CompTIA Network+ (3)

30 Questions | Total Attempts: 35

SettingsSettingsSettings
Network Plus Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which of the following PDUs is used by a connectionless protocol?
    • A. 

      Frames

    • B. 

      Segments

    • C. 

      Streams

    • D. 

      Datagram

  • 2. 
    When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO).
    • A. 

      Layer 2

    • B. 

      Layer 3

    • C. 

      Layer 5

    • D. 

      Transport layer

    • E. 

      Data link

    • F. 

      Physical layer

  • 3. 
    A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram?
    • A. 

      Building layout

    • B. 

      Patch panel labeling

    • C. 

      Packet sniffing

    • D. 

      Naming conventions

  • 4. 
    In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO).
    • A. 

      Rack monitoring

    • B. 

      Device placement

    • C. 

      Wall plate labeling

    • D. 

      Room numbering

    • E. 

      Patch panel labeling

  • 5. 
    Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
    • A. 

      Firewall

    • B. 

      Router

    • C. 

      802.11 AP

    • D. 

      Switch

  • 6. 
    A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network?
    • A. 

      802.11a

    • B. 

      802.11ac

    • C. 

      802.11b

    • D. 

      802.11g

  • 7. 
    A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?
    • A. 

      MLA

    • B. 

      MOU

    • C. 

      SOW

    • D. 

      SLA

  • 8. 
    A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error?
    • A. 

      Only FTP can be used to copy configurations from switches

    • B. 

      Anonymous users were not used to log into the TFTP server

    • C. 

      An incorrect password was used and the account is now locked

    • D. 

      Port 69 is blocked on a router between the network segments

  • 9. 
    An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?
    • A. 

      Fire suppression

    • B. 

      Mantraps at the entry

    • C. 

      HVAC

    • D. 

      UPS and battery backups

  • 10. 
    A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?
    • A. 

      10.0.0.1

    • B. 

      127.0.0.1

    • C. 

      172.16.1.1

    • D. 

      192.168.1.1

  • 11. 
    An F-connector is used on which of the following types of cabling?
    • A. 

      CAT3

    • B. 

      Single mode fiber

    • C. 

      CAT5

    • D. 

      RG6

  • 12. 
    After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked?
    • A. 

      Server host file

    • B. 

      Subnet mask

    • C. 

      Local hosts file

    • D. 

      Duplex settings

  • 13. 
    A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?
    • A. 

      802.1x

    • B. 

      802.1p

    • C. 

      Single sign-on

    • D. 

      Kerberos

  • 14. 
    Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE).
    • A. 

      Default gateway

    • B. 

      Subnet mask

    • C. 

      Reservations

    • D. 

      TFTP server

    • E. 

      Lease expiration time of 1 day

    • F. 

      DNS servers

    • G. 

      Bootp

  • 15. 
    Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
    • A. 

      BGP

    • B. 

      OSPF

    • C. 

      IS-IS

    • D. 

      MPLS

  • 16. 
    A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user?
    • A. 

      The user is connected using the wrong channel.

    • B. 

      The user is connected to the wrong SSID.

    • C. 

      The user is experiencing an EMI issue.

    • D. 

      The user is connected to the wrong RADIUS server.

  • 17. 
    A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved? 
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

    • E. 

      Layer 7

  • 18. 
    A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to?
    • A. 

      Nbtstat a

    • B. 

      Show mac address-table

    • C. 

      Show interface status

    • D. 

      Show ip access-list

    • E. 

      Nslookup hostname

  • 19. 
    A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action?
    • A. 

      The normal amount of errors and the connection problem has been resolved.

    • B. 

      The interface status will indicate that the port is administratively down.

    • C. 

      The traffic will flow, but with excessive errors.

    • D. 

      The interface status will show line protocol down.

  • 20. 
    • A. 

      Use the reset button on the back of the firewall to restore it to its factory default, and then log onto

    • B. 

      Run the following command on the administrator's workstation: arp s 192.168.1.200 01:4a:d1:fa:b1:0e

    • C. 

      Use an SNMP tool to query the firewall properties and determine the correct management IP address

    • D. 

      Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1

  • 21. 
    A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

    • E. 

      67

    • F. 

      68

    • G. 

      69

  • 22. 
    A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?
    • A. 

      Star

    • B. 

      Bus

    • C. 

      Ring

    • D. 

      Mesh

  • 23. 
    A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:Interface A:IP address: 10.10.150.16Subnet mask: 255.255.255.240Default gateway: 10.10.150.32Speed: 1000 MbpsDuplex: AutoState: No ShutdownNone of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO).
    • A. 

      There is a duplex mismatch between the router and ISP.

    • B. 

      The router interface is turned off.

    • C. 

      The interface is set to the incorrect speed.

    • D. 

      The router is configured with the incorrect subnet mask.

    • E. 

      The router interface is configured with the incorrect IP address.

    • F. 

      The default gateway is configured incorrectly.

  • 24. 
    The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?
    • A. 

      Quarantine network

    • B. 

      Persistent agents

    • C. 

      Posture assessment

    • D. 

      Non-persistent agents

  • 25. 
    A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition.myClient$ wificard --getinfoagrCtlRSSI: -72agrExtRSSI: 0state: runningop mode: stationlastTxRate: 178MaxRate: 300802.11 auth: openlink auth: wpa2-pskBSSID: 0F:33:AE:F1:02:0ASSID: CafeWirelessChannel: 149,1Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
    • A. 

      The WAP is using RC4 encryption

    • B. 

      The WAP is using 802.11a

    • C. 

      The WAP is using AES encryption

    • D. 

      The WAP is using the 2.4GHz channel

    • E. 

      The WAP is using the 5GHz channel

    • F. 

      The WAP is using 802.11g

  • 26. 
    A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
    • A. 

      Load balancer

    • B. 

      VRRP

    • C. 

      OSPF

    • D. 

      BGP

  • 27. 
    A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline. Which of the following is a reason why the media department is not connecting?
    • A. 

      Wrong SSID

    • B. 

      Rogue access point

    • C. 

      Placement

    • D. 

      Channel mismatch

  • 28. 
    Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue?
    • A. 

      Signal-to-noise ratio

    • B. 

      AP configuration

    • C. 

      Incorrect SSID

    • D. 

      Bounce

  • 29. 
    A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem?
    • A. 

      802.1q is not configured on the switch port

    • B. 

      APIPA has been misconfigured on the VLAN

    • C. 

      Bad SFP in the PC's 10/100 NIC

    • D. 

      OS updates have not been installed

  • 30. 
    Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
    • A. 

      66 block

    • B. 

      BNC

    • C. 

      F-connector

    • D. 

      RJ-11