Network Plus

The flashcards below were created by user allengrega on FreezingBlue Flashcards.

  1. PKI is a method of user authentication which uses which of the following?
    Certificate services
  2. A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use first to understand the NIC configuration?
    IPCONFIG
  3. A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?
    DB loss
  4. A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network?
    A. that there is strong encryption enabled and configured on the access point. B. There are no conflicts of channels in use by neighboring wireless networks.
  5. Stateful packet inspection is a security technology used by which of the following devices?
    Hardware firewall
  6. Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?
    254
  7. A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
    Stateful firewall
  8. A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause the problem?
    Channel overlap
  9. Which of the following WAN technologies uses an analog phone line to transmit data?
    DSL
  10. Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
    Traffic shaping
  11. Which of the following is the MAXIMUM rated speed for CAT5 cabling?
    100Mbps
  12. Which of the following supports faster wireless broadband speeds?
    WiMAX
  13. The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
    MDF
  14. Joe, a technician, suspect a virus has infected the network and is using up bandwidth.  He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?
    Network sniffer
  15. Which of the following allows an administrator to reference performance and configuration information if there a problem on the network? System baselines16. The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
    Physical and Data link
  16. Which of the following allows an administrator to reference performance and configuration information if there a problem on the network?
    System baselines
  17. A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?
    Netstat
  18. Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
    QoS
  19. If a NIC does not have a link light, there is a failure at which of the following OSI layers?
    Physical
  20. In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
    Tracert
  21. Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?
    Packet sniffer
  22. Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut?
    Bus
  23. A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
    EAP-TTLS
  24. Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
    WPA2-CCmp
  25. While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations.  Which of the following should an administrator use in order to connect those ports FIRST?
    Toner
  26. An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
    Implement caching engines
  27. Which of the following routing protocols utilizes the DUAL algorithm for determining beat path?
    EIGRP
  28. A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
    Faulty routing rule
  29. Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the network?
    Signature identification
  30. Which of the following port numbers is used for SNMP?
    161
  31. A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to  be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP systems?
    PoE, VLANs, QoS
  32. Which of the following IP address/subnet mask combinations represent a broadcast address?
    200.200.100.63/27 and 200.200.100.95/27
  33. The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
    DMZ
  34. A customer wants to keep cost to a minimum and has only ordered a single static IP address from ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? PAT35. Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?
    PAT
  35. Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?
    Cable certifier
  36. Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:
    virtual servers
  37. Which of the following can be used to limit wireless network access to a single computer?
    MAC address filtering
  38. Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?
    Central UPS system
  39. A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task?
    Switch
  40. SKIP
    SKIP
  41. Which of the following WAN technology types has the GREATEST latency?
    Satellite
  42. A new hired technician is sent to an alternate site to complete the build out of large scale SAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable?
    Crimper and cable tester
  43. Image Upload
    Logical network diagramImage Upload
  44. Which of the following technologies is used on cellular networks?
    CDMA
  45. Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?
    PING
  46. A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?
    Opposing antenna polarizations
  47. A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
    Change management
  48. A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
    Network sniffer
  49. Which of the following networking devices can exist at several layers of the OSI model at the same time?
    Switch and router
  50. A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of popular website. Which of the following is the MOST likely cause of the error?
    Implicit deny
  51. Image Upload
    Image Upload
  52. Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?
    Unified communications
  53. On which of the following OSI model layers would a MAC address be used?
    Data Link
  54. A system administrator is implementing an ID on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detest. Which of the following would MOST likely be installed?
    Signature based IDS
  55. A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
    ICMP
  56. Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?
    Session
  57. Which of the following does Kerberos use to authenticate?
    Tickets
  58. An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation?
    PoE
  59. A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?
    Single sign on
  60. The Network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model?
    Physical layer and Data link layer
  61. Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?
    Plenum CAT5e
  62. Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?
    110
  63. Image Upload
    Image UploadImage Upload
  64. A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?
    Run the ifconfig command on the workstation
  65. A router operates at which of the following layers of the OSI model?
    Layers 3
  66. In which of the following layers of the OSI model would MAC addressing be found?
    Data Link
  67. Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?
    Implement a software solution that facilities single sign-on authentication
  68. Which of the following resolves IP address to MAC addresses?
    ARP
  69. Which of the following WAN technologies has the HIGHEST latency?
    Satellite
  70. A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
    VLAN
  71. Which of the following can be described as a DoS attack?
    Disabling a specific service and making it unavailable to users
  72. When querying a DNS server for an AAAA record, which of the following is an appropriate response?
    3ffe:1900:4545:3:200:f8ff:fe21:67cf
  73. A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
    rogue access point
  74. A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
    PoE
  75. In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?
    Reservations
  76. Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
    Bad wiring
  77. Ann, a client, shares half of a rectangular with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?
    Set up encryption on the WAP and clients
  78. A network where all traffic feeds through a centralized gateway uses which of the following topologies?
    Star
  79. During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforce where possible. Which of the following configurations should be used in this scenario?
    WPA2, SSID disabled, and 802.11a
  80. After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason?
    Bad connectors and Bad patch cable
  81. A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution?
    Cable modem with a separate firewall and DSL router with firewall capabilities
  82. A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?
    Escalate the problem
  83. Which of the following network protocols is used to transport email between servers?
    SMTP
  84. Which of the following is used to register and resolve IP addresses with their plain language equivalents?
    DNS servers
  85. Which of the following is the BEST way to prevent new users from connecting a wireless access point, but still allow already connected users to continue to connect?
    Create a MAC filter containing the current users
  86. Which of the following standards can operate at either 20MHz or40MHz channel spacing?
    802.11n
  87. Which of the following wireless standards provide speeds up to 150Mbps?
    802.11n
  88. A strong network firewall would likely support which of the following security features for controlling access?
    MAC filtering and port filtering
  89. A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
    Kerberos
  90. Which of the following is the difference between 802.11b and 802.11g?
    Speed
  91. Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
    Firewall rules
  92. Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
    802.11b
  93. A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex?
    Auto-negotiate
  94. Which of the following TCP/IP model layers does the OSI model Presentation layer map to?
    Application
  95. Which of the following would a technician do to monitor remote traffic through an access point?
    Enable an SNMP agent
  96. Image Upload
    Layer 6
  97. Image Upload
    Host based IDS
  98. Image Upload
    Fault tolerance
  99. Image Upload
    An incorrect subnet mask has been entered in the WAP configuration
  100. Image Upload
    DDos
  101. Image Upload
    IDS
  102. Which of the following wireless security measures, although widely implemented, does not provide strong security?
    MAC address filtering
  103. Which of the following wireless standards woul BEST allow a company toutilize new and old devices on the GHz spectrum while allowing for the highest possible speeds?
    N
  104. An adminstrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened?
    20,21
  105. A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements?
    Port mirroring and VLANs
  106. Which of the following is the common port used for IMAP?
    143
  107. Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem?
    EMI
  108. A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?
    A router
  109. 802.11 can operate at which of the following frequencies?
    802.11 can operate at which of the following frequencies?
  110. Which of the following is the MOST secure way to prevent malicious changes to a firewall?
    Console access only
  111. A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic?
    VLAN assignments
  112. Image Upload
    Image Upload
  113. Which of the following is the Telco end of a T1 demarc?
    Smart jack
  114. Which of the following OSI layers allows users to access network services such as file sharing?
    Layer 7
  115. A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
    Man-in-the-middle
  116. Which of the following uses port 23 by default?
    TELNET
  117. A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
    MAC address filtering
  118. A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?
    Patch cable
  119. Which of the following reduces the deployment cost of a wireless LAN?
    PoE
  120. A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
    NSLOOKUP
  121. Which of the following provides secure access to a network device?
    SSH
  122. Which of the following network devices restricts traffic based on words, signatures, and URLs?
    Content filter
  123. A user is unable to access any network resources. The IP configuration of the workstation is as follows:
    Change the IP address to 192.168.10.33
  124. Which of the following would be the BEST solution for IDS to monitor known attacks?
    Signature-based
  125. An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?
    SMTP
  126. A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?
    The router is not the only DHCP server
  127. Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber?
    1000BaseX
  128. A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?
    Static IPs
  129. Users are reporting that some Internet websites are not accessible anymore. Which of the following  will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?
    TRACERT
  130. Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?
    PING
  131. Ann, a network technician, has been troubleshooting a connectivity problems in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?
    Document findings
  132. After a network technician has added a new workstation and cabling the network, users report the network is very slow.  The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?
    A switching loop was created
  133. Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?
    Cable is run too close to a fluorescent light
  134. A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
    WAP placement
  135. The APIPA address 169.254.10.123 falls into which of the following class of addresses?
    B
  136. A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
    Establish a theory
  137. Spanning-Tree Protocol is used with which of the following network devices?
    Switch
  138. When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host name connected on the network?
    Nbstat
  139. Which of the following BEST describes the definition of DCHP?
    DHCP is utilized to dynamically lease IP addresses to hosts
  140. Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
    SSH
  141. A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
    Traffic analysis
  142. Image Upload
    SSID mismatch
  143. Management has decided that they want a high level security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
    Proxy server
  144. Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated> which of the following is BEST used to decrease the impact of web surfing?
    Caching
  145. The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?
    The installation exceeds the link limitations
  146. Which of the following components of wiring distribution is referred to as the core communications closet for an organization?
    MDF
  147. Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows Image Upload
    Incorrect gateway
  148. Which of the following connectors is usable in SFP modules?
    LC
  149. hich of the following commands can a network technician use to check the DNS server for a given domain is reachable?
    DIG
  150. The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented?
    DMZ
  151. A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?
    Latency
  152. Which of the following network topologies describes a network where each node is connected to every other node?
    Mesh
  153. Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?
    Patch panel
  154. A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
    QoS
  155. Which of the following DNS records is used to identify a domain’s SMTP server?
    MX
  156. An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
    Packet sniffer
  157. Which of the following is a common physical network topology?
    Star
  158. The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:
    patch management
  159. Which of the following should be used when throughout to the destination network is a priority?
    Bandwidth
  160. Which of the following would MOST likely be used by a network administrator to test DNS resolution?
    DIG
  161. Which of the following connector types are used in terminating singlemode fiber cables?
    LC and SC
  162. Assigning the same IP address to a network device is which of the following?
    Reservation
  163. In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used 802.11n?
    MIMO, OFDM
  164. Image Upload
    Port filtering
  165. Image Upload
    Logical network diagrams
  166. Image Upload
    AllowICMP to pass  through the Router
  167. Which of the following devices can be utilized to monitor and block websites accessible by a company?
    Content filter
  168. Image Upload
    VPN between routers located in each office space
  169. Image Upload
    Port security on the Ethernet switch has disabled the port
  170. Image Upload
    The route of last resort is missing
  171. Image Upload
    Enable MAC address filtering
  172. Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?
    FTP bounce
  173. When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
    802.1q
  174. Which of the following remote access types requires a certificate for connectivity?
    SSH
  175. Which of the following is the FASTEST Ethernet technology?
    10GBaseSR
  176. Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?
    Reservations
  177. At which of the following layers do frames exist?
    OSI model Data link layer and TCP/IP model Network Interface layer
  178. Image Upload
    ServerA
  179. Which of the following is the definition of a DNS server?
    Translates FQDN’s to IP addresses
  180. Image Upload
    Split cables
  181. Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?
    RJ-45
  182. Which of the following can function in am unsecure mode?
    SNMPv3
  183. Which of the following is needed when using WPA2-Enterprise wireless encryption?
    RADIUS
  184. Image Upload
    Protocol analyzer
  185. Image Upload
    ipconfig
  186. Image Upload
    Two factor authentication
  187. Image Upload
    Protocol analyzer
  188. Which of the following is a terminal emulator used to manage a network device?
    PuTTy
  189. Image Upload
    SSL VPN
  190. Honeypots and honeynets are different in which of the following ways?
    Honeynets are managed collections of honeypots
  191. Which of the following commands displays the routing table on a server or workstation?
    Route
  192. Image Upload
    ifconfig and ipconfig
  193. Which of the following is an example of a CSMA/CD medium?
    Ethernet
  194. Which of the following protocols is MOST commonly used for the transfer of router configuration files?
    TFTP
  195. Whiles working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate?
    It is the default route
  196. Image Upload
    VLAN mismatch
  197. Which of the following protocols is MOST commonly associated with VoIP?
    SIP
  198. Which of the
    following network protocols is used to resolve FQDNs to IP addresses?
    DNS
  199. Which of the following monitoring devices are used only to recognize suspicious
    traffic from specific software?
    Application based IDS
  200. Image Upload
    Signal bounce
  201. Image Upload
    Lower signal strength or interference
  202. Image Upload
    Improper VLAN assisgnment
  203. Image Upload
    The wired network should be run with at least CAT6 cabling
  204. The wired network should be run with at least CAT6 cabling
    25
  205. Image Upload
    Ask the users for more information, such as which applications were not functioning
  206. Which of the following commands will provide an administrator with number of hops a packet takes from host to host?
    Traceroute
  207. Image Upload
    Application Log
  208. Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
    Network sniffer
  209. Management wants to be sure that the exiting wiring infrastructure conforms to CAT5e standards. Which of the following is the correct tool?
    Cable certifier
  210. Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?
    A
  211. Image Upload
    Virtual PBX
  212. Image Upload
    White Green
  213. Which of the following features can BEST be used to facilitate authorized remote access to a network.
    VPN concentrator
  214. Which of the following TCP ports are used by FTP?
    20, 21
  215. A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall?
    Shielding servers from attacks on internal services and Blocking external probes vulnerabilities
  216. A user’s laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured?
    WAP radio power
  217. Image Upload
    168W
  218. Image Upload
    Syslog server logs
  219. Which of the following protocols works at the LOWEST layer of the OSI model?
    L2TP
  220. Which of the following is the MAXIMUM potential speed of CAT5e UTP cable?
    1000BaseT
  221. A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
    Dictionary file
  222. Which of the following 802.11 standards transmits the signals the GREATEST distance?
    N
  223. Image Upload
    Change management
  224. Which of the following uses SSL encryption?
    HTTPS
  225. Which of the following DHCP properties defines the size of the pool of available IP addresses?
    Scope
  226. Image Upload
    QoS
  227. Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
    IP filtering
  228. Which of the following is an example of a Class C address?
    192.168.1.105
  229. Image Upload
    DSL
  230. Which of the following cable types supports the FURTHEST distance when connecting various MDFs?
    Singlemode
  231. The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?
    MAC address filtering
  232. hich of the following connectors are MOST commonly used on a POTS line?
    RJ-11
  233. Image Upload
    ipconfig
  234. Image Upload
    The network gateway is set incorrectly
  235. Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?
    DHCP
  236. Image Upload
    Honeypot
  237. Which of the following defines a rack located in office building between the main rack and other office equipment?
    IDF
  238. After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
    Establish a theory of probable cause
  239. Which of the following security methods is used to attract users attempting to gain unauthorized access systems within a single network?
    Honeynet
  240. Image Upload
    Encryption set to Open in Building B
  241. Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
    MPLS
  242. Image Upload
    Redo the cable’s connectors
  243. Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
    Evil twin
  244. Which of the following technologies can cause interference for 802.11g?
    Bluetooth
  245. Image Upload
    Transfer the replacement servers offsite to a data center
  246. Which of the following could be installed to allow a home user with one desktop computer to economically have Internet access in every room in the house?
    Broadband over powerline
  247. Which of the following cable types is required to run through an air duct?
    Plenum
  248. IN a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?
    Quality of service
  249. Image Upload
    Asset management
  250. Image Upload
    Use a wireless controller
  251. Companies trying to cut down on constant documentation of IP addresses could use which of following?
    Dynamic IP addressing
  252. Image Upload
    Create another VLAN for SIP and RTP traffic
  253. A proxy server would MOST likely be installed to provide which of the following functions?
    Content filtering and website caching
  254. An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this?
    Packet sniffer and Port mirroring
  255. Which of the following network protocols is used for a secure command line interface for management of network devices?
    SSH
  256. Image Upload
    PoE
  257. Which of the following does Kerberos provide?
    Authentication
  258. Image Upload
    ipconfig
  259. Image Upload
    Change the channel to a different channel than the other wireless network s
  260. Image Upload
    The administrator should create exclusions for the servers IP addresses
  261. A technician see suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
    MAC filtering
  262. Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup?
    Traffic shaping and Quality of service
  263. Which of the following technologies is used to connect public networks using POTS lines?
    PSTN
  264. Which of the following uses classless subnet masks across a network?
    CIDR
  265. Which of the following fiber types is MOST often used indoors?
    Multimode
  266. Image Upload
    Re-establish a new theory or escalate
  267. Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
    Load balancer
  268. Which of the following is always true when a router selects a destination?
    The most specific route is selected over the default gateway
  269. At which of the following layers of the OSI model does ASCII work?
    Presentation
  270. Which of the following uses distance vector algorithms to determine the BEST network route to a destination?
    RIP
  271. A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?
    WPA2
  272. SKIP
    SKIP
  273. Image Upload
    Re-run the network cabling so that they 12inches or more away from electrical lines
  274. Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
    Decreasing radio strength
  275. A user intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoots this issue?
    SNMP
  276. Which of the following can a network technician change to help limit war driving?
    Signal strength
  277. Image Upload
    Outside interface shutdown
  278. Image Upload
    SNMP and Syslog
  279. Which of the following technologies allows multiple staff members to connect back to a centralized office?
    VPN
  280. Which of the following is a path vector routing protocol?
    BGP
  281. Image Upload
    RDP
  282. Which of the following switch features allows for both incoming and outgoing data physical ports at the same time?
    Full-duplex
  283. Image Upload
    WEP
  284. Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?
    VPN concentrator
  285. Image Upload
    TXRX reversed
  286. A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?
    Implicit deny is blocking all traffic
  287. A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?
    Channels
  288. Image Upload
    Image Upload
  289. Which of the following is the control when observing network bandwidth patterns over time?
    Baseline
  290. Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection?
    Media converter
  291. Image Upload
    Dig
  292. Image Upload
    STP
  293. Which of the following is a Class A IP address?
    10.4.0.1
  294. Image Upload
    Image Upload
  295. Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released?
    DHCP lease
  296. Image Upload
    Change SSID in Building C to match Building A
  297. Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availiablity solution?
    VPN concentrator
  298. Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
    Man-in-middle attack
Author:
allengrega
ID:
267585
Card Set:
Network Plus
Updated:
2014-03-23 22:55:35
Tags:
Network Plus CompTIA
Folders:

Description:
COMPTIA Network Plus Exam
Show Answers: