CompTIA Network+ (4)

30 Questions | Total Attempts: 50

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Questions and Answers
  • 1. 
    • A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert:
    • 1 * * * Request timed out.
    • 2 * * * Request timed out.
    • 3 * * * Request timed out.
    •  
    • The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network?
    • A. 

      Enable split horizon to allow internal tracert commands to pass through the firewall

    • B. 

      Enable IGMP messages out and block IGMP messages into the network

    • C. 

      Configure the firewall to allow echo reply in and echo request out of the network

    • D. 

      Install a backdoor to access the router to allow tracert messages to pass through

  • 2. 
    A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).
    • A. 

      1000Base-LR

    • B. 

      1000Base-SR

    • C. 

      1000Base-T

    • D. 

      10GBase-LR

    • E. 

      10GBase-SR

    • F. 

      10GBase-T

  • 3. 
    • A. 

      Network

    • B. 

      Application

    • C. 

      Data link

    • D. 

      Transport

  • 4. 
    Which of the following requires the network administrator to schedule a maintenance window?
    • A. 

      When a company-wide email notification must be sent.

    • B. 

      A minor release upgrade of a production router

    • C. 

      When the network administrator's laptop must be rebooted.

    • D. 

      A major release upgrade of a core switch in a test lab.

  • 5. 
    The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.1x

  • 6. 
    Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?
    • A. 

      CSMA/CD

    • B. 

      OSPF

    • C. 

      DOCSIS

    • D. 

      BGP

  • 7. 
    A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened?
    • A. 

      445

    • B. 

      3389

    • C. 

      5004

    • D. 

      5060

  • 8. 
    Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?
    • A. 

      Configuration procedures

    • B. 

      Stakeholder notification

    • C. 

      Impact analysis

    • D. 

      Rollback procedure

  • 9. 
    Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
    • A. 

      RS-232

    • B. 

      56k modem

    • C. 

      Bluetooth

    • D. 

      Codec

    • E. 

      SIP

  • 10. 
    Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths?
    • A. 

      DWDM

    • B. 

      SONET

    • C. 

      ADSL

    • D. 

      LACP

  • 11. 
    Which of the following WAN technologies is associated with high latency?
    • A. 

      T1

    • B. 

      Satellite

    • C. 

      Cable

    • D. 

      OCx

  • 12. 
    Which of the following is used to define how much bandwidth can be used by various protocols on the network?
    • A. 

      Traffic shaping

    • B. 

      High availability

    • C. 

      Load balancing

    • D. 

      Fault tolerance

  • 13. 
    Which of the following network topologies has a central, single point of failure?
    • A. 

      Ring

    • B. 

      Star

    • C. 

      Hybrid

    • D. 

      Mesh

  • 14. 
    A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST?
    • A. 

      Compatibility requirements

    • B. 

      Environment limitations

    • C. 

      Cable length

    • D. 

      Equipment limitations

  • 15. 
    A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which of the following environmental conditions should be considered when deciding whether or not to use plenum-rated cables?
    • A. 

      Workstation models

    • B. 

      Window placement

    • C. 

      Floor composition

    • D. 

      Ceiling airflow condition

  • 16. 
    A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?
    • A. 

      Public SaaS

    • B. 

      Private SaaS

    • C. 

      Hybrid IaaS

    • D. 

      Community IaaS

  • 17. 
    Which of the following refers to a network that spans several buildings that are within walking distance of each other?
    • A. 

      CAN

    • B. 

      WAN

    • C. 

      PAN

    • D. 

      MAN

  • 18. 
    Which of the following helps prevent routing loops?
    • A. 

      Routing table

    • B. 

      Default gateway

    • C. 

      Route summarization

    • D. 

      Split horizon

  • 19. 
    Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
    • A. 

      Multilayer switch

    • B. 

      Access point

    • C. 

      Analog modem

    • D. 

      DOCSIS modem

  • 20. 
    An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?
    • A. 

      The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.

    • B. 

      The administrator should configure each vSAN participant to have its own VLAN.

    • C. 

      The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).

    • D. 

      The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

  • 21. 
    A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?
    • A. 

      Star

    • B. 

      Ring

    • C. 

      Mesh

    • D. 

      Bus

  • 22. 
    A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?
    • A. 

      HTTPS

    • B. 

      Fibre channel

    • C. 

      ISCSI

    • D. 

      MS-CHAP

  • 23. 
    The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?
    • A. 

      Layer 3 switch

    • B. 

      Proxy server

    • C. 

      Layer 2 switch

    • D. 

      Smart hub

  • 24. 
    A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
    • A. 

      Document the scene

    • B. 

      Forensics report

    • C. 

      Evidence collection

    • D. 

      Chain of custody

  • 25. 
    During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).
    • A. 

      RSA

    • B. 

      Passwords

    • C. 

      Man traps

    • D. 

      Biometrics

    • E. 

      Cipher locks

    • F. 

      VLANs

    • G. 

      3DES

  • 26. 
    A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?
    • A. 

      Disable the network based firewall

    • B. 

      Implicit deny all traffic on network

    • C. 

      Configure a VLAN on Layer 2 switch

    • D. 

      Add the system to the DMZ

  • 27. 
    • A firewall ACL is configured as follows:
    •  
    • 10. Deny Any Trust to Any DMZ eq to TCP port 22
    • 11. Allow 10.200.0.0/16 to Any DMZ eq to Any
    • 12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
    • 13. Deny Any Trust to Any DMZ eq to Any
    •  
    • A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?
    • A. 

      11, 10, 12, 13

    • B. 

      12, 10, 11, 13

    • C. 

      13, 10, 12, 11

    • D. 

      13, 12, 11, 10

  • 28. 
    A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using?
    • A. 

      DNS poisoning

    • B. 

      ARP poisoning

    • C. 

      Reflection

    • D. 

      SYN attack

  • 29. 
    Which of the following is a security benefit gained from setting up a guest wireless network?
    • A. 

      Optimized device bandwidth

    • B. 

      Isolated corporate resources

    • C. 

      Smaller ACL changes

    • D. 

      Reduced password resets

  • 30. 
    A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?
    • A. 

      ARP inspection

    • B. 

      Intrusion detection system

    • C. 

      Web content filtering

    • D. 

      Port filtering