Study sets, textbooks, questions
Upgrade to remove ads
Network + 100 Study Questions Set 003
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (100)
Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a high value of NEXT. Which of the following represents the cause?
Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server is successful. Which of the following software tools is used to check if NetBIOS is enabled?
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line?
Router & Wi-Fi Access point
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?
SMTP Port 25
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this?
HTTP Port 80
As a best practice, which of the following should be assigned to a network's main server?
Static IP address
A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building, which are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?
Verify the switch has power
A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which
of the following port numbers should be the only allowed open ports on the firewall to accomplish this?
Port 80 and 443
An office would like to set up an unsecured wireless network for their customers in their lounge area. Which
of the following firewall capabilities should be configured to prevent the wireless traffic from communicating with the office's LAN traffic?
Kim, an employee, connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is she MOST likely using to establish the connection?
A new office's wireless network is causing interference with the medical office's wireless network located
next door. Which of the following should be changed to BEST prevent the interference?
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the
access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent
connectivity when using the wireless network. Which of the following would BEST improve connectivity?
Move the access point
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to
quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim?
Which of the following is the default subnet mask for a Class B address?
Which of the following default ports would need to be disabled to block TFTP traffic?
FTP port 21
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a
list of the host names connected to the network?
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?
Single mode fiber
Which of the following wireless technologies has the LARGEST cell size?
Which of the following is similar to MIMO?
Which of the following are available speeds when using 802.11b?
1 Mb/ & 5.5 Mb/s
RADAR avoidance technologies are built into which of the following technologies?
Which of the following technologies can cause interference for 802.11g?
Which of the following technologies would be used in a large office area that has a lot of 2.4GHz noise?
Which of the following occurs when antenna gain is increased on an access point?
Cell size increases
Which encryption type uses only a 28 character key?
104/128 bit WEP
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST widely used with remote access?
Which of the following uses a Management Information Base (MIB) to monitor the network?
Which of the following does SNMPv3 BEST provide over previous versions?
Which of the following is a terminal emulator used to manage a network device?
Zach, a network administrator, is tasked with simplifying the review of events from network devices.
Which of the following is used to accomplish this?
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber
jumper is good. Which of the following is the problem?
Users are reporting that Internet performance is slow. Jeff, the technician, has determined that the Internet
connection is saturated. Which of the following is BEST used to determine the source, destination, and type
of the traffic?
Which of the following is a valid IPv6 address?
Which of the following OSI model layers is responsible for the transmission of bits?
Frames are the Protocol Data Unit for which of the following layers of the OSI model?
Lisa, a network administrator, wants to automatically assign 18.104.22.168/24 addresses to computers on the
network. Which of the following will need to be configured?
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure
the office space as needed. Which networking solution would provide the BEST solution?
Wireless Access Points
An organization is considering migrating a datacenter to a different operating system. Which of the following
could the organization use to try out the new OS before making a wide-scale deployment?
Which of the following servers would MOST likely be placed in a DMZ?
Zach, a user, logs into a system and automatically has access to other network resources without having to
log in again. Which of the following is MOST likely implemented at Zach's location?
IPSec relies on which of the following protocols?
ESP & AH
Which of the following commands displays the routing table on a server or workstation?
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access.
Which of the following has MOST likely occurred?
Implicit deny is blocking all traffic.
An organization has installed a new firewall. Users need to have access to remote websites and must be
able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on
the new firewall?
Allow TCP port 22 outbound & Allow TCP port 80 outbound
Lisa, an administrator, must connect to a remote UNIX server securely. Which of the following would be the
MOST secure connection method?
How many collision domains and broadcast domains are present on a 24-port switch with no VLAN
24 collision domains, 1 broadcast domain
Which of the following commands could Lisa, a network administrator, use to determine the IP address of a
Users report that an internal web server is not responding. Which of the following commands could be used on the server to confirm that the web service is running?
Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following
commands would assist Kim in determining the computer name of the workstation?
nbtstat & net statistics
When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC
address of a local printer. Which of the following commands would be MOST helpful in determining the
After a router upgrade, Jeff, the network administrator, needs to determine if workstations still have the correct default gateway. Which of the following commands could he use?
netstat & ipconfig
Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs
can be configured on a Layer2 switch port to mitigate the attack?
After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router's public interface IP
address. Which of the following must Jeff implement to assign a different public IP from the router's public
interface IP address to one of the workstations in the office?
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
Which of the following OSI layers is responsible for encrypting HTTPS traffic?
After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause?
00:12:34:56:78 can be used in which of the following?
Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented?
Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of
1Gbps. Which of the following is the reason?
Kim, a technician, is installing network cables for an office building. Some of the cables are not showing
active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
When running cable in an office building, which of the following should Zach, a technician, consider to help reduce EMI?
Lisa, a technician, would like to look at the current configuration of a NIC. Which of the following would she
use to view this information
Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the following did she MOST likely setup?
Which of the following protocols is used by the ping command?
Which of the following could be BEST described as multiple operating system environments running at the same time on a single physical server?
Which of the following wiring components is used to move the point of entry from a Telco service provider
to a different location in a building?
Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable
from Jeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the
wire. Which of the following is the MOST probable cause of the intermittent connectivity problems?
Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other
users, and the solution was to reboot each workstation. As the first step, the technician reboots the
workstation and it does not solve the problem. Which of the following should have been done instead?
Kim, a user, has an important video conference at her cubicle in 30 minutes and Wi-Fi is not working on a
dedicated laptop. There is an available RJ-45 jack at Kim's cubicle. Which of the following is the FASTEST
solution to implement to get Kim working at her cubicle?
Use a wired connection
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?
Which of the following is the BEST encryption protocol to use to allow customers to access a secure
website from the Internet without using VPNs?
Which of the following wireless security measures, although widely implemented, does not provide strong
MAC address filtering
After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any
longer. Which of the following would be the MOST likely reason?
Bad connectors & Bad patch cable
Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the
resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?
Escalate the problem
Which of the following connector types would MOST likely be found with an analog phone system utilizing
Kim, a technician, suspects an attacker has accessed the network. Which of the following would BEST help confirm her theory?
Zach, a technician, notices a newly installed CAT5 cable is longer than the standard maximum length.
Which of the following problems would this MOST likely cause?
Which of the following circuits provides the MOST bandwidth?
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router
interfaces. Which of the following is MOST likely used as a source for creating the charts?
Which of the following technologies is associated with the DOCSIS standard?
Jeff, a network technician, has been asked to add a web server and email server to the company's network.
The company's stateful firewall must remain in place to prevent any external originating traffic from entering
the internal network segment. Which of the following is the BEST solution to ensure protecting the internal
network and implementing the new servers?
Create a DMZ
Which of the following is a contention based broadcast technology used for wireless networking?
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet)
from the IDF. Which of the following LAN technologies would be BEST to use?
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the
following utilities should be used to locate the network issue?
Which of the following are components of IPSec?
AH & ESP
In IPSec, which of the following is an agreement on how devices will securely transmit information?
An organization recently installed a firewall on the network. Employees must have access to their work
computer from their home computer. In which of the following ways should the firewall be configured?
Allow TCP port 3389 inbound
An organization recently installed a firewall on the network. Employees must be able to send and receive
email from a POP3 server. In which of the following ways should the firewall be configured? (Select
Allow TCP port 25 & Allow TCP port 110
Which of the following OSI model layers is responsible for data encryption?
Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced, there were no issues with connectivity. Immediately after the cable was replaced, users report
that they are unable to access a database application on the server. Which of the following is the MOST
likely reason for the inaccessibility?
Lisa used a crossover cable.
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
BGP/ Border Gateway Protocol
Which of the following is occurring when Jeff, an employee, unintentionally gives information that is used
Which of the following OSI model layers is used for logical addressing?
Which of the following attacks creates a buffer overflow to stop access to a system?
DoS/ Denial of Service
In which of the following layers of the OSI model does the TCP protocol operate?
Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?
Logical network diagram
Which of the following basic devices blocks ports and can sometimes filter data?
At which of the following layers of the OSI model does an unmanaged switch operate?
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?
Which of the following devices will monitor for propagating worms?
Sets found in the same folder
Network + 100 Study Questions Set 002
Network + 100 study Questions Set 001
TeST for Networks+ 100 Questions
Network + 100 Study Questions Set 004
Sets with similar terms
Network+ Practice Questions Volume A
Foundations Study set
Other sets by this creator
Block 10 - Directing Finding
Block 9 - Spectrum XXI
Block 8-Fundamental of System Planning Engineering…
Block-7 Afloat Spectrum Management Principles
Other Quizlet sets
EOC SEMESTER 2 FINAL
Science Test on Genetics
Chapter 14 test