Quiz: CompTIA Network+ N10-008 Post-Assessment Quiz

Ace your homework & exams now with Quizwiz!

The helpdesk at a large company is looking for ways to increase the efficiency of their technicians. They have found that different technicians have different ways of doing the same task. Some of these technicians take twice as long as others. There is also no documentation on how to perform tasks, so when a new helpdesk technician is hired it is up to the technician training them to pass on that knowledge. Which of the following might this company decide to implement to resolve these issues? a. TOPs b. GAPs c. SOPs d. PLCs

C.SOPs

In which of the following types of technologies would a network technician configure an ESSID? a. WPS Server b. rogue access point c. evil twin d. WLAN controller

D.WLAN controller

Toni needs to connect to a Cisco switch to make configuration changes. Which of the following protocols will most likely be used when she authenticates into the switch? a. STP b. BGP c. TACACS+ d. IGRP

d. IGRP(made by cisco)

Beri is analyzing some network traffic statistics and sees a metric that appears to indicate that frames are being corrupted as they're being sent across the network. Which of the following might be the metric that causes her to believe that is the case? a. CRC b. Giants c. Jumbo Frames d. Runts

A.CRC

Anosh needs to deploy a new web application that is publicly accessible from the Internet. The web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. Which of the following devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet? a. SQL Server b. DMZ c. switch d. firewall

A.Firewall

Annette wants to expand her company's current on-premises cloud infrastructure by adding a well-known cloud service provider into the design, rather than building or leasing another datacenter. Which of the following cloud deployment models best describes the type of infrastructure that she wants to move towards? a. Hybrid cloud b. Community cloud c. Public cloud d. Private cloud

A.Hybrid cloud

Gary has been tasked with ensuring that the sales team can use their laptops from as many places as possible - even when there is not a Wi-Fi or wired network available at customer sites. Which of the following technologies, if included as part of a laptop, would allow them to access the systems, applications, and information they need while on the go? a. LTE b. MTSO c. MSC d. DSL

A.LTE

Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individual VLANs appear to be tagging the traffic correctly. However, there are still some frames being transmitted across the network that are not tagged to any particular VLAN. Which of the following describes the term by which a switch will categorize these frames? a. Native VLAN b. Voice VLAN c. Management VLAN d. Data VLAN

A.Native VLAN

At the beginning of a pandemic, a company has realized that they do not have enough Windows computers to ship out to employees in order to allow them to work from home. Which of the following might the company choose to implement to allow their users to continue to work from home until more computers can be purchased and shipped out to these employees? a. VPN b. remote desktop gateway c. TFP d. SSH

A.Remote desktop gateway

Terrance is trying to troubleshoot an issue on his company's network. He has narrowed it down to a few segments of the overall larger network. He connects with a rollover cable to one of the routers and wants to check the status of the connection to another router. Which of the following commands might help him troubleshoot that connection? a. show interface b. disp conn c. show start d. disp duplex

A.Show Interface

Aaron, a junior network technician, is troubleshooting a network. He seems to have tracked down the issue to the core router that connects to the line from the ISP, however, he's not sure where the core router might be located. Which of the following should he ask a senior technician for help locating? a. demarcation point b. data room c. patch panel d. IDF

A.demarcation point

Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service. Which of the following types of programs might he use to do so? a. terminal emulator b. virtual private network c. virtual desktop infrastructure d. remote desktop gateway

A.terminal emulator

Jorge has been tasked with purchasing a new wireless access point that provides the fastest access speeds and also operates on the 2.4 GHz spectrum. Which of the following specifications should he look for? a. 802.11ac b. 802.11ax c. 802.11n d. 802.11a

B.802.11ax

Which of the following is the best action a company can take to prevent social engineering attacks from being carried out against the organization successfully? a. DLP b. timer activated lighting systems c. employee awareness training d. motion activated cameras

C. employee awareness training

Toby is drafting the physical network topology plans for the new headquarters building for his company. Which of the following will there be the most of within the building? a. MDF b. IDS c. IDF d. demarcation point

C.IDF

Hobart has just created a network segment for a new group of file servers. These servers should only be accessible from the internal network. Connections coming in from the Internet should not be able to access these file servers. Additionally, the servers should be able to perform automatic updates from the operating system and software vendors. Which of the following should he consider implementing in order to accomplish this task? a. stateless firewall b. layer 3 switch c. stateful firewall d. media converter

C.Stateful firewall

Priya is planning the cabling design for the company's new headquarters. One of the runs of cable needs to go behind the elevator bank's hydraulics and motors to the reception area computer. Which of the following types of cable would be the best choice? a. UTP b. Plenum c. Fiber d. STP

D.STP

Varghese has just returned from a meeting with senior management. The management team is concerned that the current systems in place may not be identifying all of the weaknesses that exist in the current infrastructure and want to determine to what extent the company could be attacked. Which of the following might Varghese decide to employ in making this determination? a. penetration test b. vulnerability scan c. security audit d. honeypot

a. penetration test

Ava is unable to pull up her company's website, theoretical.com, in her web browser. She wants to check that the server is online and responding to requests. Which of the following could she try? a. ping the IP address of the web server b. use the command: dig theoretical.com c. use the command: nslookup theoretical.com d. use the man command to look up the online status of the web server

a. ping the IP address of the web server

Which of the following types of transceivers can be used for connections that require a data rate of 400 Gbps? a. QSFP+ b. CFP c. SFP+ d. XFP

a.QSFP+

Jan needs to connect two offices together that are approximately 21 km, or 13 miles, apart from each other. Which of the following would be the best choice of physical mediums that could be used to connect these locations? a. twisted pair ethernet cabling b. coaxial cabling c. multimode fiber d. single mode fiber

c

Which of the following types of cable might you expect to see connected to a cable modem from the ISP? a. RG-6 b. RJ-45 c. RG-11 d. RJ-11

B.RJ-45

Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. Which of the following, if performed, would still not allow him to deploy these new cameras to the selected location? a. Have an electrician run power to the selected location. b. Replace the unmanaged switch with a managed switch. c. Use a power injector on the ethernet cabling running to the cameras. d. Use a switch that includes POE or POE+ capabilities.

B.Replace the unmanaged switch with a managed switch

At which of the following OSI model layers is the protocol data unit referred to as a segment? a. Network Layer b. Transport Layer c. Physical Layer d. Data Link Layer

B.Transport Layer

Which of the following types of cables might be used to run from cubicles into a drop ceiling and then routed across to an IDF? a. plenum b. EMI c. backbone d. SCADA

A.Plenum

Cora is a network engineer for a large company and has been given instructions on how to configure a private fiber connection between her company's data center and the cloud service provider her company uses. She needs to configure an ASN on one of the core routers in the data center as part of the connection. Which of the following protocols is she most likely being instructed to configure for use with the CSP? a. RIPv2 b. BGP c. EIGRP d. OSPF

B.BGP

Jafar has just been hired as a junior network engineer for a large company. He has been advised that due to a pandemic he will be working remotely and needs to ensure he has a high-speed broadband Internet connection with low latency at home in order to connect by VPN. The local cable company has not yet built out his neighborhood, so he needs to look for an Internet service that meets the requirements. Which of the following choices would most likely best suit his needs? a. Wi-Fi b. DSL c. EV-DO d. Satellite

B.DSL

Which of the following documents might a company use to solicit vendors to submit a solution of products and services that the company is looking to purchase? a. SOW b. RFP c. MOU d. MSA

B.RFP

Which of the following expresses the subnet mask 255.255.255.224 in CIDR notation? a. /25 b. /26 c. /27 d. /28

C. /27

Which of the following ports are used by the Simple Network Management Protocol? a. UDP 161 b. TCP 161 c. TCP 514 d. UDP 514

A. UDP 161

Jorge is analyzing the traffic statistics on one of the networking devices and sees a category for the number of Runts that the device has seen. Runts are packets that are smaller than _______ bytes. a. 64 b. 18 c. 128 d. 192

A.64

Zara is having trouble accessing her company's website through her web browser. She has already pinged the static IP address of the web server and it appears to be online. Which of the following might she look at next? a. Verify that the DHCP settings are correct on the server. b. Ensure that DNS for the domain is configured correctly. c. Check that the LDAP server is also online. d. Ensure that the server's NTP settings are correct.

A.Ensure that DNS for the domain is configured correctly

Cari is a system administrator for an organization that has been seeing large amounts of growth but has multiple legacy systems running on older hardware. There is a concern that there is not much physical space left in the data center. Her manager has asked her to come up with a way that the company could continue to expand the ability to deliver services to end users without having to grow into another data center. Which of the following might be a component of Cari's plan? a. Hypervisor b. Leased Line c. MTBF d. VPN

A.Hypervisor

Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible. Which of the following is the total number of usable IP addresses that will remain free after creating this subnet? a. 42 b. 40 c. 170 d. 168

B.40

Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a ticket granting ticket system that relies on time synchronization in order to prevent replay attacks. Which of the following protocols might he implement to ensure that Kerberos will work correctly? a. STP b. HTTPS c. NTP d. FTP

C.NTP

Pano has just installed a switch for a new network segment at a branch office. Which of the following describes the traffic flow being sent from one computer on that network segment to another computer on the same network segment? a. top-to-bottom b. east-west c. north-south d. side-to-side

C.North South(north south means in and out of a data center)

Talia has just returned from a meeting with her manager where they discussed the various vulnerabilities that might impact the organization. They agreed that they were concerned that users might give out information or click on malicious links that they should not click. Which of the following types of testing might help to identify weak areas where the company could improve its employee awareness programs? a. denial-of-service b. DLP c. social engineering d. black hat

C.Social engineering

Jeni works for a company that has seen rapid growth, beginning as a very small startup and expanding into a large company with what is forecasted to be thousands of employees by the end of its second year. She is trying to ensure that the fast-paced growth doesn't overburden administrators when onboarding new employees. Which of the following would require the least administrative effort in their day-to-day jobs of onboarding employees and managing permissions for these users, groups, and departments while maintaining the highest level of security? a. AAC b. CAC c. DAC d. RBAC

D.RBAC

Kumail wants to check his bank account balance to see if a transaction has cleared from a purchase he made the previous day. Which of the following protocols would most likely be used to do this? a. FTP b. HTTP c. RDP d. HTTPS

HTTP(It is used for secure communication over a computer network)

Which of the following protocols might someone use to send an email? a. FTP b. HTTP c. SMTP d. RDP

SMTP(SIMPLE MAIL TRANSFER PROTOCOL)

Lisa is a network administrator and has been reviewing the types of data being transmitted over the network. She discovers that there are a number of email attachments and files being uploaded to a remote server via FTP that potentially contain PII. Which of the following might help her to prevent these files and confidential information from being transmitted outside the organization? a. SLA b. OLA c. PHI d. DLP

D. DLP

Which of the following is not a technology used to connect servers to a SAN? a. Fibre Channel b. FCoE c. iSCSI d. IR

D.IR

Dahlia has just installed gigabit routers and switches at the company's headquarters. Which of the following might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds? a. Install a NIC on each of the computers b. Issue new tokens to each user c. Configure the routers to push out updates to the computers advertising the new speeds d. Install a hub at each user's workstation

A.Install a NIC on each of the computers

Which of the following concepts assumes all network traffic is potentially malicious until proven otherwise? a. noncompliance security model b. zero trust security model c. NICE model d. extended validation security model

B.Zero trust security model

Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific northwest. She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. Which of the following types of connections might she choose to include in the configuration? a. MAN b. LAN c. CAN d. WAN

D. WAN

Tuan is a network administrator for a large organization. The company currently has 4 T-1 lines providing Internet access at a manufacturing facility but is seeing issues with the newly deployed Voice over IP (VoIP) system. Which of the following might Tuan want to consider that will not require additional bandwidth? a. Open port 53 on the perimeter firewall b. Convert the network from RIPv2 to OSPF c. Implement PoE d. Implement QoS

D.Implement QOS

Giuseppe is architecting the network for a new headquarters building that is currently in design. He wants to ensure that there is redundancy built into the network while also ensuring that there are no routing loops. Which of the following methodologies can he make use of to ensure the configuration is free of routing loops? a. Implement RSTP b. Configure the ICMP routing protocol c. Implement split horizon d. Create a DMZ

C.Implement split horizon

Jason has just been hired as the Director of IT. He is reviewing existing policies and procedures to determine how well the company has defined the roles of its employees in order to keep the organization secure and operating efficiently under any scenario. He finds that the company does not have an existing plan for how their offices in a hurricane-prone area will continue to operate during a hurricane. Which of the following plans should he consider implementing to ensure that employees at this location and supporting locations will be well prepared to both handle and continue to operate through whatever situations may arise as a result of natural disasters? a. DRP b. BCP c. NDA d. IRP

B.BCP

Carolina wants to determine which services are running on the Linux servers in a certain subnet. Which of the following tools would best perform this task? a. nmap b. telnet c. ping d. ifconfig

a.nmap

Which of the following is the default subnet mask for a class C network? a. 255.0.0.0 b. 255.255.255.0 c. 255.255.255.255 d. 255.255.0.0

B. 255.255.255.0

Which of the following IEEE standards defines how VLAN information is added to the header of frames being sent across a network? a. 802.11n b. 802.1q c. 802.3af d. 802.15.4

B. 802.1q

Caleb has just installed an open-source application on a web server to host a wiki for the customer service department. Which of the following should he do to harden the application after installation? a. Block port 443 on the firewall in front of the web server. b. Change the default password. c. Disable SSH and enable telnet on the server for remote administration. d. Configure SNMPv1 on the server to help with automation and management.

B. Change the default password

Tijuan has just gotten back from a networking security seminar where he learned about a common concept that states that people should only be given the access that they need to do their job and nothing more. Which of the following concepts did he learn about? a. concept of total control b. principle of least privilege c. allowed actions list d. minimum access requirement

B. Priniciple of least privilege

Which of the following ports is used by a website that has implemented TLS certificates? a. 389 b. 80 c. 1433 d. 443

D. 443

Tabitha has been trying to connect to a server by FTP for the past two hours, but it says that the maximum number of connections are already established. She connects via SSH and sees a single IP address has all of the connections open. Which of the following describes the type of attack that is currently in progress against this server? a. DDoS b. DoS c. Phishing

B.Dos


Related study sets

Shock NCLEX Questions, Nclex Questions for Shock - Critical Care, Sepsis NCLEX, Ch 67: shock, SIRS, MODS

View Set

Marketing Chapter 18, Chapter 16, Intro to Bus. Chapter 13, Marketing 4, Chapter 16, Chapter 16, Marketing Chapter 17, HRIM 442 Ch 17 Exam 3, Marketing Ch 17, Marketing Ch 17-19, Marketing Chapter 17 & 18, Marketing Chapter 17, mkt ch 16, Marketing 4...

View Set

Principles of Information Security

View Set

PMBOK Ch. 8 - Project QUALITY Management (PQM)

View Set