Study sets, textbooks, questions
Upgrade to remove ads
CompTIA Network+ N10-005 5/11
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Fifth bunch of questions from ActualTest
Terms in this set (50)
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).
D. SSL VPN
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?
Which of the following network protocols is used for a secure command line interface for management of network devices?
A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Test the theory to determine a cause.
C. Re-establish a new theory or escalate.
D. Implement the solution or escalate as necessary.
An administrator is using a packet sniffer to try to determine what is causing the traffic on the
network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?
Which of the following should be used when throughput to the destination network is a priority?
B. Hop count
C. Reliability of the path
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user's PC?
A. System log
B. History log
C. Network sniffer
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A. Reduce the power input on the replacement servers.
B. Cover the servers with plastic tarps.
C. Purchase twice as many servers to create high availability clusters.
D. Transfer the replacement servers offsite to a data center.
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?
A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
A. The network cable connecting the NAS to the network switch is bad.
B. The network port that the appliance is connected to is assigned to the wrong VLAN.
C. Port security on the Ethernet switch has disabled the port.
D. Firewall needs to be updated for the new NAS device.
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A. Network maps
B. Traffic analysis
A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?
When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).
A. OC3 line with built-in firewall
B. DS3 line with a separate firewall
C. Cable modem with a separate firewall
D. Dial-up modem with separate firewall E. DSL router with firewall capabilities
Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server?
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?
A user's workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors?
A. History Log
B. Application Log
C. System Log
D. Security Log
Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network?
A. Wire schemes
B. Change management
C. Network diagrams
D. System baselines
Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
A. Access control list
B. Load balancer
C. Content filter
D. Proxy server
Which of the following devices can be utilized to monitor and block websites accessible by a company?
A. WINS server
B. DNS server
C. Content filter
D. Reverse proxy
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
D. MAC filtering
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
A. Load balancing internal web servers
B. Redundant network resources
C. Implement fault tolerance on the WAN
D. Implement caching engines
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
A. Traffic shaping
B. Proxy server
C. VPN concentrator
D. High availability
Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?
A. Create an ACL on the switches and routers that are dropping SIP and RTP packets.
B. Create a QoS policy prioritizing users over RTP and SIP traffic.
C. Create another VLAN for SIP and RTP traffic.
D. Create a rule to throttle SIP and RTP to 10Kbps or less.
Which of the following is the control when observing network bandwidth patterns over time?
A. Network log
C. Flow data
D. Interface statistics
The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?
A. WAP placement
B. MAC address filtering
C. Content filtering
D. Encryption type and strength
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
A. Port security
C. Firewall rules
D. Switch VLAN assignments
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
Which of the following attacks would allow an intruder to do port mapping on a company's internal server from a separate company server on the Internet?
A. SYN flood
D. FTP bounce
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
A. Syslog files
C. Network sniffer
An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?
A. Cable tester
B. Protocol analyzer
C. Load balancer
Which of the following can a network technician change to help limit war driving?
A. Signal strength
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?
Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?
A. Signature based IPS
B. Application based IDS
C. Anomaly based IDS
D. Application based IPS
Which of the following security appliances are used to only identify traffic on individual systems?
A. Host based IPS
B. Application based IPS
C. Network based IDS
D. Host based IDS
Which of the following uses SSL encryption?
Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
A. Content filter
B. Proxy server
C. Layer 3 switch
A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?
A. SSID disable
A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).
A. Preventing dictionary attacks on user passwords
B. Reducing spam from outside email sources
C. Shielding servers from attacks on internal services
D. Blocking external probes for vulnerabilities
E. Directing DNS queries to the primary server
The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:
A. patch management
B. security limitations
D. social engineering
Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availability solution?
A. Media converter
B. Proxy server
C. VPN concentrator
D. Load balancer
Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?
A. MAC filtering
C. SSL VPN
A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
A. Packet sniffer
B. Stateless firewall
C. Packet filter
D. Stateful firewall
Placeholder (the answer is A)
Sets found in the same folder
CompTIA Network+ N10-005 10/11
CompTIA Network+ N10-005 11/11
CompTIA Network+ N10-005 9/11
CompTIA Network+ N10-005 8/11
Sets with similar terms
CompTIA - Network+
CompTIA Net+ Set 2
Networking Quiz Questions
Network + 006 study
Other sets by this creator
CompTIA Network+ N10-005 1/11
CompTIA Network+ N10-005 2/11
CompTIA Network+ N10-005 4/11
CompTIA Network+ N10-005 3/11