Study sets, textbooks, questions
Upgrade to remove ads
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (101)
In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)
Memorandum of Understanding
Acceptable use policy
Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The manufacturer states that the router is capable of recognizing 4TB, however, Joe is unable to get his 3TB drive to show up on the network. Which of the following should Joe perform in order to resolve this issue?
Flash the latest firmware for his router
A company is setting up a brand new datacenter and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. Which of the following should be installed to meet the requirements?
Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?
POTS (plain old telephone service)
While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
Bend radius exceeded
While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. Which of the following should the technician use to verify if this is a concern?
The administrator would like to use the strongest encryption level possible using PSK (pre-shared key) without utilizing an additional authentication server. Which of the following encryption types should be implemented?
A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments about the rack. Which of the following is MOST likely cause of the connectivity issue and alarms?
The bend radius of the cable has been exceeded.
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?
Establish a plan to locate the rogue DHCP server.
A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct problem. Which of the following should the company do to reduce this type of action from affecting the network?
Segment the network and create a test lab for all updates before deployment
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?
A network technician is troubleshooting a network connection error, which pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO)
Given the following requirements:
-Notify administrators of Advanced Packaging Tools(APTs)
-Allow network access for clients in the lobby with a password key
Which of the following should be implemented to satisfy these conditions? (Select TWO)
UTM (Unified Threat Management)
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?
Implement a split horizon DNS
A home user reports that a speed test website shows the following information:
-Download speed: 33.3 Mbps
-Upload speed: 10.2 Mbps
Which of the following is the correct interpretation of these results?
The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO)
The RAID (redundant array of independent disks) controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?
While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following will BEST fulfill the requirement?
Which of the following can be issued from the command line to find the layer 3 hops to a remote destination?
Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?
AUP (acceptable use policy)
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?
MDF (main distribution frame)
Which of the following encryption types would MOST likely be used for securing a client-to-server VPN connection?
AES (advanced encryption standard)
A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue?
A network topology in which all the nodes have point to point connections to all other nodes is known as which of the following?
A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?
A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT?
Secure the area
An organization wants to improve its ability to detect infiltration of servers in a DMZ, IPS/IDS solutions are currently located on the edge between DMZ and Untrust, and DMZ and Trust. Which of the following can increase visibility inside the DMZ?
Layer 7 firewall
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
BGP (border gateway protocol)
A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation?
Downgrade firmware and restore backup configuration
A technician receives a report that a user's workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user's VoIP phone is routed directly under the rolling chair and has been smashed flat over time. Which of the following is the most likely cause of this issue?
Policies, procedures and end-user training are effective ways to mitigate:
Network segmentation provides which of the following benefits?
Security through isolation
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?
A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline. Which of the following is a reason why the media department is not connecting?
A company-wide audit revealed employees are using company laptops and desktops for personal gain. As a result, the company has incorporated the phrase "Company-owned IT assets are to be used to perform authorized company business only" in which of the following documents?
An administrator notices an abnormally high level of network traffic from a server. Upon logging into the server, the administrator runs the following command:
ProtoLocal AddressForeign AddressStatePID
Which of the following should the administrator use to correlate the active connections with the running service?
A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect?
Confirm the new host is compatible with 10BaseT Ethernet
Various hypervisor guests are configured to use different VLANs in the same virtualization environment through which of the following?
A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PC's with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the future?
Throttle the connection speed of the patching server to match older PCs
A user reports slow performance. A technician troubleshooting the issue users a performance monitoring tool and receives the following results:
Avg. % Processor Time = 15%
Avg. Pages/Second = 5
Avg. Disk Queue Length = 1
Based on these results, which of the following is causing a bottleneck?
A network administrator was told by the Chief Information Officer to set up a new office with a network that has redundancy. Which of the following topologies would the network administrator need to administer?
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?
Is the user able to access any network resources?
A network technician has set up a firewall and entered only three rules allowing traffic on ports 21, 110, and 25 to secure the network. Users are reporting they cannot access web pages using the URLs. Which of the following can the technician do to correct the situation?
Add a rule to the end allowing port 80 and 53.
Which of the following ports should be allowed to provide access to certain VoIP applications?
Which of the following is the main difference between TCP (transmission control protocol) and UDP (user datagram protocol)?
The TCP header implements flags, while the UDP header does not.
An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP (dynamic host configuration protocol)?
A network administrator has configured a new 100Mbps WAN circuit, but speed testing shows poor performance when downloading large files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the downloads speeds over time. The administrator checks the router interface and sees the following:
Router01#show interface eth 1/1
GigabitEthernet 1/1 is up, line is up
Hardware is GigabitEthernet, address is 000A.00BB.CC11
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Member of L2 VLAN 1, port is untagged, port state is forwarding
Which of the following is MOST likely to resolve the issue?
Remove default 802.1q tag and set to server VLAN
A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following types of monitoring should be put in place?
SNMP (simple network management protocol)
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAP's needed, it is important to reference which of the following?
A technician is being tasked to centralize the management of the switches and segment the switches by broadcast domains. The company is currently all on VLAN1 using a single private IP address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. Which of the following options would work BEST to accomplish these requirements?
Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100
Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks?
A firewall technician has received calls stating the network is running slowly. The technician has found the firewall is functioning properly. Which of the following should the technician review to determine the cause of the slow performance?
Which of the following devices actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?
Joe, an administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives "Destination Unreachable". Which of the following issues could this be?
Misconfigured Split Horizon
A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation?
A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken?
Verify system functionality
Several users at an adjacent office building report connectivity issues after a new building was built in between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption and channels are all correct. Which of the following is MOST likely the cause of this issue?
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely uses on this cable?
A technician is installing a media converter that connects a newly installed multimode connection to an existing CAT5e infrastructure. Which of the following media converter types should the technician use?
Fiber to Ethernet
Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue?
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?
RADIUS (remote authentication dial in user service)
The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the managers inquiry, which of the following did the administrator forget to do first?
Submit a change request
There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable reason the vendor made this suggestion?
It is a rapid version of spanning tree that uses BPDU to detect problems
A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram?
Which of the following would need to be configured to allow jumbo frames on a network?
MTU (maximum transmission unit)
A technician is installing is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. Which of the following rules should the technician verify FIRST?
An implicit deny is enabled
Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or earthquake?
Hot sites or cold sites
Which of the following is an example of an IPv4 address?
Host1's application generates a payload of 2500B of data and sends to Host2. When the application on Host2 receives the payload it will be?
2500B in size
A small office has an Internet connection that drops out about two times per week. It often takes until the next day for the vendor to come out and fix the issue. Which of the following should the office implement to reduce this downtime?
Workers in a company branch office are required to click on an initial web page and agree to have web serving mentioned. This is an example of:
A network technician has been tasked with connecting three 802.11a clients to an 802.11g access point that is configured for WEP and is within a 9m line of sign from the client. The clients are unable to associate with the access point. WHich of the following is MOST likely the cause of this issue?
An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence?
A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network. Which of the following should system administrator do to confirm the network is protected?
Analyze packet captures
A technician is in a large room that contains a large amount of industrial equipment. The technician would like to record the usable bandwidth between devices in a wireless network and the access point. Which of the following should the technician document?
A technician has completed a survey of a wireless network and documented signal strengths. This document is known as which of the following?
A project manager is tasked with the planning of a new network installation for a client. The client wants to ensure that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. Which of the following should the project manager provide the client?
Statement of work
Which of the following is a connectionless protocol? (Select TWO)
A user receives a new computer and now is unable to connect to a database using ODBC. Other users on the network are able to connect successfully. A technician is able to successfully ping the database server but still is unable to connect. Which of the following is the issue?
Software firewall is blocking ports
In a network that requires multilayer switches to use authentication via RADIUS/TACACS+, which of the following access control models will the switches need to utilize?
A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause?
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic?
Stateful packet inspection
An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install?
A stateless network-based firewall
A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the missing update or patch. Which of the following solutions would work BEST to present this data?
A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers?
Block all WAN to LAN traffic
A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office. The user has MOST likely:
installed the printer in ad-hoc mode
The CIO of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals?
A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application?
Fiber optic cable
A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause?
During a business trip a user connects to the hotel's wireless to send emails to customers. The user notices the next day that emails have been sent from the user's account without consent. Which of the following protocols was used to compromise the user's email password utilizing a network sniffer?
Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO)
An administrator is upgrading the switches in the server room to support 10Gbps of throughput. The switch will need to take advantage of the existing CAT6e lines that are run to each server. Which of the following Ethernet standards should be used?
Which of the following is used to proxy client requests for IP configurations across different network segments?
Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
A network administrator needs to allow employees to securely upload files to a remote server. Which of the following should be allowed on the firewall?
Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem?
Install an event management tool
Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root cause of the problem?
Joe, a system administrator, is troubleshooting an issue remotely accessing a new server on the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the new server. The server that he cannot remote to is located on the same LAN as another server that he can successfully remote to. Which of the following output from the command line would BEST resolve the problem?
C:\windows\system32>ipconfig/registerdnsWindowsIP configurationRegistration of the DNS resource records for all adapters has been initiated. Any errors will be reported in the event viewer in 15 minutes.
Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?
Which statement describes the logical topology for a LAN?
What command below can be used to reset the default GPOs to their original settings?
89J6 Which statement is correct regarding HF SITOR (NBDP) under GMDSS?
Crackers are casual hackers with a limited knowledge of computer security.
Sets found in the same folder
Network+ - Network Management
Network+ Network Architecture
Sets with similar terms
CompTIA Net+ Set 2
Networking Quiz Questions
CompTIA - Network+
Network+ N10-005 Certification
Other Quizlet sets
Biol Chp 16
Noncommunicable Diseasesand Aging
Business Information Systems Ch 1 and Ch 2
BSOC 4071-Life, Death, Body, Sexuality