Study sets, textbooks, questions
Upgrade to remove ads
Foundations Study set
Terms in this set (100)
Sandy, the network administrator, has funding to do a major upgrade of the company's LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
Establish a network baseline
Sandy, a network administrator, wants to be able to block all already known malicious activity.Which of the following would allow her to perform this activity?
Signature Based IPS
Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
Choose the correct operating system version.
Which of the following is an example of two-factor authentication?
A username, password, and key fob number
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?
Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?
An incorrect subnet mask has been entered in the WAP configuration
Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?
Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?
Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?
Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
1. Change the encryption method to WPA
2. Enable and configure MAC filtering
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)
1. High availability
2. Fault tolerance
The location that the local network connection ends and the ISP responsibility begins is known as the?
Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?
Which of the following sizes is the fixed cell length in ATM?
Which of the following network scanners detects and sends out alerts for malicious network activity?
Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port speed to 1000 Mbps. A user's PC is no longer able to access the network. Which of the following is MOST likely the problem?
The user's NIC does not support 1Gbps
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?
The transport OSI model layer and the transport TCP/IP model layer
Which of the following network appliances would facilitate an even amount of traffic hitting each web server?
For which of the following reasons could a single server's NIC transmit packets from multiple MAC address sources?
The server contains several virtual machines and the MAC addresses are from the virtual
Which of the following cable types would have the LEAST amount of EMI?
Which of the following wireless standards operates on the same frequency as 802.11a?
Compatible with 802.11n wireless networks
Which of the following can Joe, a network technician, change to help limit war driving?
Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
Which of the following uses eight groups of characters for addressing?
A packet sniffer is MOST likely used to do which of the following?
Capture and analyze network traffic
Which of the following could Karen, a network technician, use to find the approximate location of a break in a long network cable?
Time domain reflectometer
Which of the following network access methods is the MOST secure?
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
Which of the following ports carries IMAP traffic, by default, on modern email systems?
Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?
Joe, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?
Which of the following allows for multiple backend web servers to be accessed through a single public IP address?
Port address translation
Sandy, a technician, is asked to install a wireless router in a company's public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
Block traffic from the wireless access point
Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?
Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use?
Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap?
1, 6, 11
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?
Joe, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
Which of the following would be an IP address received from APIPA?
Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this?
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
Which of the following OSI model layers is used for logical addressing?
Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference?
Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of the routing information. Which of the following protocols would be BEST for him to use?
Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter?
T568B wiring scheme is typically found on which of the following components?
Which of the following can Joe, a technician, modify on an 802.11n router that is not available as an option on 802.11 g device?
Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO).
VoIP is being implemented throughout a company and Joe, the network technician, needs to ensure that data and voice traffic do not interfere with each other. Which of the following features should be configured on a layer 3 switch to prioritize traffic for VoIP?
Sandy, a technician, is fixing a wireless network that was receiving interference from a user's cordless phone. Which of the following should Sandy configure?
Joe, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?
Which of the following security threats relies primarily on user deception and misinformation?
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
A small office has asked to have six PCs networked together by Joe. a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Joe need? (Select TWO).
1.CAT5e patch cabling
Which of the following has a DB-9 connector?
Which of the following services would Karen, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically?
Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?
Which of the following tools would Kurt, an administrator, use to identify opens and shorts?
Which of the following could Karen, a network technician, use to inspect connection setup,request, and response headers for users connecting to a web server?
A new business' web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Karen, a network administrator, which of the following is the MOST important concern for this company?
Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt's wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).
1. WEP should be replaced with WPA encryption.
2. MAC filtering should be enabled and configured.
Joe, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?
Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO).
2. Reduction of signal gain
Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?
Email sending and receiving
Which of the following services do TCP connections provide to application layer protocols? (Select TWO).
1. Large data size manageability using segmentation
2. Delivery through error recovery
Which of the following cable mediums is NOT susceptible to EMI?
Which of the following defines the range of IP addresses a DHCP server can assign?
CAT6 Ethernet cabling has a rated maximum transmission capability of:
10,000Mbps or 10 Gbps
DNS lookups for a given host are intermittently failing. Which of the following would Karen, a technician, MOST likely use to verify this problem?
Which of the following provides Kurt, a network technician, resource record information about network nodes such as canonical names?
Sandy, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
In which of the following wireless standards is MIMO used?
Which of the following would Karen, a technician, do to monitor remote traffic through an access point?
Enable an SNMP agent
Kurt, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO).
Which of the following is an example of a DHCP failover mechanism?
Kurt, an administrator, receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?
Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?
Sandy, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?
Which of the following network devices MOST likely functions as a network repeater or a bridge?
Which of the following VPN methods is BEST used for connecting a remote office to the main company office?
Kurt, an administrator, configures a device that functions at the network layer, and also has 24 collision domains. Which of the following terms BEST describes this device?
Karen, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information?
Which of the following is the third layer of the OSI model?
A firewall that operates at Layer 7 of the OSI model is known as a(n):
Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
Kurt, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Kurt perform FIRST before responding to the ticket?
Determine if anything has changed
Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
Which of the following technologies would Sandy, a technician, use to connect networks at large distances without the use of physical medium?
Once Kurt, a technician, has implemented the solution to a user's reported problem, which of the following should Kurt do NEXT?
Verify full system functionality
Joe, a user, reports that his PC is the only one that does not have network connectivity. All the wiring has been tested property and the problem still exists. Joe is getting an APIPA address. Which of the following is the MOST likely cause?
Port on the switch is disabled
Which of the following issues is a common problem in wireless infrastructures?
A switch in IDF 3 has shut down at 3 p.m. every day this week. Which of the following network tools should Karen, a technician, use to troubleshoot this problem?
Kurt, an administrator, wants to eliminate remote access to a network from all users, except those users in Kurt's own country. Which of the following security measures could he use to set up this functionality?
Users are unable to access the company's intranet website. Which of the following attacks has the network MOST likely experienced?
Kurt, a technician, spoke to a user regarding a network problem. He searched all the logs associated with the problem and pulled the change logs for the network environment. Which of the following should Kurt perform NEXT?
Establish a theory of probable cause
Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for multiple routers and switches?
Sets with similar terms
Network+ Practice Questions Volume A
Network + 100 Study Questions Set 003
Network+ - Industry Standards, Practices…
Sets found in the same folder
uCertify: N10-0006 Lesson 06 Routing IP Packets
MPLS Network Elements
Other sets by this creator
Amazon Leadership Principles
Commonly Used Ports
Switching Operations Day 10
Routing Operations Day 7
Other Quizlet sets
Microbio 102 Final
PSYCH TEST 1
MN 2104 Exam 1 Review
Exam 1 Key Terms