Chapter 6
Practice Exam 1

  1. Which of the following are the layers in the standard three-tier datacenter architecture? (Choose all that apply.)
    1. Core
    2. Intermediate
    3. Distribution
    4. Access
  2. You are a new hire at Adatum Corp., and this is your first day on the job. You are setting up your workstation, but you are unsure whether you are permitted to install your favorite software on the company's computer. The Human Resources server has a large library of employee documents. Which of the following is a document that you might want to consult to determine whether personal software is allowed?
    1. SLA
    2. AUP
    3. NDA
    4. BYOD
  3. You are working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps would you be least likely to perform first when troubleshooting the problem?
    1. Check the configuration of the router connecting the Local Area Network (LAN) to the Internet.
    2. Ask the user if she can access resources on the local network.
    3. Check to see if anyone else is experiencing the same problem.
    4. Check the user's job title to see if she is an important person in the company.
  4. Which of the following is not a means of preventing unauthorized individuals from entering a sensitive location, such as a datacenter?
    1. Key fobs
    2. Motion detection
    3. Biometric scans
    4. Identification badges
  5. You are an IT consultant who has been contracted to install new computers on a client's Gigabit Ethernet network. You want the performance of the new computers to be as good as it can be, so you configure their network adapters to run at the full speed of 1 Gbps and to use full-duplex communication. You test the computers after installing them, and they function well. However, once the computers are in service, you begin getting complaints from the client of extremely poor network performance on the new machines. You return to the site that evening and run some ping tests, but you do not detect any problem. You call in a colleague to perform a packet analysis, and she detects large numbers of packet collisions, late collisions, Cyclic Redundancy Check (CRC) errors, and runt frames. Which of the following could be the cause of the problem?
    1. Damaged cables
    2. Transmit/Receive (TX/RX) reversal
    3. Duplex mismatch
    4. Incorrect cable type
  6. Which of the following is a wireless topology that does not require the use of an access point?
    1. Star
    2. Ad hoc
    3. Bus
    4. Infrastructure
  7. You want to create a network in which computers from different departments are assigned to separate Virtual Local Area Networks (VLANs). You also want to be able to forward traffic between the VLANs so that each computer is capable of accessing any other computer. Which of the following will enable you to perform all these functions with a single device?
    1. Load balancer
    2. Virtual router
    3. Multilayer switch
    4. Broadband router
  8. Which of the following are standard terms used in data loss prevention to describe specific data states? (Choose all that apply.)
    1. Data on-line
    2. Data at-rest
    3. Data in-motion
    4. Data in-use
  9. Temporal Key Integrity Protocol (TKIP) is an encryption protocol that was introduced in the IEEE 802.11 wireless network standards to replace another protocol that was found to be easily penetrated. Which of the following 802.11 wireless security protocols uses TKIP for encryption?
    1. AES
    2. WEP
    3. WPA
    4. WPA2
  10. You have been asked by your supervisor in the IT department to test some newly installed cable runs. She hands you the tool shown in the following figure. What is the function of the tool and how do you use it?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end.
    2. When you touch the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it.
    3. When you connect the tool to the end of a fiber-optic cable, you can measure the length of the cable run.
    4. When you attach the tool to the end of a twisted-pair cable, it tests for crosstalk and other performance characteristics.
  11. A multifactor authentication system consists of at least two different identifying criteria, typically falling into two of the following categories: something you have, something you do, something you know, and something you are. Which of the following authentication factors is an example of something you have?
    1. A password
    2. A fingerprint
    3. A smartcard
    4. A finger gesture
  12. Which of the following are port numbers used for Structured Query Language (SQL) communications? (Choose all that apply.)
    1. 1433
    2. 3389
    3. 1521
    4. 3306
  13. At a garage sale, you purchase some 802.11a wireless network adapter cards for desktop computers at a very low price. Your plan is to use them to expand your 802.11g home network. After installing one of the adapters in a computer, you attempt to connect to the network, but you cannot see the Service Set Identifier (SSID) in the list of available networks. You try installing a different adapter, thinking the first one might be broken, but the second one does not work either. What can you do to resolve the problem and connect the computer to your network?
    1. Configure the access point to use the 5 GHz frequency.
    2. Move the computer closer to the access point.
    3. Manually enter the SSID in the computer's wireless network client software.
    4. Nothing. 802.11a equipment cannot connect to an 802.11g network.
  14. Parity is a fault tolerance technique used by disk storage arrays in which an additional parity bit is stored for a specified number of data bits. By using the parity information, the storage subsystem can calculate the values of bits that have been lost due to a disk failure, enabling the system to re-create the lost data. Redundant Array of Independent Disks (RAID) is a type of storage array that sometimes uses parity to provide fault tolerance. Which of the following RAID levels provide fault tolerance by using parity data? (Choose all that apply.)
    1. RAID 0
    2. RAID 1
    3. RAID 5
    4. RAID 6
    5. RAID 10
  15. You are setting up an 802.11n wireless network using the 2.4 GHz frequency band. You plan to install three Wireless Access Points (WAPs). Which of the following channels should you use for your access points to avoid channel overlap that can result in interference? (Choose all that apply.)
    1. 1
    2. 4
    3. 6
    4. 8
    5. 11
  16. Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be server hardening techniques? (Choose all that apply.)
    1. Upgrading server firmware
    2. Disabling unnecessary services
    3. Creating privileged user accounts
    4. Disabling unused TCP and UDP ports
  17. You are working the IT help desk when a user calls to report that he cannot access the Internet, although he is able to connect to computers on the local network. At the user's workstation, you run the ipconfig /all command and examine the output. Which of the options is the most likely explanation for the user's problem, based on the following ipconfig results?
    Windows IP Configuration
     
       Host Name . . . . . . . . . . . . : Client12
       Primary Dns Suffix  . . . . . . . : 
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
     
    Ethernet adapter Local Area Connection:
     
       Connection-specific DNS Suffix  . : 
       Description . . . . . . . . . . . : PCIe Family Controller
       Physical Address. . . . . . . . . : 60-EB-69-93-5E-E5
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2
       IPv4 Address. . . . . . . . . . . : 192.168.23.234
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM
       Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM
       Default Gateway . . . . . . . . . : 192.168.216.99
       DHCPv6 IAID . . . . . . . . . . . : 241232745
       DHCPv6 Client DUID  . . . . . . . : 00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
       DNS Servers . . . . . . . . . . . : 192.168.22.114
       NetBIOS over Tcpip. . . . . . . . : Enabled
    1. DHCP is not enabled.
    2. The Subnet Mask setting is incorrect.
    3. The Default Gateway setting is incorrect.
    4. The DNS Servers setting is located on another network.
  18. Which of the following are typical examples of the Internet of Things (IoT)? (Choose all that apply.)
    1. A television remote control
    2. A key fob that unlocks your car
    3. A smartphone app for your home thermostat
    4. A remotely monitored cardiac pacemaker
    5. A refrigerator with an internal camera
  19. When an internal Windows user logs on to an Active Directory domain, which of the following protocols authenticates the user?
    1. Kerberos
    2. WPA2
    3. RADIUS
    4. EAP-TLS
  20. You are installing an ADSL router for your company's new branch office. The router has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN1. When you plug a laptop into one of the Ethernet ports, you can access the Internet with no difficulties. You now need to connect the ADSL router to the company network so that the Wireless Access Points (WAPs) on the network can provide users with Internet access through the ADSL router. However, when you plug the router into a network switch port that is assigned to VLAN4, the switch starts generating “Native VLAN mismatch detected” errors once every minute. Which of the following steps should be part of the solution you implement to stop the error messages from appearing? (Choose all that apply.)
    1. Create a VLAN1 on the network switch.
    2. Configure the network switch port connected to the router to use VLAN1.
    3. Create a VLAN4 on the ADSL router's switch module.
    4. Configure the router port connected to the network switch to use VLAN4.
  21. Which of the following steps will not help to prevent war driving attacks from compromising your wireless network? (Choose all that apply.)
    1. Configure your clients and access point to use WEP security.
    2. Configure your clients and access point to use WPA2 security
    3. Configure your access point not to broadcast its SSID.
    4. Configure your access point to use a longer SSID.
  22. You have just created a new virtual machine using remote controls provided by a cloud service provider on the Internet. You then install Windows Server on the virtual machine and configure it to function as a web server. Which of the following cloud architectures are you using when you do this? (Choose all that apply.)
    1. IaaS
    2. PaaS
    3. SaaS
    4. Public cloud
    5. Private cloud
    6. Hybrid cloud
  23. It is your first day working for a consultant that does network cable installations. Your new boss hands you a spool of Category 6 cable, a bag of little clear plastic components, and the tool shown in the following figure. He then tells you to “get started on fives and tens.” What is your new boss expecting you to do?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. Pull cable runs
    2. Attach keystone connectors
    3. Install a patch panel
    4. Create patch cables
  24. Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client?
    1. 110
    2. 25
    3. 143
    4. 80
  25. You are a consultant who has been hired to extend a network by a client that is still running thin Ethernet. Which of the following cable types will you have to bring with you to add thin Ethernet network segments?
    1. RG-8
    2. RG-58
    3. RJ45
    4. RJ11
  26. Which of the following types of cable is never used to connect a workstation to an Ethernet network?
    1. Rollover
    2. Straight-through
    3. Crossover
    4. Plenum
    5. Shielded
  27. Which of the following protocols does Internet Protocol Security (IPSec) use to provide data origin authentication by digitally signing packets before transmitting them over the network?
    1. AH
    2. SSL
    3. ESP
    4. RDP
  28. You have constructed a network on which all of the computers are connected to a single switch. You then create Virtual Local Area Networks (VLANs) on the switch, corresponding to the company's departments, and add the switch port for each user workstation and department server to the appropriate VLAN. Later, users report that while they can access their departmental servers and the workstations of other users in the same department, they cannot communicate with any of the other departments. What is the problem, and what must you do to correct it?
    1. There is a faulty VLAN configuration on the switch. You must re-create all of the VLANs and configure each VLAN for routing.
    2. VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
    3. The VLANs are using different data link layer protocols. You must configure the VLANs to use the same data link layer protocol in order for them to communicate with each other.
    4. One of the VLANs is configured to filter all of the other VLAN traffic for security purposes. You must change the filter on this one VLAN.
  29. The TCP/IP term socket consists of which of the following elements? (Choose all that apply.)
    1. Port number
    2. MAC address
    3. IP address
    4. Subnet mask
  30. You are installing a cable modem to provide your home network with access to the internet through your cable television provider. The cable modem is a multifunction device that the cable company says provides everything you need for a home network. Which of the following network functions does a home cable modem typically provide? (Choose all that apply.)
    1. DHCP server
    2. Wireless Access Point
    3. Broadband router
    4. Ethernet switch
    5. Proxy server
    6. RADIUS server
  31. Which of the following Domain Name System (DNS) resource records is not used for forward name resolution?
    1. PTR
    2. CNAME
    3. AAAA
    4. MX
  32. Which of the following are tasks that can be performed by a protocol analyzer that could provide potential intruders with information about the network? (Choose all that apply.)
    1. A protocol analyzer can decrypt protected information in packets captured from the network.
    2. A protocol analyzer can detect open ports on network systems and launch attacks against them.
    3. A protocol analyzer can display the IP addresses of the systems on the network.
    4. A protocol analyzer can display the application data in packets captured from the network.
  33. Which of the following services are provided by a RADIUS server? (Choose all that apply.)
    1. Attenuation
    2. Authentication
    3. Assistance
    4. Authorization
    5. Accounting
  34. Some users are having a problem connecting to an application server on their local network. You go to their department and start to troubleshoot the problem by testing connectivity using the ping tool at one of the user workstations. You discover that you can ping the server successfully using its computer name, but pinging the computer's fully qualified domain name (FQDN) fails. As a result of these tests, which of the following can you determine is the most likely source of the problem?
    1. EMI
    2. DHCP
    3. DNS
    4. ACL
  35. You have been given the job of devising a plan to provide a 500-node private internetwork with access to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized Internet users. There are two secondary objectives for the project: one is to provide a means of monitoring and regulating the users' Internet activities, and the other is to avoid having to manually configure IP addresses on each one of the client computers. You submit a proposal that calls for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, which are connected to the Internet. Which of the following statements about your proposed Internet access solution is true?
    1. The proposal satisfies the primary objective and both of the secondary objectives.
    2. The proposal satisfies the primary objective and one of the secondary objectives.
    3. The proposal satisfies the primary objective but neither of the secondary objectives.
    4. The proposal fails to satisfy both the primary and secondary objectives.
  36. Which of the following cloud service models provides the consumer with the least amount of control over the cloud resources?
    1. IaaS
    2. PaaS
    3. SaaS
    4. IaaS, PaaS, and SaaS all provide the same degree of control.
  37. The jumbo frame capability is associated with which networking protocol?
    1. Ethernet
    2. Internet Protocol (IP)
    3. Point-to-Point Protocol (PPP)
    4. Transmission Control Protocol (TCP)
  38. You are working your company's IT help desk, where you are required to follow a specific troubleshooting protocol when handling calls from users. In which of the following troubleshooting steps would you create a trouble ticket?
    1. Establish a theory of probable cause
    2. Verify full system functionality and, if applicable, implement preventive measures
    3. Identify the problem
    4. Test the theory to determine the cause
    5. Document findings, actions, and outcomes
    6. Implement the solution or escalate as necessary
    7. Establish a plan of action to resolve the problem and identify potential effects
  39. You are working your company's help desk when a user calls to report that he cannot access any of the data on his computer. He says that a message has appeared on his screen stating that all of his data has been encrypted by the FBI and that it will be decrypted only after he pays $768 in Bitcoin to an unknown address. The user wants to know if he is responsible for making the payment. Which of the following types of attacks has the user experienced?
    1. Denial-of-Service
    2. War driving
    3. Ransomware
    4. ARP poisoning
  40. Which of the following Wide Area Network (WAN) services provide unequal amounts of upstream and downstream bandwidth? (Choose all that apply.)
    1. SDSL
    2. CATV
    3. ADSL
    4. FCoE
  41. Network cable runs generally connect office endpoints, such as wall plates, to a central cabling nexus, which is typically where the runs are joined to a backbone network that links them together. Which of the following are terms for such nexuses where network cabling connections are found? (Choose all that apply.)
    1. RDP
    2. IDF
    3. MDF
    4. MTBF
  42. Your supervisor has asked you to call the cabling contractor your company uses and make an appointment to install some new twisted-pair cable runs. In addition to asking how many cable runs you need pulled, the contractor asks you if you need plenum or PVC. Under which of the following conditions might the local building code require that a data network use plenum cable?
    1. When cable runs exceed the maximum length specified by the physical layer specification
    2. When cables must run through air ducts
    3. When cables run near to devices that generate electromagnetic interference (EMI)
    4. When multiple cables run through the same conduit
  43. Which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance?
    1. Port aggregation
    2. Link aggregation
    3. Bonding
    4. Clustering
    5. NIC teaming
  44. You have been asked by the director of the IT department to review the security status of the network device administration procedures currently in use. You know that network device hardening has as one of its first principles the use of secure protocols over insecure ones. Which of the following suggestions are examples of this principle that you should suggest to the director? (Choose all that apply.)
    1. Use WEP instead of WPA2.
    2. Use TKIP instead of AES.
    3. Use HTTPS instead of HTTP.
    4. Use SSH instead of Telnet.
  45. The Simple Network Management Protocol (SNMP) works by processing information gathered from agents installed or embedded in network devices and displaying the information on a central console. Which of the following is the term used for the database in which SNMP agents store information about their properties?
    1. MIB
    2. Trap
    3. Syslog
    4. SIEM
  46. When a web browser connects to a web server using an address with the https:// prefix, the connection is secured using Transmission Control Protocol (TCP) and an encryption protocol. Which of the following are protocols that are typically used to secure communication between web servers and web browsers? (Choose all that apply.)
    1. TLS
    2. SSH
    3. DTLS
    4. SSL
  47. A screened subnet is a segment that is exposed to the Internet and separated from the internal network by a firewall. Administrators typically use a screened subnet for servers that must be accessible by outside users, such as web and email servers. Which of the following is another term for a screened subnet?
    1. PEAP
    2. DMZ
    3. VLAN
    4. TKIP
  48. Which of the following types of traffic is not exchanged by Remote Desktop clients and servers using the Remote Desktop Protocol (RDP)?
    1. Keystrokes
    2. Mouse movements
    3. Display information
    4. Application data
  49. You have been engaged to design a Wireless Local Area Network (WLAN) for a site you have never seen. For that reason, you want the WLAN to be able to support both the 2.4 GHz and 5 GHz frequencies. Which of the following IEEE 802.11 WLAN standards should you look for when you are shopping for equipment that supports both frequencies? (Choose all that apply.)
    1. 802.11a
    2. 802.11b
    3. 802.11g
    4. 802.11n
    5. 802.11ac
    6. 802.11ax
  50. Which of the following statements about multitenancy in a public cloud datacenter is not true?
    1. Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.
    2. Multitenancy separates tenants by assigning each one its own virtual machine.
    3. Multitenancy reduces the cost of utilities and other overhead.
    4. Multitenancy introduces the possibility of competition for bandwidth with other tenants.
  51. You have been asked to evaluate the security provided by the cryptographic algorithms in use on your network. Which of the following are not cryptographic algorithms used for file hashing? (Choose all that apply.)
    1. RC4
    2. MD5
    3. AES
    4. SHA
  52. When starting her new position as a network administrator, Alice was given two user accounts. One account is intended for standard user activities, and another has the additional permissions needed for Alice to perform administrative tasks. This is an example of which of the following security concepts?
    1. Zero day
    2. Least privilege
    3. Defense in depth
    4. Multifactor authentication
  53. You are in the process of troubleshooting a user's computer that is malfunctioning. Which step of the troubleshooting model involves replacing computer components until you have identified a faulty hardware device?
    1. Establish a plan of action to resolve the problem
    2. Duplicate the problem
    3. Gather information
    4. Verify full system functionality
    5. Test the theory to determine the cause
    6. Document findings, actions, and outcomes
    7. Establish a theory of probable cause
  54. An insider threat is most likely to be detectable by which of the following types of physical security?
    1. Motion detection
    2. Smartcards
    3. Biometrics
    4. Video surveillance
  55. Which of the following network interface occurrences is considered to be a malfunction on a full-duplex Ethernet network but is not a malfunction on a half-duplex Ethernet network?
    1. Runts
    2. Late collisions
    3. Giants
    4. Collisions
  56. A protocol analyzer is a tool that captures packets from a network and examines their contents. Which of the following Unix/Linux tools is a protocol analyzer?
    1. nmap
    2. tcpdump
    3. pathping
    4. iptables
  57. A Storage Area Network (SAN) typically takes the form of a dedicated network used to provide servers with access to hard disk arrays and other storage devices. Which of the following statements about the differences between a SAN and Network Attached Storage (NAS) are true? (Choose all that apply.)
    1. NAS devices typically provide a filesystem, while SAN devices do not.
    2. NAS provides file-level storage access, whereas a SAN provides block-level storage access.
    3. NAS devices typically contain integrated iSCSI targets.
    4. SAN devices have an operating system, whereas NAS devices do not.
  58. Your supervisor has just informed you that the CIO has hired an outside consultant to perform penetration testing on the company network. Which of the following best describes what you can expect the consultant to do?
    1. Evaluate the security conditions on the network
    2. Create computers or networks that are alluring targets for intruders
    3. Attempt to compromise the network's security measures
    4. Implement a new companywide security protocol
  59. Your company is a contractor for the government that regularly works with highly sensitive defense data. To prevent this data from being compromised, the company's datacenter has various special security measures installed. All of the servers have crimped metal tags holding the cases closed. All of the hardware racks are locked in clear-fronted cabinets. All of the cable runs are installed in transparent conduits. These are all examples of which of the following types of physical security measure?
    1. Geofencing
    2. Port security
    3. Tamper detection
    4. Asset tracking
  60. Wavelength division multiplexing is a technique for carrying multiple fiber-optic signals on a single network medium. There are several types of this multiplexing technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is one of the ways in which these types of multiplexing differ?
    1. They carry different numbers of channels on a single medium.
    2. They use different wavelength spacings.
    3. They provide different amounts of signal amplification.
    4. They use different forms of amplitude modulation.
  61. Which of the following protocols use tunneling to establish secured links between TCP/IP systems? (Choose all that apply.)
    1. L2TP
    2. IPSec
    3. MGRE
    4. NAT
  62. Your supervisor has given you a Class C network IP address and has asked you to create a network with 8 subnets and 30 hosts per subnet. Which of the following subnet masks will you have to use?
    1. 255.255.255.128
    2. 255.255.255.192
    3. 255.255.255.224
    4. 255.255.255.240
    5. 255.255.255.248
    6. 255.255.255.252
  63. You are a consultant working at a client site. The client has supplied you with the Service Set Identifier (SSID) and the passphrase for the company's wireless network so that you can connect to it with your laptop. However, you are unable to establish a connection. Which of the following security measures might be preventing you from connecting your laptop to the network?
    1. Geofencing
    2. MAC filtering
    3. Using WPA2
    4. Disabling SSID broadcasts
  64. You have just finished installing a new Category 5e cable run for the first time. After attaching keystone connectors to both ends of the cable, you mount the office-side connector to a wall plate and mount the datacenter connector into a patch panel. Then you take a patch cable and connect the patch panel port to an open port in one of the network switches. However, the link pulse LED on the switch port does not light as it is supposed to. What should you do next?
    1. Repull the cable run using Category 6 cable.
    2. Check the cable run for wiring faults.
    3. Make sure the switch port is not disabled.
    4. Plug a computer into the wall plate.
  65. Devices on a TCP/IP network typically use the Address Resolution Protocol (ARP) to locate specific destinations on the local network by resolving IP addresses into Media Access Control (MAC) addresses (also known as hardware addresses). At which layer of the Open Systems Interconnection (OSI) model do these MAC addresses operate?
    1. Physical
    2. Data link
    3. Network
    4. Transport
  66. Many network diagrams use Cisco symbols to illustrate the locations of and relationships between network components. Cisco symbols are standardized pictographs that illustrate the basic function of a network component. In a network diagram that uses Cisco symbols, what component does the symbol in the figure represent?
    image
    1. A hub
    2. A switch
    3. A router
    4. A gateway
  67. Address Resolution Protocol (ARP) poisoning is the deliberate insertion of fraudulent information into the ARP cache stored on computers and switches. Which of the following types of attack can be facilitated by ARP poisoning? (Choose all that apply.)
    1. Social engineering
    2. Man in the middle
    3. Evil twin
    4. Session hijacking
  68. Recently, your network has been the target of numerous attack attempts. To gather information about the attackers, you have created a server that is designed to function as an enticing target but that does not provide access to any legitimately sensitive services or information. Which of the following is the term used to describe this technique?
    1. Spoofing
    2. DMZ
    3. Root guard
    4. Honeypot
  69. You are a consultant working on a new client's network. The network has been in place for decades, and you have been given a diagram supplied by the original installer. The diagram says that the network computers are connected to a device called a multiport repeater. Which of the following devices can also be described as a multiport repeater?
    1. Hub
    2. Bridge
    3. Switch
    4. Router
  70. When you run a port scanner on a server, which of the following is the result?
    1. A list of the servers currently running user processes
    2. A list of the computer's hardware ports that are currently in use
    3. A list specifying the numbers of packets transmitted and received by each network adapter on the system
    4. A list of open ports through which the system can be accessed
    5. A list of the IP addresses used by all the devices on the local network
  71. Your company has a seven-node failover cluster hosting databases on SQL Server. Each server has three network interface adapters installed in it. Two are standard Gigabit Ethernet adapters that provide the nodes with access to each other and clients with access to the cluster. One is a Fibre Channel adapter that provides the cluster nodes with access to a dedicated network that also hosts a large hard disk array. Which of the following terms describe the networks to which the cluster nodes are connected? (Choose all that apply.)
    1. SAN
    2. PAN
    3. WAN
    4. MAN
    5. LAN
  72. A Windows user calls you at the help desk and reports that he cannot connect to any hosts on either the local network or a remote network. This is the only report of its kind you have received today. You question the user about the problem and eventually learn that he has made some changes to his workstation's Internet Protocol (IP) settings. What should you do next?
    1. Check the switches in the datacenter to see if they have logged any error messages.
    2. Verify that the routers on the network are functioning.
    3. Run the ipconfig command on the user's workstation to view its configuration.
    4. Check the network's Domain Name System (DNS) server to see if it is resolving IP hostnames.
  73. You are a network administrator attempting to use your workstation on the internal network to remotely control a web server called WebServ1 on the perimeter network. However, the remote desktop client software is unable to establish a connection to the server. You can see all the computers on your local network and on the perimeter network. You try using the ping utility to test the TCP/IP functionality of WebServ1, and the ping test is successful. You then call your colleague on the same internal network and have her try to connect to WebServ1 using the same remote access tool. She connects to WebServ1 successfully. Which of the following could be the cause of the problem you are experiencing?
    1. Blocked TCP/UDP ports on the web server
    2. Name resolution failure
    3. Incorrect firewall settings on your workstation
    4. Unresponsive service on the web server
  74. The toolkit you were given when you began work for an IT consulting company contained the tool shown in the following figure. What is the function of this tool?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. When you touch the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it.
    2. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end.
    3. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector.
    4. When you connect the tool to the end of a fiber-optic cable, you can measure the length of the cable run.
  75. You are designing a new wireless network based on the IEEE 802.11n standard. The equipment you have selected supports both the 2.4 GHz and 5 GHz frequencies, and you are undecided about which one to use. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a Wireless Local Area Network (WLAN)? (Choose all.)
    1. The 5 GHz frequency has more channels than the 2.4 GHz frequency.
    2. The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
    3. The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
    4. The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.
  76. What is the name of the tool shown in the following figure?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. Crimper
    2. Tone generator and locator
    3. Butt set
    4. Punchdown tool
  77. Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?
    1. FTP
    2. SNMP
    3. NTP
    4. HTTP
  78. You are configuring the computers on a new network, and you have been given the network address 10.26.0.0/13. Which of the following subnet mask values must you use when configuring the computers?
    1. 255.248.0.0
    2. 255.252.0.0
    3. 255.254.0.0
    4. 255.255.248.0
    5. 255.255.252.0
    6. 255.255.254.0
  79. You are testing a twisted-pair cable run using a tone generator and locator. When you apply the tone generator to each of the first seven wires at one end of the cable, you successfully detect a tone on the corresponding pin at the other end. However, when you connect the tone generator to the eighth wire, you fail to detect a tone at the other end. Which of the following fault types have you discovered?
    1. Short circuit
    2. Open circuit
    3. Split pair
    4. Crosstalk
  80. Which of the following functions are defined as occurring at the session layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)
    1. Data encryption
    2. Dialog control
    3. Datagram routing
    4. Dialog separation
  81. You are working your company's IT help desk, and you have had several calls from users who are reporting problems with their Voice over Internet Protocol (VoIP) and streaming video connections. In each case, the audio or video connection experiences frequent dropouts in sound or video, causing frustrating interruptions. Which of the following terms describes a connectivity problem on a wired network that could cause these symptoms?
    1. Jitter
    2. Latency
    3. Bottleneck
    4. Attenuation
  82. You are a consultant with a client who wants to have you install a wireless network with the highest throughput currently available. What can you tell your client is the fastest speed achievable by a Wireless Local Area Network (WLAN) using the currently ratified IEEE 802.11 standards?
    1. 54 Mbps
    2. 600 Mbps
    3. 1.3 Gbps
    4. 2.6 Gbps
  83. A private network uses unregistered IP addresses that are not accessible from the Internet. For computers on the private network to access Internet servers, there must be a device that substitutes registered IP addresses for the unregistered ones. Which of the following devices are capable of performing this kind of IP address substitution? (Choose all that apply.)
    1. RADIUS server
    2. NAT router
    3. UTM appliance
    4. Proxy server
  84. A user calls you at the technical support desk in the computer store where you work. He is installing a home network and is having trouble configuring the IP addresses for his computers. He starts reading off a list of the network addresses he has tried to use. Which of the following are valid IPv4 network addresses that the user can conceivably use to configure his computers? (Choose all that apply.)
    1. 1.1.1.0
    2. 9.34.0.0
    3. 103.256.77.0
    4. 229.6.87.0
  85. Which of the following terms refers to a routing protocol that relies on hop counts to measure the efficiency of routes through an internetwork?
    1. Link state protocol
    2. Distance vector protocol
    3. Edge gateway protocol
    4. Interior gateway protocol
  86. You have been hired by a client to connect two local area networks together, which are in different buildings 500 meters apart. The cable type you use must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Which of the following cable types can you choose to meet the client's needs? (Choose all that apply.)
    1. Single-mode fiber-optic cable
    2. Thin coaxial cable
    3. Multimode fiber-optic cable
    4. Shielded Twisted Pair (STP) cable
    5. Unshielded Twisted Pair (UTP) cable
  87. You receive a call at the IT help desk from a user who has recently moved to a new office in the company building, down the hall from her old one. Since the move, she has only been able to access the company's wireless network with her laptop intermittently. The network is based on 802.11n equipment, and it is using the 2.4 GHz frequency and the WPA2 security protocol. The user never had a problem in her previous office location. Which of the following could not possibly be the cause of her problem? (Choose all that apply.)
    1. The user's laptop is connecting to the wrong SSID.
    2. The user's laptop is configured to use the 5 GHz frequency.
    3. The user's new office is farther from the access point than her old one.
    4. There are more intervening walls between the user's new office and the access point.
    5. The user's laptop is configured with the wrong WPA2 passphrase.
  88. Which of the following statements about static routing are not true? (Choose all that apply.)
    1. Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.
    2. Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.
    3. Static routes are a recommended solution for large internetworks with redundant paths to each destination network.
    4. Static routes are a recommended solution for small internetworks with a single path to each destination network.
    5. Static routes adapt to changes in the network infrastructure automatically.
  89. Which layer of the Open Systems Interconnection (OSI) model has its own logical addressing system and is responsible for routing packets from one network to another?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  90. There are several marketing consultants working in your office for the first time, and they have approached you because they are unable to connect to the company's 802.11g wireless network with their laptops. They are selecting the correct Service Set Identifier (SSID) from the Available Networks list, but they still cannot connect, and there are no error messages of any kind. Which of the following tasks should you perform first to try to resolve the problem?
    1. Examine the area where the consultants are working for possible sources of signal interference.
    2. Change the frequency used by the wireless access point from 2.4 GHz to 5 GHz.
    3. Make sure that the consultants' laptops are configured to use the correct wireless security protocol.
    4. Check the network adapters in the laptops for channel overlap.
  91. You are researching the various types of Storage Area Network (SAN) technologies currently available before making a purchasing recommendation to your IT director. Which of the following are genuine advantages of iSCSI over Fibre Channel? (Choose all that apply.)
    1. iSCSI can share the same network as standard Local Area Network (LAN) traffic; Fibre Channel cannot.
    2. iSCSI is routable, whereas Fibre Channel is not.
    3. iSCSI is less expensive to implement than Fibre Channel.
    4. iSCSI includes its own internal flow control mechanism; Fibre Channel does not.
  92. In which of the following Domain Name System (DNS) transactions does the querying system generate an iterative query? (Choose all that apply.)
    1. A DNS client extracts the server name www.adatum.com from a URL and sends it to its designated DNS server for resolution.
    2. A client's DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.
    3. A client's DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.
    4. A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its Internet Service Provider's (ISP's) DNS server for resolution.
    5. A client's DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www .
  93. A user approaches you as you are passing through his department and reports that he cannot access the Internet. After questioning him, you determine that he can access systems on the local network, however. You examine the routing table on the user's Windows workstation, and you see the problem. Which of the following commands must you run to correct the user's problem, based on the routing table display shown here?
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
            127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
            127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
      127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
          192.168.2.0    255.255.255.0         On-link      192.168.2.37    281
         192.168.2.37  255.255.255.255         On-link      192.168.2.37    281
        192.168.2.255  255.255.255.255         On-link      192.168.2.37    281
            224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
            224.0.0.0        240.0.0.0         On-link      192.168.2.37    281
      255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
      255.255.255.255  255.255.255.255         On-link      192.168.2.37    281
    ===========================================================================
    Persistent Routes:
      None
    1. route add 192.168.2.0 MASK 0.0.0.0 192.168.2.37 METRIC 25 IF 192.168.2.99
    2. route add 0.0.0.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37
    3. route add 192.168.2.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37
    4. route add 0.0.0.0 MASK 0.0.0.0 192.168.2.99 METRIC 25 IF 192.168.2.37
  94. You are heading out to do a cabling job for a client who has coaxial and twisted-pair Ethernet networks at their facility. You want to bring connectors and cables to prepare for any eventuality. Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)
    1. N-type
    2. BNC
    3. F-type
    4. RJ45
    5. DB-9
  95. When geofencing is used as part of a multifactor authentication system, which of the following best describes geofencing's role?
    1. Somewhere you are
    2. Something you do
    3. Something you have
    4. Something you know
  96. Some organizations maintain alternative sites that they can use as datacenters should a disaster render the main datacenter unusable. Which of the following types of disaster recovery site can be made operational in the shortest amount of time?
    1. A hot site
    2. A warm site
    3. A cold site
    4. All of the site types require the same amount of preparation time.
  97. Which of the following types of Virtual Private Network (VPN) connection is the best solution for connecting a home user to a corporate network?
    1. Host-to-site
    2. Site-to-site
    3. Host-to-host
    4. Extranet
  98. Which of the following are valid reasons why the leaf and spine datacenter topology is superior to the standard three-tier topology? (Choose all the apply.)
    1. The leaf and spine topology is less expensive to implement than the three-tier topology.
    2. In a leaf and spine topology, all data flows require the same number of hops.
    3. The leaf and spine arrangement uses a full mesh switching topology.
    4. The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
  99. A baseline is a performance measurement for a device or system, taken under normal operating conditions, which you can use later to quantify any changes that might have taken place. Which of the following Windows applications would you most likely use to create a baseline of system or network performance?
    1. Syslog
    2. Event Viewer
    3. Network Monitor
    4. Performance Monitor
  100. In most cases, a Denial-of-Service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?
    1. Amplified
    2. Distributed
    3. Permanent
    4. Reflective
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.76.166