Practice Questions 4

Ace your homework & exams now with Quizwiz!

Which of the following would be the MOST efficient subnet mask for a point-to-point link?

/31

A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?

172.18.0.0/23

Which of the following protocols can be both connection-oriented and connectionless?

53 DNS

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

802.11ac 802.11n

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:

ARP cache poisoning

To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?

Add a redundant power supply to the switch

A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?

Adding a fingerprint reader to each workstation and providing a RSA authentication token

A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?

Air flow and cooling

A network technician configures a firewall's ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewall's deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?

Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?

Bend radius exceeded

Which of the following communication media can carry many voice, data, and video channels simultaneously over multiple frequencies?

Broadband

A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?

Business continuity plan

A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?

Change management

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?

Compromised system

In which of the following ways does a DDoS attack differ from a spoofing attack?

DDoS attacks are launched from multiple hosts

A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?

DOCSIS modem

Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?

Determine if any network equipment was replaced recently

An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig command: Windows IP Configuration Ethernet LAN Adapter: 980 GTS Connection-Specific DNS Suffix: .... Comptia.net APv4 Address: ...... 10.0.5.99 Subnet Mask: .........255.255.255.0 Default Gateway .......172.16.0.254 Which of the following would MOST likely allow the network drives to be accessed?

Disable the WLAN adapter

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company's firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

Document the reason for the request Follow the company's approval process for the implementation

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)

Enable SSID broadcasting to identify the guest network Configure visitor devices to use static IP addresses

An assistant systems analyst reports the following findings of an investigation of slow Internet connections in a remote office to the senior systems analyst: Device CPU Utilization. Memory Utilization. Link Status Router 5% 43% Good Firewall. 92% 58% Good Switch 1 23%. 32% Good Switch 2 8%. 81% Good Which of the following devices is causing the issue?

Firewall

Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?

Frame relay

Which of the following is a system of notation that uses base 16 rather than base 10?

Hex

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?

Implement a standardized UNC

A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the application. Which of the following would be the MOST cost effective for the administrator to recommend?

Install 10Gb Ethernet NICs in the servers

A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?

MAN

Which of the following DNS records needs to be configured for SMTP traffic?

MX

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and explogtation. Which of the following attacks has the analyst successfully performed in this scenario?

Man-in-the-middle

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?

NAS

A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?

Network

A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?

Network wiring is run perpendicular to electrical conduit

Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?

Not enough DHCP addresses have been allotted

A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser. Only secure protocols should be used, and only the necessary ports should be open.Which of the following ACL rules should be configured in the firewall's WAN port? (Choose two.)

Permit 192.168.1.143.443 Permit 192.168.1.143.587

A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel's patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

Place a switch at the hotel's patch panel for connecting each room's cables

A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)

Point-to-point Mesh

Which of the following physical security controls is MOST likely to be susceptible to a false positive?

Proximity reader

An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?

Real-time remote monitoring of the phone's activity and usage

A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?

Remove SNMP polling and configure SNMP traps on each network device

Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

SSL VPN

A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?

ST

A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST?

Secure the area

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of the following components should the technician check on the Windows workstations? (Choose two.)

Start the Wired AutoConfig service in the Services console Enable IEEE 802.1x Authentication in Network Interface Card Properties

A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following BEST explains this response?

The ports are associated with deprecated services

A network administrator is testing connectivity at a new corporate site. The site has awireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?

The testing server for the wired network was farther away

The IT manager at a small firm is in the process of renegotiating an SLA with the organization's ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization's internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?

Throttling

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands

A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users' laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network?

Wireless switch toggled off

A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?

authpriv

The process of attempting to explogt a weakness in a network after being given permission by the company is known as:

penetration testing

A user checks an IP address using an external website. The address is different than the one the user sees when opening a command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses. This is BEST explained by the interworking of:

public/private networks


Related study sets

Final Exam (All past exam questions)

View Set

Computer Organization and Architecture: Chapter 1 - Introduction

View Set

Hematologic & Immunologic Disorders in Children

View Set

Chapter 60: Assessment of Integumentary Function

View Set

Principles of Economics "Course 111" Chapter 1

View Set

Chapter 26: Soft-Tissue Issues Notes

View Set