CompTIA Network+ (1)

30 Questions | Total Attempts: 32

SettingsSettingsSettings
Network Plus Quizzes & Trivia

.


Questions and Answers
  • 1. 
    A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?
    • A. 

      Cable certifier

    • B. 

      Multimeter

    • C. 

      Cable tester

    • D. 

      Toner probe

  • 2. 
    Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
    • A. 

      OSPF

    • B. 

      VTP trunking

    • C. 

      Virtual PBX

    • D. 

      RADIUS

    • E. 

      802.1x

  • 3. 
    Which of the following describes an IPv6 address of ::1?
    • A. 

      Broadcast

    • B. 

      Loopback

    • C. 

      Classless

    • D. 

      Multicast

  • 4. 
    A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup?
    • A. 

      ISCSI SAN

    • B. 

      FCoE SAN

    • C. 

      NAS

    • D. 

      USB flash drive

  • 5. 
    A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?
    • A. 

      Leases

    • B. 

      Helper addresses

    • C. 

      Scopes

    • D. 

      Reservations

  • 6. 
    A network technician receives the following alert from a network device:"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54"Which of the following is being monitored to trigger the alarm?
    • A. 

      Speed and duplex mismatch

    • B. 

      Wireless channel utilization

    • C. 

      Network device CPU

    • D. 

      Network device memory

    • E. 

      Interface link status

  • 7. 
    A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?
    • A. 

      PoE

    • B. 

      Port bonding

    • C. 

      VLAN

    • D. 

      Trunking

  • 8. 
    After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?
    • A. 

      Event log

    • B. 

      Syslog

    • C. 

      SIEM

    • D. 

      SNMP

  • 9. 
    A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?
    • A. 

      Configure an automated patching server

    • B. 

      Virtualize the servers and take daily snapshots

    • C. 

      Configure a honeypot for application testing

    • D. 

      Configure a test lab for updates

  • 10. 
    A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? 
    • A. 

      Utilize a FTP service

    • B. 

      Install recommended updates

    • C. 

      Send all log files through SMTP

    • D. 

      Configure the firewall to block port 22

  • 11. 
    The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?
    • A. 

      Vendor documentation

    • B. 

      Recent backups

    • C. 

      Physical IP address

    • D. 

      Physical network diagram

  • 12. 
    A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?
    • A. 

      802.11g

    • B. 

      802.11ac

    • C. 

      802.11b

    • D. 

      802.11a

  • 13. 
    A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?
    • A. 

      Network analyzer

    • B. 

      Packet analyzer

    • C. 

      Protocol analyzer

    • D. 

      Network sniffer

  • 14. 
    It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
    • A. 

      Network device power issues

    • B. 

      Network device CPU issues

    • C. 

      Storage area network issues

    • D. 

      Delayed responses from RADIUS

  • 15. 
    After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible?
    • A. 

      Reformat and install the compatible drivers.

    • B. 

      Reset Ann's equipment configuration from a backup.

    • C. 

      Downgrade the PC to a working patch level.

    • D. 

      Restore Ann's PC to the last known good configuration.

    • E. 

      Roll back the drivers to the previous version.

  • 16. 
    An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?
    • A. 

      Network map

    • B. 

      Asset management

    • C. 

      Change management

    • D. 

      Baselines

  • 17. 
    A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner?
    • A. 

      S/MIME

    • B. 

      SYSLOG

    • C. 

      PGP

    • D. 

      SNMPv3

    • E. 

      RSH

  • 18. 
    Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?
    • A. 

      The VoIP phone would request a new phone number from the unified communications server.

    • B. 

      The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

    • C. 

      The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.

    • D. 

      The VoIP phone would request a different configuration from the unified communications server.

  • 19. 
    • A. 

      802.11ac with 2 spatial streams and an 80MHz bandwidth

    • B. 

      802.11ac with 3 spatial streams and a 20MHz bandwidth

    • C. 

      802.11ac with 3 spatial streams and a 40MHz bandwidth

    • D. 

      802.11ac with 4 spatial streams and a 160MHz bandwidth

  • 20. 
    A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?
    • A. 

      Regression test

    • B. 

      Speed test

    • C. 

      Baseline

    • D. 

      Statement of work

  • 21. 
    When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?
    • A. 

      Port mirroring

    • B. 

      802.1w

    • C. 

      LACP

    • D. 

      VTP

  • 22. 
    A VLAN with a gateway offers no security without the addition of:
    • A. 

      An ACL.

    • B. 

      802.1w.

    • C. 

      A RADIUS server.

    • D. 

      802.1d.

  • 23. 
    Network segmentation provides which of the following benefits?
    • A. 

      Security through isolation

    • B. 

      Link aggregation

    • C. 

      Packet flooding through all ports

    • D. 

      High availability through redundancy

  • 24. 
    A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?
    • A. 

      Yagi

    • B. 

      Omni-directional

    • C. 

      Parabolic

    • D. 

      Patch

  • 25. 
    The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?Output:Fast Ethernet 0 is up, line protocol is upInt ip address is 10.20.130.5/25MTU 1500 bytes, BW10000 kbit, DLY 100 usecReliability 255/255, Tx load 1/255, Rx load 1/255Encapsulation ospf, loopback not setKeep alive 10Half duplex, 100Mb/s, 100 Base Tx/FxReceived 1052993 broadcasts0 input errors983881 packets output, 768588 bytes0 output errors, 0 collisions, 0 resets
    • A. 

      Set the loopback address

    • B. 

      Change the IP address

    • C. 

      Change the slash notation

    • D. 

      Change duplex to full

  • 26. 
    An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item? 
    • A. 

      Ensure patches are deployed

    • B. 

      Install an IDS on the network

    • C. 

      Configure the firewall to block traffic on port 443

    • D. 

      Implement a VPN for employees

  • 27. 
    A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST?
    • A. 

      Remove all user accounts on the server

    • B. 

      Isolate the server logically on the network

    • C. 

      Block all HTTP traffic to the server

    • D. 

      Install the software in a test environment

  • 28. 
    A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?
    • A. 

      A cloud-based antivirus system with a heuristic and signature based engine

    • B. 

      A network based firewall which blocks all inbound communication

    • C. 

      A host-based firewall which allows all outbound communication

    • D. 

      A HIDS to inspect both inbound and outbound network communication

  • 29. 
    Which of the following physical security controls prevents an attacker from gaining access to a network closet?
    • A. 

      CCTVs

    • B. 

      Proximity readers

    • C. 

      Motion sensors

    • D. 

      IP cameras

  • 30. 
    A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats?
    • A. 

      Bluesnarfing

    • B. 

      DDoS

    • C. 

      Brute force

    • D. 

      Rogue AP