Network+ – Flashcards

Unlock all answers in this set

Unlock answers
question
You have been tasked with installing a WAP, which supports PoE, in your organizations office to provide wireless connectivity to users. You must first decide where to place the WAP. Which of the following considerations should be taken when determining the optimal WAP placement?
answer
Physical security & Distance to the nearest switch or router
question
You need to host a web server on your network that will be publically accessible. You also need to make sure that external client will only have access to the web server and nothing on the internal network. What should you configure?
answer
DMZ (demilitarized zone)
question
Which option is an encryption system that uses an RA for verifying a user's identity, as well as for approving or denying digital certificate requests?
answer
PKI (public key infrastructure)
question
Which protocol provides secure command execution on a remote computer within a secure or insecure network?
answer
SSH (secure shell)
question
As an information technology specialist, you have been consulted by a friend for assistance with networking. Your friend would like to know the best way to securely access his corporate network resources from his home computer. Which option is best to recommend?
answer
VPN (virtual private network)
question
The office building you work in consists of five floors and uses wireless communication. The networking room containing the access point is found on the first floor. All of the client computers have the same configurations. You have discovered that client on the fifth floor cannot access the wireless network, but clients on the other four floors can. Which solution would solve this issue with least amount of administrative effort?
answer
Install a wireless access point on the third floor
question
Which type of DOS attack works by overloading a network with spoofed ICMP (internet control Message protocol) messages?
answer
Smurf
question
You want to use a laptop to manage a router. An RS-232 cable will be used to connect your laptop to the router. The cable has an RJ-45 connector on one end and a 9-pin connector on the other. What type of connector is being described?
answer
DB-9
question
At which layer of the OSI model does a bridge and switch operate; allowing data packets to be transferred throughout network nodes?
answer
Data Link
question
Users working in your office are complaining about the signal strength of the wireless network. Which of the following could be causing the loss of signal strength?
answer
Microwaves & Fluorescent lights
question
Which 802.11 wireless standard allows for transmission needs speeds of 100 to 600 Mbps and 4 MMO (multiple in/multiple out) streams?
answer
802.11n
question
You are the network administrator for a small company. You have reason to believe that someone has been attempting to log on to the Windows 2008 server. You have configured the server to audit logon attempts within the local group policy. What utility would you use to verify the security log for Windows Server 2008?
answer
Event Viewer
question
You are planning a wired Small Office/Home Office (SOHO) network for a small department. What is the maximum Ethernet cable length that should be used for connecting devices?
answer
100 meters
question
A coworker has asked for assistance with DNS record types. They would like to know which DNS record type is similar to AAAA and used to map to IPv4 IP addresses. Which option will you provide?
answer
A (address)
question
Which email protocol will retrieve emails from a mail server and leave a copy on the mail server by default?
answer
IMAP4 (internet message access protocol)
question
A network technician has connected two older switches together using a straight-through cable; however, there is no communication between the two switches. What is the most probable cause of this issue?
answer
A crossover cable should have been used
question
Which tool is used to determine if a network cable has a signal from end to end or contains a short?
answer
Cable tester
question
What is known as a network component that isolates internal clients the servers by downloading and storing files on behalf of the client?
answer
A proxy server
question
A bank ATM card uses what type of authentication?
answer
Two-factor & Multi-factor
question
Which port should you verify is open on the firewall in order to send and receive Telnet traffic?
answer
23
question
There are a number of different data transfer methods, such as unicast, broadcast, and multicast transmission. Which statement is true concerning broadcast transmissions?
answer
Transmission method in which data is sent from one source node to all other nodes on a network/ Used by servers to advertise their presence
question
Which software tool is used to measure the time a packet takes to travel from one destination to another within a network?
answer
Throughput tester
question
You have been given a task to design a SOHO network. Which of the following meet the hardware requirements for a SOHO network keeping costs to a minimum?
answer
1 to 10 computers/ Specialty SOHO router
question
You need to run a scan on your network to see if there are any vulnerabilities. What should you use?
answer
NESSUS
question
You are configuring VTP (VLAN Trunking Protocol) on several network switches that you have deployed in your organization's network. You want to manually configure the VLAN information on each new switch. Switches should not make configuration changes based on VTP messages from other switches. The switches should also not send updates when VLAN configuration changes are made locally. Which VTP mode should you use on the new switches?
answer
Transparent
question
One of the users on your network has contacted you regarding a login issue. They have returned from vacation and can no longer log in to the network with their laptop. You respond by asking if they are receiving an error message. You also ask if the lights are lit where the network cable plugs into the laptop. The act of asking these questions is an example of which step within the troubleshooting methodology?
answer
Identify the problem
question
As a network security expert, you have been asked for assistance with securing a newly implemented wireless network. The company would like to know which wireless encryption protocol is the most secure to implement. Which option will you provide?
answer
WPA2
question
What documentation is used to provide statistics regarding current network performance , to assist with identifying unacceptable or abnormal performance?
answer
Network baseline
question
To help secure your wireless network, you want to hide the network name. What needs to be done?
answer
Disable the SSID broadcast
question
What is the maximum speed supported by category 6a UTP?
answer
10 Gbps
question
A network technician has been informed that connectivity between two network switches is down. You notice a flashing amber light on the system console of the switch. What could be a possible cause of this issue?
answer
A faulty Gigabit Interface Converter (GBIC) module
question
Network management techniques such as load balancing, caching, and traffic shaping can be used to reduce which option?
answer
Latency
question
Which network performance optimization method is used to share the workload on a network with available devices or resources?
answer
Load balancing
question
IP addresses are distributed within your organization through DHCP. You need to ensure that each server is assigned the same IP address each time. What should be configured?
answer
Reservations
question
Which layer of the OSI model specifies the relationship between a transmission medium and a network device, such as the type of cabling used?
answer
Physical
question
You have implemented a WLAN consisting of three APs (access point) to ensure users can roam within the company building without losing wireless connection. Which channel(s) should the APs be configured to use?
answer
1, 6, and 11
question
You suspect there is a short in one of the cables on your network. Which tool can you use to check for shorts by transmitting an electrical pulse on a cable, and then measure the reflected signal on the cable?
answer
TDR (Time-Doman Reflectometer)
question
What can be used to secure a wireless network by ensuring that only hosts with specific physical addresses may gain access?
answer
MAC filtering (Media Access Control address)
question
You are the network administrator for your company. You have reason to believe that the network has been under a possible DoS (Denial of Service) attack. What type of software can be used to assist in discovering a possible DoS attack?
answer
Protocol analyzer & Network analyzer
question
You have installed a new wireless access point in your office. You were instructed that it is to be configured for 802.11n only. You have sent instructions to the list of authorized users, outlining all configuration information required to connect to the access point. One of the users states that they are unable to connect. You notice that the user is using a fairly older laptop containing a built-in wireless network card. What is the MOST likely reason the user cannot connect to the wireless access point?
answer
Standards mismatch
question
Which type of network will allow you to easily share resources with a few computers at home?
answer
Peer-to-peer
question
Someone is using special tools to decipher a wireless encryption key. What is this known as?
answer
WEP cracking
question
Each computer on your network is directly connected to a dedicated switch port. The cabling system was not organized and there are problems whenever a connection needs to be moved. You want to install new cabling for each connection on the six 24 port switches. You want to incorporate a preventative measure to ensure that this job will not need to be repeated. Which option would be the BEST preventative measure to implement?
answer
Label each cable with corresponding computer name
question
Which tool is commonly used on telephone systems and emits an audible tone when a signal is detected?
answer
Toner probe
question
What is a cost effective way to connect a single-mode fiber network segment to a multi-mode fiber segment?
answer
Install a singlemode fiber to multimode fiber converter
question
Which tool can be used on fiber optic cabling to determine the location of a faulty cable end or break?
answer
Optical Time-Domain Reflectometer
question
Which address class is reserved for multicast addresses?
answer
Class D
question
Which routing protocol uses the Dijkstra algorithm to determine the best routing paths?
answer
OSPF (Open Shortest Path First)
question
Which networking protocol is connection-oriented and guarantees delivery?
answer
TCP (Transmission Control Protocol)
question
Which configuration management document type is used to assess risk; to quantify cost of training, support, maintenance, or implementation?
answer
Change management
question
You have been assigned the task of reviewing current Windows Firewall settings on a client's computer with a coworker. Your coworker has asked for assistance with the Windows Firewall rule store. They would like to know why permitted traffic requires an allowed rule listed in the Windows Firewall rule store. Which option is BEST to provide as an explanation?
answer
A Windows Firewall rule store contains an implicit deny rule for incoming traffic
question
Which of the following options correctly describe a physical ring topology?
answer
Each node acts as a repeater and A unidirectional flow of data
question
Encryption devices provide encryption, decryption, and access control using which technology?
answer
HSM (Hardware Security Module)
question
Fault tolerance methods are configured as part of a network's topology to provide which option?
answer
More uptime
question
As a network administrator, you have been asked to assist a new team member with troubleshooting a wireless network issue. A client has reported weak signals or dropped connections since their new WAP was installed. This issue replicates on several devices when connecting to the WAP. Which option is the most probable cause of the issue?
answer
WAP (wireless access point) has been placed too far away from connecting devices
question
You need to ensure that only 802.11g clients are able to connect to an 802.11b/g WLAN. Which speeds must be disabled?
answer
1, 2, 5.5, and 11
question
What type of device is used to connect a WAN line, such as a T1 (Terminal Carrier 1) to a LAN?
answer
CSU/DSU
question
Which of the following are defined as being software based while still providing similar functionality of its physical counterpart?
answer
Virtual switch/ NIDS
question
Which option is a standard for PNAC?
answer
IEEE 802.1X (Institute of Electrical and Electronics Engineers)
question
VoIP and video applications are examples of which option?
answer
High bandwidth applications
question
A network technician has been informed that the serial connection between two recently installed routers is not working. They use a protocol analyzer and determine that the TCP/IP connection handshake is not occurring. What is the most probable cause of this issue?
answer
Mismatched MTU (Maximum Transmission Unit)
question
Users in your department can share files directly with one another; however, they also need to access resources from a shared location on a server. What type of network would this represent?
answer
Hybrid
question
Your wireless network policies state that the strongest level of encryption must be used. Which of the following security methods would be used in your office?
answer
WPA2 (Wi-Fi Protected Access version 2)
question
You want to manually adjust the port speed on each port of a switch. Which port speed setting only supports operation in full-duplex mode when communicating with another device?
answer
1,000 Mbps
question
Your company's network consists of 255 client computers. Each client needs a persistent connection to the Internet; however, you only have one public IP address available. Which of the following will accommodate this requirement?
answer
PAT (Port address translation) & NAT (Network address translation) Overload
question
You recently added three new computers to your Active Directory domain. You want to ensure that these computers use a specific DNS domain name for name resolution and this information should be administered from a central location. Which setting will take priority?
answer
Add a DHCP reserved client option
question
Which of the following is a protocol variant of the PPP remote networking protocol?
answer
PPPoE (Point-to Point Protocol over Ethernet)
question
A hacker has configured a laptop as a Wireless access point and made it appear to be from a legitimate provider. What is this known as?
answer
Evil twin
question
What type of fiber optic connector is box-shaped and snaps into a receptacle?
answer
Subscriber connector
question
You need to run wires in the ventilation system at your office. Which type of cable is required for this job?
answer
Plenum
question
What device is used to connect the telephone company's wires to the building's wires?
answer
Smart jack
question
Which of the following options correctly describe SONET?
answer
It is a standard for transmitting data over a fiber optic cable/ It consists of both the OC and STS specification
question
Which Layer 2 device can be used when connecting two or more network segments?
answer
Bridge
question
Which OSI model layer does a router operate on?
answer
Network
question
Which tool is used to place a media connector on the end of a cable?
answer
Crimper
question
Which of the following allows devices to send and receive data in only one direction at a time?
answer
Half duplex
question
You manage small network. A user contacts you and informs you that he is having problems connecting the network. You start troubleshooting the issue by asking the user if the Ethernet network cable is properly connected to his computer. He informs you that the cable is connected; however, the connector at the end of the cable is damaged. In an effort fix the issue, what type of connector would you replace the damaged one with?
answer
RJ-45
question
You are the network administrator of a company that moved into a new building. Since there was no network documentation for the previous network, this is the perfect opportunity to create the necessary network documentation. What documentation would serial numbers and software license keys be located in?
answer
Device information
question
You have been tasked with selecting and installing a WAP in an office building to provide connectivity to the organization's network. The WAP should provide the highest throughput possible. You performed a site survey and noted high levels of signal across the 2.4 GHz band. Which type of WAP should you select to install?
answer
802-11n
question
All clients on the network receive their IP addresses dynamically from a DHCP server. Address leases are set to expire after one week. After each week, client computers are no longer able to contact each other using their FQDNs. What should you do to resolve this using the least amount of administrative effort?
answer
Configure DDNS
question
Which protocol types describe BGP (Border Gateway Protocol)?
answer
EGP (Exterior Gateway Protocol/ Path-vector protocol
question
Which tool can be used to examine protocol traffic transmitted throughout a network?
answer
Protocol analyzer
question
You are the network administrator for a company. You are in the process of creating a network wiring diagram. Which of the following would you include in this type of document?
answer
Cable runs/ Remote Access equipment
question
Which network topology needs to be terminated at both ends?
answer
Bus
question
Which TCP/IP protocol can be used to secure communication between devices on a network, and ensure communication is only received between the intend devices?
answer
TLS (Transport Layer Security)
question
Which remote access authentication protocol uses a shared secret, not sent in plain text, between a client and a server?
answer
CHAP (Challenge Handshake Authentication Protocol)
question
Your organization uses a Windows Server 2008 R2 DHCP server to automatically configure IP addresses to clients. Assuming that a client still has a valid lease upon system startup, which of the following is true?
answer
It will try to renew its lease unless it cannot locate a DHCP server, but can contact the default gateway
question
You are the network administrator for a small network. All of the servers have been assigned static IP configurations. Users are reporting that sometimes they can access FileSrv1 and other times they cannot. While seated at a user's workstation, you were able to successfully ping the IP address of FileSrv1. You believe there may be a duplicate IP address conflict between two of the servers. Which command would you execute next to troubleshoot this issue?
answer
Arp
question
You need to convert fiber signals to an RG6 cable. Which type of converter should you use?
answer
Install a fiber to coaxial converter
question
You have installed an application that collects information from the server for monitoring. Which protocol does this service MOST LIKELY use?
answer
SNMP (Simple Network Management Protocol)
question
You are managing a network for a company. Part of your task is to configure a web proxy to grant access to the Web. What web proxy feature evaluates the content of web sites based on words or word combinations?
answer
Content filtering
question
You are planning the design of a wireless SOHO network. Which of the following devices are essential for a wireless SOHO topology?
answer
Access point
question
You are configuring a SOHO network. The network will primarily consist of five computers. Which type of firewall is BEST used within a SOHO network and is cost efficient to protect all hosts?
answer
Software
question
A junior administrator brought a new Windows 2008 R2 server online and configured it to use static IP configuration settings. You have received reports that users on the network cannot access resources located on this server. You want to verify the IP settings that were configured on this server. While at the command prompt, what command will allow you to verify this information?
answer
Ipconfig
question
A coworker told you that instead of paying for Internet, he just locates open networks in his neighborhood to use the Internet. What is this known as?
answer
War driving
question
There are a number of different data transfer methods, such as unicast, broadcast, and multicast transmission. Which is a characteristic of multicast transmissions?
answer
Transmission method in which data is transferred from one server to nodes in a predefined group
question
Which email protocol is used to send email messages?
answer
SMTP (Simple Mail Transfer Protocol)
question
Which DNS record type is used to map an IP address to a FQDN?
answer
PTR (Pointer)
question
What type of network attack does an attacker attempt to disrupt or disable systems that provide network services?
answer
DoS ( Denial of Service attack)
question
Which of the following protocols is an extension of PPP?
answer
EAP
question
As a network administrator, you are familiar with the seven recommended steps for troubleshooting and the order they follow. Which option would be part of the work involved in completing the first step in this process?
answer
Identify symptoms
question
Which high-speed wireless communication standard offers speeds of up to 300 Mbps downstream and 75 Mbps upstream?
answer
LTE
question
You have finished implementing a wireless network in your office. You send out an email, while connected to the wireless network, informing users that the network is now available along with the login information. Shortly after, users begin to complain that they are unable to see the network in their list of available wireless networks. What is the MOST likely reason for this?
answer
The SSID is not broadcasting
question
What is known as the point where the cables in a building end and the telephone company's cables begin?
answer
Demarc
question
Which option can be used within a network to provide a faster response time to frequent client data requests?
answer
Caching engine
question
Which routing protocol is classified as a hybrid protocol?
answer
EIGRP (Enhanced Interior Gateway Routing Protocol)
question
You are designing a SOHO network. Which of the following are true concerning SOHO environment limitations?
answer
Devices should be placed relatively close together
question
A network has been configured for routing. As new routes are required, which of the following will require manual configuration?
answer
Static
question
What can be included within an ACL for a wireless router to deny a specific computer access to a network?
answer
MAC address filtering
question
A company should implement which type of policy to preserve the safety and integrity of data from an attack?
answer
Security policy
question
Which remote control protocol is the backbone of Microsoft remote desktop systems, and can function over any TCP/IP network connection to allow Windows-based clients to communicate?
answer
RDP
question
EUI (Extended Unique Identifier)-64 is defined by IEEE and works at which layer of the OSI mode?
answer
Data link
question
A wireless router in your office is installed on top of an empty workstation. The row that the wireless router is facing is lined with several metal filing cabinets and bookcases on each side. Users are complaining of intermittent connection issues. You test this by monitoring the signal by walking down the row while connected to the wireless router. You notice that the signal strength is very sporadic. Which of the following is most likely happening to the wireless signal due to the rows of metal filing cabinets and bookcases?
answer
Signal bounce and Scattering
question
You are installing several network switches in a new network deployment. The switches will be used to connect end workstations and IP phones. Which of the following features is the most important the switches should support?
answer
QoS
question
Which of the following would mobile phone service providers be an example of?
answer
Naas
question
Which authentication method allows you to use your credentials once to access multiple systems?
answer
SSO (Single sign-on)
question
What type of attack involves capturing and analyzing data on a wireless network?
answer
Packet Sniffing
question
A network technician is troubleshooting a Cisco router installed at a client site. He suspects a misconfigured route was added to the routing table. Which command can he sue to review the entries in the routing table?
answer
show ip route
question
Which of the following is a DNS record type specified by RFC 1034 that maps multiple to a single A record?
answer
CNAME (Canonical name record)
question
You have noted that your network is experiencing a much higher than normal bandwidth usage on several links. You would like to determine the type and, if possible, the source of this traffic. Which of the following diagnostic tools would allow you to BEST accomplish this task?
answer
Protocol analyzer
question
Which layer of the OSI model is responsible for sending and receiving data, as well as specifying a network's transmission medium?
answer
Physical
question
Which layer of the OSI model is used to provide a means of transferring data packets throughout a networks transmission medium?
answer
Physical
question
Which options are examples of networks that use packet switching?
answer
The Internet & Frame Relay
question
Which device is used to create separate broadcast domains?
answer
A Router
question
You are the network administrator for a small company. You have enabled routing on Window Server 2008 R2 and routing is managed statically. After various configuration changes, you would like to erase the entire routing table and configure it from scratch. Which command will allow you to easily remove all entries from the routing table?
answer
Route -f
question
You are the network administrator for a company. You want to implement a network management protocol that will allow you to monitor network devices to assist you with managing network performance and diagnosing network problems. Which of the following protocols would provide the most secure solution?
answer
SNMPv3 (Simple Network Management Protocol)
question
You have been assigned the task of configuring VLANs to separate users by department. Which device will allow for the creation of VLANs?
answer
Managed switch
question
Which type of network would transfer data based upon labels instead of network addresses?
answer
MPLS
question
Which wireless standard offers transmission speeds of 54 Mbps, a frequency of 2.4 GHz, and geographic range of 100 meters?
answer
802.11g
question
What is the final step in the network troubleshooting methodology?
answer
Documenting the solution and the entire process
question
You are planning a wired SOHO network for a network for a small department. What is the recommended maximum number of devices that can be added to the network?
answer
15
question
You are constructing a new wireless network for a company. The company has indicated they would like to use a wireless encryption type that provides data confidentiality services for data submitted between two wireless network devices. They would also like to have the flexibility of using 64-bit, 128-bit, or 256-bit encryption. Which wireless encryption protocol should be implemented?
answer
WEP (Wired Equivalent Privacy)
question
The server administrator team implemented a new DNS server on the company network over the weekend. Users working on your network are complaining that they are now having problems accessing web sites on the Internet. Which port should you verify is open on the firewall?
answer
53
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New