Network+, Network cert practice test, CompTia Practice Test #2, network practice test, Final test review

Ace your homework & exams now with Quizwiz!

An organization recently renovated its office. The IT department has tasked an entry-level technician with moving equipment to the proper cubicles and setting the equipment up for each employee. However, there are no labels at each cubicle. What kind of document would help the technician place each computer at the correct cubicle?

. Floor plan

Question A network specialist received a port failure notification on UDP port 162. What agent is detecting the notable event?

A. Traps

What type of Domain Name System (DNS) record holds information such as 2001:4860:4860:8888?

AAAA

An organization's Chief Information Officer and the Chief Security Officer are assisting the legal department with writing standards that dictate the authorized use of the organization's technology by employees, customers, and third-party vendors. What document is the organization writing?

Acceptable use policy

A sysadmin noticed that there were changes to the hardware firewall not properly documented. The sysadmin does not know who made the change. What type of log should the sysadmin investigate that may shed light on who made the change in the firewall?

Audit

A network engineer reviews a report that makes recommendations where the network is not meeting goals for performance or security. What is the name of this report?

Audit and Assessment Report

A security administrator is investigating recent logins to a server that has been compromised. Which log should the administrator audit?

Audit log

A network consultant is conducting a test to determine the amount of data transferred through a connection over a given period. What is the consultant testing?

Bandwidth

Employees are complaining that when browsing the company's web-based Customer Relationship Management system, it is very slow. The company has 500 employees that use this system and the contracted internet speed is 10Mbps download and 1Mbps upload. What should the sysadmin increase in order to improve access to the cloud system?

Bandwith

A network engineer is tasked with resetting a switch back to its factory settings. During the process, the engineer fails to take a snapshot of a known "good" configuration prior to resetting the switch. What snapshot did the engineer fail to capture?

Baseline

Question A network engineer recently received brand new network equipment for the corporate office and wants to run a check of the systems to ensure they know what to expect from the equipment. What kind of report should the sysadmin run?

Baseline

A tech team provides a network technician with a faulty device. The technician wishes to receive a new device that has the same foundational parameters that were loaded into the faulty device. What should the parameters on the new device be?

Baseline Configuration

Which type of approach is applied by looking at each layer of the OSI (Open Systems Interconnection) model, starting from Layer 1, to establish a theory of probable cause?

Bottom-to-top

A communications company uses TIA/EIA IS-95 handsets that require each subscriber to use a code to key the modulation of their signal. The receiver uses this "key" to extract the subscriber's traffic from the radio signal. What type of handsets is the company using?

CDMA

A network engineer conducts a redundancy check and identifies that interference exists due to a poor-quality cable. What is this finding called?

CRC error

A computer uses a dictionary of vulnerabilities in published operations and application software (cve.mitre.org). What is the name of this dictionary?

CVE

An electrician creates several cat 6 cables to connect new computers to a network at a small company. The IT staff discovers that two cables do not work properly due to faulty crimping. Of the available methods to inspect the cables, which of the following should the IT staff utilize to find cables that do not work?

Cable tester

A network consultant reverting a system to a known exemplary configuration realizes that a change in the network environment is required. Which plan/procedure will the consultant follow?

Change Management

A sysadmin is following a set of procedures to ensure changes to the corporate information technology environment do not adversely affect the availability of those resources. What kind of policy is the sysadmin following?

Change management

A user is connected to a remote desktop using the protocol WebSockets. What technology solution is the user using?

Clientless VPN

A network engineer needs to purchase a cost-effective solution for data storage that allows for sustained hot site redundancy. What would be the best site for this requirement?

Cloud Site

A network engineer must build out a server application for the businesses' mail server. The engineer determines each component that is needed and how they will function holistically. What is the name of the process that the engineer is using?

Configuration

A network engineer needs to procure a product that scans content using a dictionary database/algorithm that looks for confidential and sensitive company information. What type of product would the engineer purchase?

Data Loss Prevention

A network engineer reviewed the password database for the company's networks and servers and identified that the passwords were all common words and animal names. Concerned that this would be easy to compromise, the engineer alerted this concern to the cyber team. What kind of attack could have occurred if the passwords were not changed?

Dictionary

Question A safety specialist reviews and updates the plan that addresses large-scale incidents that threaten the performance or security of the whole site. What is the name of this plan?

Disaster Recovery

A network technician looks at an algorithm that uses the number of hops to the destination as the route path metric. Which of the following are they looking at?

Distance vector

A network engineer is trying to get approval to replace aging networking equipment. The justification for the purchase was that the office lost connectivity due to the devices becoming overloaded and overheated. What was the engineer using as justification?

Downtime/Uptime

Which technology offers a mode for simultaneous two-way communication?

Duplex

A network engineer has installed a new switch but notices a blinking amber light. What should the engineer check to troubleshoot the trunk port connected to the corporate network?

Duplex/speed

A network operations engineer is investigating alerts that the data center keeps switching to battery backup. What environmental factor should the engineer investigate?

Electrical

A user is having trouble connecting to the company's WiFi network. They have verified that the password is correct and the network is indeed available. What could be a potential issue with the device not connecting?

Encryption protocol mismatch

A network technician is probing the organization's network, procedure, and firewalls for areas of weakness. What will a threat actor do if the weakness is discovered?

Exploits

A network consultant wants to install software to protect the company infrastructure from outside influence. What can the consultant use to block unwanted/unauthorized access?

Firewalls

A company is developing a new office and has tasked the information technology department with creating a document to show where their electrical vendor needs to run electrical and internet cabling throughout the office. What kind of diagram would best accomplish this?

Floor

Question An organization recently renovated its office. The IT department has tasked an entry-level technician with moving equipment to the proper cubicles and setting the equipment up for each employee. However, there are no labels at each cubicle. What kind of document would help the technician place each computer at the correct cubicle?

Floor plan

Upon reviewing the inclement weather plan for Company A, the network engineer wants to purchase standby power supplies that can run on diesel or propane. What could the engineer purchase to fulfill this requirement?

Generator

A security auditor has gathered many logs from the core router and sees many dropped packets at random intervals. The auditor has collected enough data to report an ongoing security breach attempt. What type of malformed packets are likely being dropped but not alerting the network team? (Choose all that apply.)

Giants Runts

Which of the following relates to a private cloud delivery model?

Greater control

A server technician has removed a server blade from its rack for cleaning. The technician sees corrosion on one of the circuit boards and notices some water on the bottom of the casing. What hazards could have affected this server? (Select all that apply.)

Humidity / Flooding

An administrator normally working on a remote server using Remote Desktop Protocol (RDP), loses the session abruptly. The administrator pings the server and does not receive a reply. An RDP session is attempted again, and the administrator can log in. Why was the administrator unable to ping the server?

ICMP traffic was blocked.

A network administrator would like to setup a group of servers to retrieve the same content from a single host on the internal network. Which of the following will allow this type of data flow? (Select all that apply.)

IGMP must be used to configure group membership. / A multicast IP address is assigned to the servers.

What are two parts of the first step of the CompTIA Network+ troubleshooting methodology? (Select all that apply.)

Identify symptoms / Gather information

A company's main file server crashed, requiring the sysadmin to restore data. However, the information technology department received complaints that no one sent any communication informing employees of the issue. What kind of plan would have helped to prevent these complaints?

Incident

A disgruntled employee used a shared login to access an organization's customer relationship management system and delete customer information. How will the organization react?

Incident response plan

A cyber technician is tasked with monitoring the activity of the company's network. While reviewing the activity, the technician views a series of reports. What is provided with performance/traffic logs?

It records statistics for computer and network resources over a period of time

Users are reporting that their phone calls are really garbled and of poor quality. What should the sysadmin investigate?

Jitter

A network engineer is looking to support the local area network by implementing a payload that can manage up to 9,000 bytes. What could the engineer use to meet this byte requirement?

Jumbo Frames

Question A sysadmin is investigating an issue between two geographically distant offices. Users at these locations report that accessing the shared drive at the corporate office is taking too long, even though both locations have gigabit-speed internet. What indicator could help direct the sysadmin to the issue?

Latency

A network engineer is designing a network in various offices to create multiple broadcast domains. Each has its own Virtual Local Area Network (VLAN). When configuring these multiple broadcast domains on the switch, the switch will be operating at what layer of the OSI model?

Layer 3

A sysadmin is setting up a new office for an employee. After hooking the computer up to the network with an ethernet cable, the sysadmin noticed the computer was not getting a connection. The sysadmin previously hooked up the corresponding patch panel port to the switch but is not seeing any lights on

Link State

A helpdesk technician is helping a user attempt to connect to the network but they are receiving a 169 address. What is this?

Link-local

An administrator is looking at network documentation that shows the data path between a client and server, the physical arrangement and location of the components, detailed information about the termination of twisted pairs, and demonstrates the flow of data through a network. From a network diagram perspective, what component(s) of the diagram is the administrator reviewing? (Select all that apply.)

Logical network diagram Physical network diagram Wiring diagram A logical network diagram demonstrates the flow of data through a network and shows how devices communicate with each other. A physical network diagram shows the physical arrangement and location of the components that make up the network and includes the hardware and cabling. A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A network administrator is measuring Key Performance Indicators (KPI) for an industrial network. Which of the following are examples of a KPI? (Select all that apply.)

Mean Time Between Failures (MTBF) / Mean Time to Repair (MTTR)

A network engineer is working to contract services with a third-party data center vendor. The sysadmin and the vendor signed a preliminary agreement to express an intent to work together. What kind of document did the network engineer sign?

Memorandum of understanding

A network technician is purchasing a computer and wants to ensure that it has enough resources to satisfy the graphics-intensive software requirement. What are they looking for

Memory

Question A server administrator has created a new virtual machine to host printers on the network. When adding new printers to the server, the administrator notices that the print queue is freezing the operating system when a new job comes to the server. What could the administrator upgrade on the virtual server to help with the print queue load

Memory

Question A server running an SQL database is running out of capacity. The sysadmin noticed the disk space is not maxed out, and the processor is running at 25% capacity as well. What is another component of the server that the sysadmin should look at to restore the database's functionality?

Memory

A user in the Human Resources (HR) department has opened an e-mail, and now the user's computer is mostly unresponsive. The user has requested assistance from the IT department. A network technician has checked the network to verify that there is nothing abnormal about the network's bandwidth. Since the network is not acting abnormally, what resources are likely being attacked on the user's computer? (Select all that apply.)

Memory CPU usage

A network technician suspects a short in the network cable and wants to test it. Identify which of the following tools will provide this capability.

Multimeter

A network administrator is researching network virtualization and is trying to find a standard architecture for appliances to be developed against. Which of these should the administrator look at for a standard?

NFV

Which tool can a network administrator run to measure the network statistics of a building's network equipment?

NetFlow

A network engineer wants to install an antenna that could receive and send data from all directions. What type of directional antenna would the network technician use?

Omni

An organization is putting an employee through security checkpoints that include a background investigation, account creation with proper privileges, assigning a laptop, and completing security training. What kind of policy is the employee under?

Onboarding policy

Users are complaining that it is too difficult to access their computers due to a policy that enforces complexity and short password age. What kind of policy is the IT department enforcing?

Password

An administrator is concerned that too many employees are using "password123" with their username to log in to the corporate network. What can the administrator enforce that will not allow users to use that password anymore?

Password policy

A wiring professional finishes wiring a building with twisted pair cabling for a new Ethernet network. Where do the wires running throughout the building centrally terminate?

Patch panel

A technician is setting up an IP camera that is operating off the 802.3at standard. Which of the following should they set up for the camera?

PoE+

A wired layer 3 network device is not functioning properly and is experiencing intermitten packet drops. IT engineers monitor the device for anomalies. Of the possible troubleshooting approaches, the engineers should configure and use which of the following options together? (Select all that apply.)

Protocol analyzer / Packet sniffer

A help desk technician is working with the sysadmin to clean up old servers and network equipment in their tech closet. The help desk technician is having issues finding which server is the one that needs decommissioning. What kind of diagram would help the technician find the correct

Rack

A sysadmin is running into the issue that traffic is getting dropped by the network equipment. After researching the issue, the sysadmin found that the individual packets were too small. What should the sysadmin configure to remove?

Runts

A sysadmin is looking to monitor the network devices by pulling data off of them remotely. What kind of network equipment functionality can the sysadmin use to accomplish this?

SNMP trap

A sysadmin is implementing a policy that establishes a duty for each employee to ensure confidentiality, integrity, and availability of data assets in the company ownership. What kind of policy is the sysadmin creating?

Security

A network engineer monitors the network and follows information packets as they move through the network from one endpoint to another. What is the engineer observing?

Send/Receive Traffic

The entire office floor at a company is receiving new multi-functional phones at each office. These phones have the capability of sending and receiving regular telephone calls, text messages, and videos. Management wants to prevent as much clutter as possible so every desk looks tidy. Which of the following configurations should a network administrator implement to accommodate management's vision? (Select all that apply.)

Setup PoE to connect to the phones. / Setup QoS to reserve bandwidth.

What do emergency, critical, and informational lines in a syslog refer to? (Select all that apply.)

Severity levels Logging levels

A company requires connectivity between two buildings. The buildings are over 750 meters apart. IT engineers suggest which type of fiber cabling?

Single mode

A help desk technician is assisting the sysadmin in determining the best location for wireless access points. What kind of report should the technician generate?

Site survey

An administrator is looking at a plan that shows channel utilization and the wireless signal strength in each area of the building. What kind of document is this?

Site survey report

A sysadmin was monitoring the logs of the network equipment in the corporate office and noticed there were a lot of packet collisions. After digging around the individual network boxes, the sysadmin found that there was a misconfigured switch. What setting most likely contributed to packet collisions?

Speed/Duplex

A sysadmin is trying to understand what is causing the company's virtual private network connections to fail. What kind of log would help the sysadmin track down the issue?

Syslog

A Chief Information Officer needs to prepare a process for the purchase, maintenance, and decommissioning of assets in the company. The CIO wants to ensure properly supported equipment. What kind of roadmap would help the CIO accomplish this task?

System life cycle

A network administrator is unable to access files on a remote system. A network firewall seems to be blocking traffic from passing through. Which of the following will the administrator most likely need to reconfigure for inbound and outbound traffic? (Select all that apply.)

TCP port 20 / TFTP traffic

The sysadmin is receiving alerts that the servers are having issues. A Heat/Ventilation/Air Conditioning system failed in the server room. What alerts did the sysadmin receive regarding the servers?

Temperature

An attacker created a rogue access point (AP) with the same Service Set Identifier (SSID) as a legitimate one, and then used a Denial of Service (DoS) technique to overcome the legitimate AP. Users were forced to disconnect from the network and reassociate with the attacker's AP. What is the goal of the attacker when setting up this kind of evil twin attack? (Select all that apply.)

To steal user network credentials / To snoop on connections with web servers

A network technician is looking at leaf layer access switches of a SDN. What are these implemented as?

ToR

A sysadmin is investigating an issue on a switch after receiving reports that connecting to any network resource, local or on the web, is much slower than normal. What kind of log should the sysadmin investigate to determine what may be causing the issue?

Traffic

A user reported a performance issue on the network the department's web server is communicating on. After questioning a few other users, and notating some recent changes on the server and its symptoms, what other actions will a network admin most likely take to better identify the problem?

Try and duplicate the problem.

Question A network technician is reporting historical data about connectivity to the corporate office. The technician has used records of connectivity issues to request an upgrade to the router in the area. What data is the technician using to request an upgrade?

Uptime/Downtime

A company is considering using a co-location connection with a cloud service provider to support some virtual services in its data center. This will provide the company a private and hybrid cloud model to easily move services from the local infrastructure to the cloud during peak season by using infrastructure as code tools. Which of the following network components are most likely required for hybrid solution? (Select all that apply.)

VLAN / Private link

A computer technician is reading archived logs and identifies that the company was using 802.11n. Not knowing what this Wi-Fi category meant, the technician researched its origins. In recent years, what was 802.11n renamed?

Wi-Fi 4

A network engineer wants all wireless clients to connect to use the same broadcast domain without connecting to another wireless network. What is this called?

Wireless client isolation

The Chief Information Officer canceled a contract with a third-party vendor since they refused to sign a contract to limit what uses of sensitive data are permitted, what storage and distribution restrictions to enforce, and what penalties to incur for breaches of the agreement. What kind of contract did the vendor fail to sign?

a. AUP b. MOU c. SLA d. NDA The correct answer is d. NDA (Non-Disclosure Agreement).

A network consultant is looking into a matter where the interface is discarding incoming and outgoing frames. In this instance, the packets are too large. What is the name for these packets?

a. Bandwidth b. Runts wrong answer c. Uptime/Downtime d. Giants maybe is the correct answer is

Users at a company are complaining that while connected to the terminal server, Excel spreadsheet calculations are taking too long. They conduct a ping test and find severe latency. What would the sysadmin most likely add to the server to improve performance?

a. Central processing unit b. Bandwidth c. Memory (incorrect) d. System life cycle

A network technician is installing sensors on the water-based fire suppression system in the equipment closet to monitor and measure environmental conditions. What type of environmental conditions will the installed sensors monitor?

a. Flooding b. Electrical c. Temperature (wrong) d. Humidity correct answer is: Humidity

A network engineer is expanding a remote office that is connected to the corporate office. What can assist the engineer in determining if there is enough reserve bandwidth to handle the extra user load, or if the basic package needs to be upgraded to support higher bandwidths?

a. Netflow data (wrong answer) b. MIBs (correct answer) c. Baselines (wrong answer) d. Link state (wrong answer)

A disgruntled employee recently left the company but was able to copy corporate sensitive material from the work email to a personal email. What kind of policy did the company NOT implement to prevent this?

a. Onboarding b. BYOD wrong answer c. DLP d. Change management DLP policy was the specific gap that allowed the disgruntled employee to copy sensitive material to a personal email.

In a Cisco switch, what would be the command to show what the device's settings are?

show config


Related study sets

ADN 120 Unit 1 Thermoregulation, Fluid & Electrolytes and Glucose Regulation

View Set

FSHN 120 Chapter 14 Nutrition: Fitness and Sports

View Set

Ch. 24 Implementing Lists, Stacks, Queues, and Priority Queues

View Set

Organizational Communciation Chapter 4

View Set

Chapter 26: The Child with Hematologic or Immunologic Dysfunction

View Set

Chapter 3 Test Review: Nutrition for Wellness

View Set