Network + FInal Exam Practice test Certmaster

Ace your homework & exams now with Quizwiz!

What step of the CompTIA Network+ troubleshooting methodology involves gathering information and identifying symptoms?

1

What step of the CompTIA Network+ troubleshooting methodology refers to identifying the problem?

1

A network technician is NAT'ing and supernetting a Class B private address for their network. Which range should they use?

172.16.0.0 to 172.31.255.255

What layer of the Open Systems Interconnection (OSI) model does a router switch in?

2

What step of the CompTIA Network+ troubleshooting methodology involves confirming a theory and determining the next steps to resolve a problem?

3

A security engineer is setting up anomaly detection for suspiciously large file transfers. Which of the following ports should they set up their alert for?

445 SMB is more typically run directly over TCP port 445. SMB should be restricted to use only on local networks. It is also important that any traffic on the NetBIOS port ranges from 137 to 139.

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.)

AES , and Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A network engineer attempts to determine if they are permitted or prohibited from installing nonstore apps onto a company device. Additionally, the engineer wants to understand if rooting/jailbreaking is permitted. What policy would the network engineer review?

Acceptable Use Policy

An IT security employee discovered a rogue access point (AP) and traced the activity to a smartphone tethered to a workstation on the corporate network. What would this type of attack allow a malicious user to do? (Select all that apply.)

Allow access to private information Capture user logon attempts Perform on-path attacks

A network technician is implementing a software-defined network. Which of the following layers would apply business logic to make decisions about how traffic should be prioritized?

Application

A company named Specks has solicited the use of cloud services and has chosen a Platform as a Service (PaaS) product from Oracle with an Oracle Database. The company will use this platform to build custom applications on thin clients inbased in the cloud. Which of the following is true?

Application Security Handled by specks

A network engineer reviews a report that makes recommendations where the network is not meeting goals for performance or security. What is the name of this report?

Audit and Assessment Report

A company has recently decided to allow employees to use their smartphones for work-related matters. A network specialist creates and disseminates a policy surrounding this decision. What is the name of this policy?

BYOD policy

A tech team provides a network technician with a faulty device. They want a new one with the same parameters as the failed device. What should the parameters on the new device be?

Baseline Configuration

A network engineer conducts a redundancy check and identifies that interference exists due to a poor-quality cable. What is this finding called?

CRC error

An IT engineer works with desktop installation technicians who deploy new computers to users. The installation technicians report that users in one area of the building do not achieve network speeds above 100 Mbps. After evaluating the cabling choices, the IT engineer determines that the problem area uses which type of cabling?

Cat 5 Cat 5 cabling supports a maximum speed of 100 Mbps.

A network administrator wants to protect the hosts and network infrastructure against attacks through an in-depth defensive strategy. Which of the following deploys systems in a secure configuration to harden the devices on the network and reduce the attack surface of service vulnerabilities that an attacker could exploit? (Select all that apply.)

Change default system credentials. Disable unnecessary network protocols.

A network technician is tasked with determining the site technological capabilities of each building in the organization. When looking at the current building, the technician confirms that the building is currently empty but has the approved equipment install permits on site. What type of site is this?

Cold Site

A data center architect is looking at access types and wants something that is cost-effective. They are a smaller company so they are willing to take some risks to have a lower cost. What would a good solution for them be?

Colocation

A school with no resources stages an enterprise mobility management solution for their planned "Bring Your Own Device" (BYOD) program. A network analyst will caution them about obstacles they will need to mitigate as a successful part of this rollout. What are the obstacles? (Select all that apply.)

Compatibility Security

A network engineer must build out a server application for the businesses' mail server. The engineer determines each component that is needed and how they will function holistically. What is the name of the process that the engineer is using?

Configuration - Configuration is the display or setup method selected to support a particular application role (web server, mail server, file/print server, and so on.)

Networks are vulnerable to several types of malicious attacks, and network engineers must prevent such attacks by various means. One means of protection available prevents denial of service (DOS) against a route processor over control or management plane protocols and packets. What answer choice describes this security method?

Control plane policing

A network technician is looking at a networking device with RJ-11 plugs. Which of the following devices is it most likely?

DSL Modem

After setting up an evil twin, the attacker could sniff information about the authentication process. Users tried to reconnect to a wireless network and unknowingly connected to the rogue access point (AP). What type of attack did the hacker most likely use to get the user to connect to the rogue AP?

Deauthentication An evil twin may be coupled with a deauthentication attack. This sends a stream of spoofed management frames to disconnect clients from the legitimate AP and inadvertently connect back to the rogue AP. The attacker can then sniff information about the authentication process.

A user submitted a ticket saying they only have 1 bar of signal at their desk. What issue is the user having in regards to wireless access?

Distance

Which technology offers a mode for simultaneous two-way communication?

Duplex

Two Windows hosts connected to a switch are contending to respond to ARP (Address Resolution Protocol) queries. Only one of the hosts is receiving network traffic. Determine the most likely cause of this issue.

Duplicate Mac Address

A network specialist installs a feature that presents a host from an untrusted port from flooding the segment with gratuitous replies. What is the name of this feature?

Dynamic ARP inspection

A network technician is probing the organization's network, procedure, and firewalls for areas of weakness. What will a threat actor do if the weakness is discovered?

Exploits

A network administrator needs to upgrade a switch firmware remotely. The firmware bits must be transferred over the local area network (LAN) with or without encryption. Which of the following options is connection-oriented and guarantees delivery in this manner? (Select all that apply.)

FTP, SFTP FTP (File Transfer Protocol) is a connection-oriented protocol. It uses Transmission Control Protocol (TCP) port 20 for data connection and TCP port 21 as a control port. TCP provides a connection-oriented, guaranteed method of communication.

A network technician has been tasked with finding a solution where a leased fiber link is terminated at a demarc. Which of these solutions would accomplish that?

FTTP - The most expensive solution is Fiber to the Premises (FTTP). The essential point about both these implementations is that the fiber link is terminated at the demarc.

Upon reviewing legislation, a network engineer must look for methods of detecting and suppressing fires. As part of the policy, the engineers add what system to the organization's safety plan to cover this federal mandate?

Fire Suppression

A network consultant wants to install software to protect the company infrastructure from outside influence. What can the consultant use to block unwanted/unauthorized access?

Firewall - The primary function of a firewall is traffic filtering. The firewall processes traffic according to rules; traffic that does not conform to a rule that allows it access is blocked.

A server technician has removed a server blade from its rack for cleaning. The technician sees corrosion on one of the circuit boards and notices some water on the bottom of the casing. What hazards could have affected this server? (Select all that apply.)

Flooding Humidity

A network technician is looking at a switch that temporarily pauses traffic to avoid overwhelming its buffer and causing it to drop frames. What is this most likely?

Flow Control

A network engineer is looking to join two strands of fiber cabling with minimal signal loss. What tool would best allow for this action to be completed?

Fusion Splicer

Which of the following relates to a private cloud delivery model?

Greater control

The CIO asks an IT systems administrator to configure a passive threat management solution. IT utilizes which type of technology?

IDS

A cyber security technician is observing a DOS attack on the organization's network. The technician can not determine anything surrounding the attacker's identity but does notice that no data traffic is being returned to the attacker. What type of attack is this?

IP Spoofing

There are two ways a network administrator can manage network appliances on the network. One of the options is more secure and requires him to physically go to the device and connect to it with a console cable. The second option allows him to manage the appliance remotely but is less secure and will only work if the network is up. What are the two management options described here?

In-band vs. out-of-band management

A disgruntled employee used a shared login to access an organization's customer relationship management system and delete customer information. How will the organization react?

Incident response plan

A network engineer received a ticket that people cannot connect to the printer. After researching the issue, the printer is property wired, as are the workstations. However, the network was misconfigured, leading to the printer being tagged incorrectly. What is the most likely cause of the issue?

Incorrect VLAN

When an ethernet cat-5 or cat-6 cable has individual wires crimped to the wrong spot, what is the term for this?

Incorrect pinout

A network engineer is looking to support the local area network by implementing a payload that can manage up to 9,000 bytes. What could the engineer use to meet this byte requirement?

Jumbo Frames

A network consultant reviews protocols to determine if bonded links between the switch ports and the end system were auto negotiated? What is the name of this protocol?

LACP - Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

A network engineer is designing a network in various offices to create multiple broadcast domains. Each has its own Virtual Local Area Network (VLAN). When configuring these multiple broadcast domains on the switch, the switch will be operating at what layer of the OSI model?

Layer 3

An office workstation receives an Internet Protocol version 4 (IPv4) address from a Dynamic Host Configuration Protocol (DHCP) server. The IP lease includes the default gateway address which is the address of the office's layer 3 switch. A network administrator confirmed network connectivity by pinging the gateway. At what layer of the Open Systems Interconnection (OSI) are these two devices communicating with each other when using the ping command?

Layer 3 Network

Which of the following solutions is designed to switch traffic to an alternative processing node?

Load balancer

A network port does not seem to be working properly. Which of the following tools can be used to test if the the port is sending out data?

Loop Back Plug

A system has a network of Graphic Processing Units (GPUs) computing nodes organized into a cluster for statistical analysis. During installation, the service providers installing the nodes are negotiating a Service Level Agreement (SLA) with management. The team establishes baselines and calculates Key Performance Metrics (KPI) by using the calculation (48 hours * 64 nodes)/2 failures, to determine one of the metrics. Select which KPI the service providers calculated.

MTBF Mean Time Between Failures (MTBF) is a measurement that represents the expected lifetime of a particular product or network asset.

An engineer needs to connect a fiber connection to a network that uses category 5 twisted pair cabling. Which of the following solutions will connect the two at the physical layer of the OSI reference model?

Media converter

An engineer uses a type of network adapter to connect a fiber link to a router. The transceiver fits into an optical interface on a layer 3 Ethernet router. Of the choices, which layer 1 implementation does the engineer utilize?

Media converter

A company plans a network run to a warehouse behind its main office building. The distance is short and to save money, the IT engineer suggests using a specific type of fiber cabling. Which type does the engineer recommend implementing, based on the given criteria?

Multimode

Engineers survey a newly acquired set of buildings as part of an organizational acquisition. The facilities are a few hundred yards from one another. On-site IT staff state a fiber connection between the buildings, but it has been very unreliable and often does not work. Evaluate the given options. What will the engineers conclude to be the problem?

Multimode fiber

An engineer is working on upgrading an aging network within the office. Most of the network cabling was installed nearly 20 years ago. The network runs into issues where users cannot efficiently access their emails, shared drives, and the internet. What is the aging network contributing to?

Network Performance issues

A network architect reviews the statistics associated with a device in the Management Information Base and reviews each of the stored parameters. What are the individual numeric parameters named?

OIDs This agent maintains a database called a Management Information Base (MIB) that holds statistics relating to the device's activity, such as the number of frames per second handled by a switch. Each parameter stored in a MIB is referred to by a numeric Object Identifier (OID). Tree structures store OIDs. Encapsulation is the frame format expected on the interface.

A network engineer wants to install an antenna that could receive and send data from all directions. What type of directional antenna would the network technician use?

Omni

A sysadmin set up a new office with wireless access points. The area showed that most wireless connections were using channel 7, so the sysadmin chose channel 1. What was the sysadmin trying to prevent?

Overlap

A wiring professional finishes wiring a building with twisted pair cabling for a new Ethernet network. Where do the wires running throughout the building centrally terminate?

Patch Panel

Network administrators are concerned that social engineering tactics may allow external threat actors to retrieve confidential user information to access the network. When combined with spoofing techniques, what type of attack can persuade or trick users into interacting with a malicious resource disguised as a trusted one?

Phishing

A technician is setting up an IP camera that is operating off the 802.3at standard. Which of the following should they set up for the camera?

PoE+

A network contractor is conducting maintenance on the switches in the server room. To expedite time, the contractor copies ingress and egress communications from two switch ports to other ports. What is this considered?

Port Mirroring

A cyber consultant examines the security of the control room and evaluates the organization's maturing level and its use of security policy and controls. What is the name of this assessment?

Posture assessment

What allows fine-grained control over traffic parameters?

Quality of Service (QoS) Quality of Service (QoS) allows fine-grained control over traffic parameters. Protocols, such as Multiprotocol Label Switching (MPLS), provides QoS. MPLS can reserve the required bandwidth and pre-determine statistics when configuring the link.

A network specialist wants to use a widely accepted dial-in user service that allows access over switches, wireless networks, and virtual private networks. What dial-in user service would meet the needs of the specialist and organization?

RADIUS

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) both utilize which of the following encryption ciphers?

RC4 - WEP's encryption system (based on the RC4 encryption cipher) is flawed. Version 1 of WPA still uses the RC4 cipher, but it adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger. AES replaced RC4.

A user filed a complaint with their company's helpdesk support team about threatening pop-up messages. The messages say the user's files are encrypted due to terroristic activity and that the data will stay encrypted until paid in bitcoin. What type of attack is the user most likely witnessing?

Ransome Ware

A user logged on to a desktop client and was immediately prompted to enter credit card information to proceed. What type of attack is the user witnessing on screen?

Ransomware

Which device type does an IT systems engineer install to control logical network traffic?

Router

A security admin has been tasked to audit a new web server on the network. The admin's task is to ensure the server does not have any unecessary open ports or services running on it. Deduce the best course of action for checking the server if the admin knows the Internet Protocol (IP) address of the server.

Run the nmap utility from a laptop

A security auditor has gathered many logs from the core router and sees many dropped packets at random intervals. The auditor has collected enough data to report an ongoing security breach attempt. What type of malformed packets are likely being dropped but not alerting the network team? (Select all that apply.)

Runts Giants

Which of the following can you use to remotely manage network systems or devices without a graphical user interface (GUI)? (Select all that apply.)

SSH Telnet

Which twisted cable type uses a foil screen in an effort to reduce crosstalk?

STP Shielded twisted pair cabling is a type of twisted pair cable that is less susceptible to interference and crosstalk because each pair is surrounded by a braided shield.

A network architect is updating the organization's network to use one set of credentials to access corporate equipment, further mitigating threats and vulnerabilities. What is the architect creating for each employee?

Single Sign On

A company requires connectivity between two buildings. The buildings are over 750 meters apart. IT engineers suggest which type of fiber cabling?

Single mode

An employee in a branch office is accessing resources in a building at the headquarters location over a virtual private network (VPN). The gateway at the branch office establishes a VPN connection with the gateway at the headquarters office. What term correctly identifies the deployment of this VPN?

Site-to-site VPN

Organizations must have mechanisms to detect and suppress fires. Which of the following are fire suppression systems an organization may need to implement? (Select all that apply.)

Sprinkler systems Fire extinguishers

A user reports they cannot open the shared drives. After investigating the issue, the engineer found that the workstation had its network information misconfigured. The incorrect information was 255.255.255.255, instead of 255.255.255.0. What was most likely incorrectly set on the workstation?

Subnet Mask

An administrator is installing an inventory system that will keep track of when the organization procures and implements hardware and software, upgrades or modifies it, and decommissions it. What is the inventory system tracking?

System Life Cycle

A security analyst is setting up detections to look for unauthorized domain transfers from their external-facing DNS servers. Which of the following ports should they monitor?

TCP 53

A network administrator is unable to access files on a remote system. A network firewall seems to be blocking traffic from passing through. Which of the following will the administrator most likely need to reconfigure for inbound and outbound traffic? (Select all that apply.)

TFTP traffic TCP port 20

A security administrator wants to ensure that the router setup prevents badly addressed packets from permanently circulating the network. Which of the following accomplishes this?

TTL - At each router, the Time to Live (TTL) IP header field is decreased by at least 1. This prevents badly addressed packets from permanently circulating the network.

Before entering a data center, there are multiple security lines, but the last line of defense is a closed-circuit alarm on the door to a server rack. If the door is opened without proper authorization, an alarm will sound. What is the purpose of the closed-circuit alarm on the door of the server rack?

Tamper Detection

What could possibly cause a client application to show a certificate warning to a user?

The certificate's subject name does not match the URL

A Windows Server 2016 has recently been remotely joined to the domain by a network admin, and is now known as IISMARKETING01.redwood.local. When pinging the server using its Fully Qualified Domain Name (FQDN) the reply fails. When trying to remote access the server using the sa FQDN the session does not connect. Applying a divide and conquer approach, where would a network admin most likely begin to resolve this issue?

Theorize an IP issue at Layer 3.

A network technician patches the vulnerability and verifies full system functionality after identifying a vulnerability on a network switch operating system. Justify the technician's decision to document any findings, actions, or outcomes that may have taken place during the process. (Select all that apply.)

They establish a new baseline for the template. They create installation procedures.

An attacker created a rogue access point (AP) with the same Service Set Identifier (SSID) as a legitimate one, and then used a Denial of Service (DoS) technique to overcome the legitimate AP. Users were forced to disconnect from the network and reassociate with the attacker's AP. What is the goal of the attacker when setting up this kind of evil twin attack? (Select all that apply.)

To steal user network credentials To snoop on connections with web servers

An IT help desk technician troubleshoots a computer that will not connect to the network. The computer's network adapter has the correct configuration. The technician checks the physical connection and discovers that the wall jack and network patch panel do not have a label. Which of the following tools should the technician use to locate the physical connection?

Tone generator

A user reported a performance issue on the network the department's web server is communicating on. After questioning a few other users, and notating some recent changes on the server and its symptoms, what other actions will a network admin most likely take to better identify the problem?

Try and duplicate the problem.

A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet using router advertisement. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function?

Tunneling

A network technician is reporting historical data about connectivity to the corporate office. The technician has used records of connectivity issues to request an upgrade to the router in the area. What data is the technician using to request an upgrade?

UP Time/Down Time

A network technician is looking at various administrative distances to see which route would take the longest. Which of the following would have the highest administrative distance?

Unknown

An attacker plants a device in a native subnet and sends traffic to a computer on an external subnet to perform a denial of service (DoS) attack against the host in the external subnet. What type of attack is this?

VLAN hopping

An administrator configured a group of routers so that one router is the master, and all other routers are prioritized backups that monitor to the master and if the master loses connectivity one of the backups becomes the new master based on priority. What is the administrator using?VRRP

VRRP - Virtual Router Redundancy Protocol (VRRP)

A security specialist wants to enhance a company's physical security because of some failing detection-based security controls. If the network infrastructure is already in place, what is a relatively inexpensive detection-based control and effective deterrent that can improve the resilience of the perimeter gateway?

Video Surveillance

A network technician is setting up network devices at a remote branch office. A small switch in the corner of the office connects the various workstations using category 6 Ethernet cables. A wireless access point in the center of the office connects company iPads. Some workstations are given wireless Network Interface Cards (NICs) because they are harder to reach. Which of the following devices in this scenario are layer 2 devices? (Select all that apply.)

Wireless NICs Wireless Access Point Network Switch

A network engineer wants all wireless clients to connect to use the same broadcast domain without connecting to another wireless network. What is this called?

Wireless client isolation

A helpdesk operator is attempting to release a client's IP as part of their troubleshooting steps. Which of the following tools can they use to accomplish this? (Select all that apply.)

ipconfig dhclient NetworkManager

A Windows server is being configured to go live again on a LAN (Local Area Network) that has a DHCP (Dynamic Host Configuration Protocol) server with a new pool of addresses. The change must be verified upon completion. Which of the following commands would be most appropriate to apply to this scenario? (Select all that apply.)

ipconfig /all ipconfig /renew ipconfig /release


Related study sets

NCLEX-Benign prostatic hypertrophy BPH

View Set

Activity 3.3.7 Analyze the Quest for Human Rights

View Set

Site Safety Chapter 3: Section BC 3302: Definitions

View Set

Biology Sickle-cell and Genes test McGraw-Hill

View Set

the next person you meet in Heaven

View Set

biodiversity 1063 module 1,2,3 quiz

View Set

Chapter 2 Health, wellness, and complementary medicine PrepU

View Set

Chapter One: Life Span Perspective

View Set

ISDS Module 3 Practice Test Exam I

View Set