers troubleshoot a problematic layer 2 network device by monitoring dynamic host configuration protocol (DHCP) traffic. Considering the troubleshooting approach, which technology should the engineers utilize?

Packet sniffer

An attacker exploited a vulnerability within the operating system of a computer inside a bank's network. Although the attacker posed no serious threat, the network administrator wants to start taking security more seriously. Which of the following is important for the network administrator to implement to mitigate against these types of vulnerabilities? (Select all that apply)

Patch management Vulnerability scanning

Which of the following are characteristics of cloud services as opposed to local services? (Select all that apply)

Pay-per-use Rapid elasticity

An attacker spoofed a banking website and then emailed users of the genuine website informing them that their password must be updated. Users then authenticated to the spoofed site, and the attacker captured the user's logon credentials and installed malicious software on their computers. From this malicious activity, the attacker created a peer-to-peer botnet control network, where the software and control mechanisms update to evade detection and removal. Which type of attack did the users fall victim to?

Phishing

The ANSI/TIA/EIA 606 Administration Standard for Commercial Telecommunications Infrastructure sets out a basic scheme for documenting a typical office network installation. For example, HB01-03B-D02 could refer to a cable terminating at Main Hospital Building (HB01), telecommunications space B on floor 3 (03A), data port 2 (D02). Which of the following is this an example of?

Port naming convention

A new network administrator is going through the company's network and surveying current network configurations. After examining a few hosts, the general Internet Protocol (IP) scheme starts with the first octet at 10 and all are using a default mask of 255.0.0.0. Which of the following would be true for this network? (Select all that apply)

Private IP addressing Class A network

Which of the following terms relates to the bending of radio waves?

Refraction

A network administrator is creating documentation to accompany the restrictions for a remote access server. Which of the following is NOT a typical policy restriction the network admin should include in the documentation?

Restriction of user access to software updates

A network running critical services for a hospital begins having severe performance issues immediately after an update of the server OS. This is severely affecting network services. What should be the first response to this situation?

Rollback the OS to the previous version.

A company wants to leverage block level storage with jumbo frame packets. The storage must be accessible remotely and isolated only to the servers. Which type of network topology is most appropriate for this setup?

SAN

A new hire in a technology firm must connect to the company VPN in order to do work while at home or traveling. The application used utilizes OpenVPN to establish a client-to-site VPN by tunneling Point-to-Point Protocol (PPP) layer 2 frames through an encrypted tunnel. Predict the type of VPN protocol used in this scenario.

SSL\TLS VPN

Which twisted cable type uses a foil screen in an effort to reduce crosstalk?

STP

A small business wants to make its website public. Two physical servers that host the website have load balancing configured. Each server has its own Internet Protocol (IP) address. Having only one public IP address from the Internet Service Provider (ISP), what may a network administrator set up so the company's website can interface with public users?

Set up Port Address Translation (PAT).

A network administrator wants to deploy an intrusion detection system. Which of the following authentication factors incorporates biometric recognition that uses a template which is created by analyzing behavior?

Something you do

When troubleshooting a network connectivity issue, which of the following is the easiest to identify?

Status indicators

Users at an organization are not able to access certain internal network resources. The organization practices a high level of security between different departments. After evaluating the situation, a junior level engineer determines that hardware addresses are blocked on the network. Based on the findings, which device type is causing the problem?

Switch

A network administrator wants to implement authentication of administrative access to routers and switches. Which of the following is a reliable protocol that can achieve this, as well as detect when a server is down and encrypt all the payload in packets?

TACACS+ (Terminal Access Controller Access Control System Plus)

A network engineer plans a storage area network (SAN) installation that will utilize Fibre Channel switched fabric (FC-SW). Which components will the engineer configure to implement the SAN's functionality? (Select all that apply)

Target Initiator

A user filed a complaint with their company's helpdesk support team about threatening pop-up messages. The messages say the user's files are encrypted due to terroristic activity, and that the data will stay encrypted until bitcoin is paid. Which of the following most likely happened to the user's computer? (Select all that apply)

The computer is infected with ransomware. The computer is infected with crypto-malware.

A network administrator is working with the in-addr.arpa domain of the company's Domain Name System (DNS) server. The admin creates a pointer (PTR) record for a server's Internet Protocol (IP) address 10.60.100.21. Which of the following Enterprise network components is the administrator working with?

The reverse lookup zone

A network consultant is doing IT contingency planning and is trying to identify likely points of failure for the network. Which of the following would the consultant identify as Single Points of Failure in need of upgrades for added redundancy? (Select all that apply)

There is a lack of a load balancing device. There is a single power supply for a critical server.

An engineer experiences no connection after configuring a new fiber link between two buildings. Which of the following does the engineer find to be the cause?

Transceiver mismatch

A cable installation tech runs fiber cable for a new network install. When finishing the ferrule tip which holds the glass strand, which option does the tech implement to ensure the highest quality is achieved?

UPC

A user receives a security warning when visiting a website. IT investigates and discovers which of the following as a problem?

Untrusted SSL (Secure Sockets Layer) certificate

Identify which strategy will NOT create redundancy for an entire network.

Utilize NIC teaming to bond cable links at the host end.

A network expert reconfigures a trunk on a network to resolve a mismatch issue. Which of the following technologies benefits from the reconfiguration?

VLAN (Virtual Local Area Network)

A user mentions that a Voice Over Internet Protocol (VOIP) phone is not working. An IT engineer tests and verifies that the phone's physical connection is working properly. Considering the engineer's findings, which of the following possible problems is causing the phone to not work?

VLAN mismatch

In a virtualized environment, what functions as a layer 2 device to connect multiple virtual machines to a physical network?

Virtual switch

A small business had a power failure. During recovery, systems testing began. Results indicated that internal voice calls worked properly. However, incoming and outgoing external calls did not work. Considering the components and functionality, which of the following is problematic?

VoIP gateway

A network technician is setting up network devices at a remote branch office. A small switch in the corner of the office connects the various workstations using category 6 Ethernet cables. A wireless access point in the center of the office connects company iPads. Some workstations are given wireless Network Interface Cards (NICs) because they are harder to reach. Which of the following devices in this scenario are layer 2 devices? (Select all that apply)

Wireless Access Point Wireless NICs Network Switch

What type of diagram would be of use when terminating twisted pairs in an RJ-45 or RJ-48C jack?

Wiring Diagram

Configuration Management Systems (CMS) distinguish between two basic types of procedural documentation. Which type of documentation describes step-by-step instructions for a specific task using specific technologies, products or credentials?

Work instruction

IT security specialists respond to a security breach. An investigation determines that open service ports on an old server was the entry point for malicious activity. Which of the following utilities should the specialists use to determine the cause of the breach?

netstat

Generate a command on a Windows command prompt to display all port connections along with the process name that has opened each port and also shows per-protocol statistics.

netstat -a -b -s


Related study sets

Biology Chapter 1 Review Questions

View Set

Sherpath- Congenital heart disease

View Set

Sociology Exam Review: Questions

View Set

OES-4015- TEST 2 - Multiple Choice/ Fill in Blank/ True-False.

View Set

Chapter 2: Demand: Thinking Like a Buyer

View Set

Ch. 21 Blood Vessels and Circulation AP2

View Set