CompTIA Network+ (2)

30 Questions | Total Attempts: 33

SettingsSettingsSettings
Network Plus Quizzes & Trivia

.


Questions and Answers
  • 1. 
    A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?
    • A. 

      Hardware firewall

    • B. 

      Proxy server

    • C. 

      Software firewall

    • D. 

      GRE tunneling

  • 2. 
    A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted?
    • A. 

      DWDM

    • B. 

      MIMO

    • C. 

      TEMPEST

    • D. 

      DOCSIS

  • 3. 
    Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?
    • A. 

      Quarantine network

    • B. 

      Core network

    • C. 

      Guest network

    • D. 

      Wireless network

  • 4. 
    An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?
    • A. 

      Smurf attack

    • B. 

      VLAN hopping

    • C. 

      Bluesnarfing

    • D. 

      Spear phishing

  • 5. 
    A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy? 
    • A. 

      Install host-based anti-malware software

    • B. 

      Implement MAC filtering on all wireless access points

    • C. 

      Add an implicit deny to the core router ACL

    • D. 

      Block port 80 outbound on the company firewall

    • E. 

      Require users to utilize two-factor authentication

  • 6. 
    An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with the fewest security issues?
    • A. 

      Consent to monitoring

    • B. 

      Business continuity measures

    • C. 

      Vulnerability scanning

    • D. 

      End-user awareness training

  • 7. 
    A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points?
    • A. 

      Port forwarding

    • B. 

      MAC filtering

    • C. 

      TLS/TTLS

    • D. 

      IP ACL

  • 8. 
    Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform?
    • A. 

      Erase the files created by the virus

    • B. 

      Stop and escalate to the proper authorities

    • C. 

      Check the remaining directories for more .mp4 files

    • D. 

      Copy the information to a network drive to preserve the evidence

  • 9. 
    Which of the following describes a smurf attack?
    • A. 

      Attack on a target using spoofed ICMP packets to flood it

    • B. 

      Intercepting traffic intended for a target and redirecting it to another

    • C. 

      Spoofed VLAN tags used to bypass authentication

    • D. 

      Forging tags to bypass QoS policies in order to steal bandwidth

  • 10. 
    Which of the following technologies is designed to keep systems uptime running in the event of a disaster?
    • A. 

      High availability

    • B. 

      Load balancing

    • C. 

      Quality of service

    • D. 

      Caching engines

  • 11. 
    Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?
    • A. 

      Compromised system

    • B. 

      Smurf attack

    • C. 

      SQL injection attack

    • D. 

      Man-in-the-middle

  • 12. 
    Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?
    • A. 

      SOP

    • B. 

      BEP

    • C. 

      AUP

    • D. 

      SLA

  • 13. 
    A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?
    • A. 

      Use TFTP for tested and secure downloads

    • B. 

      Require biometric authentication for patch updates

    • C. 

      Provide an MD5 hash for each file

    • D. 

      Implement a RADIUS authentication

  • 14. 
    A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?
    • A. 

      WPA2

    • B. 

      IPv6

    • C. 

      SNMPv3

    • D. 

      RIPv2

  • 15. 
    A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?
    • A. 

      Document the findings and action taken.

    • B. 

      Establish a plan to locate the rogue DHCP server.

    • C. 

      Remove the rogue DHCP server from the network.

    • D. 

      Identify the root cause of the problem.

  • 16. 
    Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?
    • A. 

      Via SSH using the RADIUS shared secret

    • B. 

      Via HTTP using the default username and password

    • C. 

      Via console using the administrator's password

    • D. 

      Via SNMP using the default RO community

  • 17. 
    When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?
    • A. 

      Transport layer

    • B. 

      Physical layer

    • C. 

      Network layer

    • D. 

      Session layer

  • 18. 
    A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?
    • A. 

      The gateway is misconfigured on the new router.

    • B. 

      The subnet mask is incorrect on the new router.

    • C. 

      The gateway is misconfigured on the edge router.

    • D. 

      The SSID is incorrect on the new router.

  • 19. 
    A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?
    • A. 

      EMI

    • B. 

      RFI

    • C. 

      Cross-talk

    • D. 

      Bad wiring

  • 20. 
    An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following? 
    • A. 

      The OSPF not-so-stubby area is misconfigured

    • B. 

      Reduced wireless network coverage

    • C. 

      Spanning tree ports in flooding mode

    • D. 

      BGP routing issues

  • 21. 
    A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?
    • A. 

      Host-based intrusion detection systems

    • B. 

      Acceptable use policies

    • C. 

      Incident response team

    • D. 

      Patch management

  • 22. 
    A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?
    • A. 

      Does the printer have toner?

    • B. 

      Are there any errors on the printer display?

    • C. 

      Is the user able to access any network resources?

    • D. 

      Is the printer powered up?

  • 23. 
    A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?
    • A. 

      Establish a theory of probable cause.

    • B. 

      Document actions and findings.

    • C. 

      Determine next steps to solve the problem.

    • D. 

      Determine if anything has changed.

  • 24. 
    A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?
    • A. 

      Configure NAT on the firewall

    • B. 

      Implement a split horizon DNS

    • C. 

      Place the server in the DMZ

    • D. 

      Adjust the proper internal ACL

  • 25. 
    A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue?
    • A. 

      Update the DNS server with the proxy server information

    • B. 

      Implement a split horizon DNS server.

    • C. 

      Reboot the web proxy and then reboot the DNS server.

    • D. 

      Put the proxy server on the other side of the demarc.

  • 26. 
    While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem?
    • A. 

      Default gateway address

    • B. 

      Misconfigured DNS

    • C. 

      DHCP server

    • D. 

      NIC failure

  • 27. 
    A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem?
    • A. 

      Distance limitation

    • B. 

      Electromagnetic interference

    • C. 

      Cross talk

    • D. 

      Speed and duplex mismatch

  • 28. 
    A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?
    • A. 

      Username is misspelled is the device configuration file

    • B. 

      IDS is blocking RADIUS

    • C. 

      Shared secret key is mismatched

    • D. 

      Group policy has not propagated to the device

  • 29. 
    A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause?
    • A. 

      The wrong wavelength was demuxed from the multiplexer.

    • B. 

      The SFP in the multiplexer is malfunctioning.

    • C. 

      There is a dirty connector on the fiber optic cable.

    • D. 

      The fiber optic cable is bent in the management tray.

  • 30. 
    Which of the following is the main difference between TCP and UDP?
    • A. 

      TCP data flows in two directions, while UDP data flows from server to client.

    • B. 

      The TCP header implements flags, while the UDP header does not.

    • C. 

      The TCP header implements checksum, while the UDP header does not

    • D. 

      TCP connections can be secured by stateful firewalls, while UDP connections cannot.