Study sets, textbooks, questions
Upgrade to remove ads
CompTIA Network+ N10-005 9/11
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Ninth bunch of questions from ActualTest
Terms in this set (50)
A user is trying to connect to the wireless network in the office but is unable to establish a
consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?
A. Adjust the signal strength of the access points with minimal coverage overlap.
B. Increase the pool in each of the access points to avoid running out of IPs.
C. Configure each access point to use a different method of encryption than the others.
D. Reconfigure each of the access points so that they broadcast different SSIDs.
Which of the following wireless standards is the only one capable of operating in either of the 802.11 wireless spectrums?
Which of the following WAN technologies has the highest latency?
Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?
A. FTP and basic Internet traffic
B. HTTPS and IMAP traffic
C. DNS and TELNET traffic
D. VPN and RDP traffic
A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
A. Closing off port 25 on the firewall
B. Closing off port 53 on the firewall
C. Turning off the SMTP service on the email server
D. Turning off the IMAP service on the email server
Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?
A. Content filter
B. VPN concentrator
C. Load balancer
D. Proxy server
The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?
A. Configure Wi-Fi Multimedia support
B. Use only 20 MHz channel bandwidth
C. Enable band steering to use 802.11n
D. Configure Quality of Service
The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?
A. Cable tester
C. Toner probe
D. Cable certifier
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
A. An IP filtering ACL
B. A MAC filtering ACL
C. A port filtering ACL
D. A class matching ACL
A user has three different subnets in an office. Which of the following can be configured to allow two of the subnets to communicate directly with each other at the switch level?
A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason?
A. Channels below 9 overlap each other
B. Channel width is set to 40MHz
C. Channels are in the 5GHz range by mistake
D. Channel 1 should have been set to 11 to avoid an overlap
A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?
B. Cable tester
C. Lineman's handset
D. Toner probe
Which of the following uses types and codes rather than ports?
A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?
A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?
Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the
following could be the cause of this failure?
A. Duplicate IP address
B. Incorrect subnet mask
C. Incorrect gateway
D. Wrong DNS
Which of the following protocols are used to provide accurate time to network devices?
Which of the following provides the STRONGEST security for a tunneled connection over the Internet?
After deploying a network switch, the network administrator is unable to remotely administer the
device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue?
Management LAN: 192.168.10.0/24
Management interfacE. 192.168.10.2 255.255.255.0 Default gateway: 192.168.11.1
STP is enabled
A. VLAN assignment
B. Wrong subnet mask
C. Switching loop
D. Wrong gateway
Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?
A. Proxy server
B. Content filter
C. Load balancer
D. VPN concentrator
Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this?
A. Reconfigure the access points from 802.11b to 802.11g.
B. Establish procedures which limit user connections during peak hours.
C. Configure the access points so that they all use different SSIDs.
D. Move one or more access points, minimizing signal overlap.
A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?
A. Two-factor authentication
B. Biometric security
C. Multi-factor authentication
D. Single factor authentication
A technician has set up a wired network IP scheme with the following specifications: DHCP: 192.168.1.100-150
Which of the following is represented by this addressing scheme?
D. Dynamic with static reservation
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
A. Single sign-on
B. Network access control
C. PKI authentication
D. Two-factor authentication
A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?
A. Two-factor authentication
B. Network access control
C. Multifactor authentication
D. Single sign-on
A company has a server with redundant power supplies. Which of the following is this an example of?
A. Traffic shaping
B. Caching engines
C. Fault tolerance
D. Load balancing
A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?
A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
A. Broadcast storm
B. TX/RX cables reversed
C. Mismatched MTU
D. Incorrect routing table
Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?
A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?
A. AP isolation
C. Evil twin
D. Rogue AP
A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?
A. Escalate to the management team
B. Change the IP address back to its previous state
C. Test the theory by analyzing logs
D. Create a plan of action to present to management
Which of the following are standard fiber cable connector types? (Select TWO).
A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?
D. Straight cable
Hubs are differentiated from switches in that between the two, only hubs have:
A. a single collision domain.
B. a single broadcast domain.
C. multiple collision domains.
D. multiple broadcast domains.
The phone company has provided a channelized T1 line. Which of the following should this line be connected to?
Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?
A. BNC connection
B. 110 block
D. LC connector
A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?
C. Evil twin
D. War driving
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?
A. Baseline analyzer
C. Protocol analyzer
A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following?
A. Strong RC4 encryption
B. Shared secret keys
C. AES encryption
D. Key rotation
A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?
A. Social engineering
B. Packet sniffing
C. Rogue access point
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?
A. Signal strength
B. SSID name
C. WPA2 encryption
D. WEP encryption
A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?
A. NIC bonding
B. Proxy server
C. Firewall ACLs
Which of the following assists a network administrator in reverse engineering malware and viruses?
A. Virtual switches
B. Virtual machines
A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?
A. Identify the problem
B. Question the user
C. Establish a plan of action
D. Establish a theory of probable cause
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).
E. Data Link
At which layer of the OSI model do MAC addresses operate?
A. Data Link
A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access
other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments?
A. The newly installed switch is defective and must be returned.
B. The newly installed switch is using a different MAC address than the previous switch.
C. The technician forgot to change the VTP mode on the new switch to server.
D. The technician did not use the correct cable when trunking the new switch.
A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host?
A. The network administrator should install and configure a traffic analysis server.
B. The network administrator should install and configure a DMZ server.
C. The network administrator should install and configure a syslog server.
D. The network administrator should install and configure a network sniffer.
Sets found in the same folder
CompTIA Network+ N10-005 10/11
CompTIA Network+ N10-005 11/11
CompTIA Network+ N10-005 8/11
CompTIA Network+ N10-005 7/11
Sets with similar terms
CompTIA Net+ Set 2
CompTIA - Network+
Network+ N10-005 Certification
Network + 006 study
Other sets by this creator
CompTIA Network+ N10-005 1/11
CompTIA Network+ N10-005 2/11
CompTIA Network+ N10-005 4/11
CompTIA Network+ N10-005 3/11