CompTIA Network+ Practice Exam Flashcards

Unlock all answers in this set

Unlock answers
question
You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before the performance is negatively impacted. Which tool should you use?
answer
Load tester
question
You are concerned about attacks directed against your firewall on your network. You would like to examine the content of individual frames sent to the network. Which tool should you use?
answer
Packet sniffer.
question
You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?
answer
Application log.
question
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?
answer
Event log.
question
You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?
answer
Mirroring.
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer.
question
You decide to use a packet sniffer to identify the type of traffic sent to the router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?
answer
Mirroring.
question
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?
answer
Run the packet sniffer application on Host B.
question
You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?
answer
Throughput tester.
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?
answer
Promiscuous mode.
question
You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?
answer
Packet sniffer.
question
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wiring in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?
answer
Test the solution.
question
Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?
answer
Determine if escalation is needed.
question
A user reports that he can't connect to a specific Web site. You go to the user's computer and reproduce the problem. What should you do next?
answer
Identify the affected areas of the network.
question
You are a network administrator for your computer. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next in your troubleshooting strategy?
answer
Establish the symptoms.
question
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router's software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?
answer
Identify possible effects of the solution.
question
A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?
answer
Identify the results and effects of the solution
question
A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?
answer
Determine what has changed.
question
A user reports that she can't connect to the internet. After some investigation, you find the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?
answer
Create an action plan.
question
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect the problem lies outside the local network. Which utility would you use to trace the route a packet takes as it crosses the network?
answer
traceroute.
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wirelesss telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?
answer
802.11a
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
answer
802.11n
question
Which of the following is a firewall function?
answer
Packet filtering
question
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?
answer
No device will be able to communicate
question
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.
answer
DHCP server
question
You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?
answer
Perform a memory dump
question
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You watn wireless users to be able to connect to either access point, and to be able to raom between the two access points. How should you configure the access points?
answer
Same SSID, different channel
question
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?
answer
A strong EMI emitter near the cable run connected to that interface.
question
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?
answer
Missing route on the default gateway router.
question
What is the primary goal of business continuity planning?
answer
Maintaining business operations with reduced or restricted infrastructure capabilities or resources.
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
Which of the following describes the point where the service provider's responsibility ends and the customer's responsibility begins for installing and maintaining wiring and equipment? A Smart jack B tor C Punchdown block D Vertical cross connect E Demarc
answer
Demarc
question
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer.While talk to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
answer
The user is out of the effective range of the wireless access point on her floor.
question
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is release on a short-term, periodic basis (typically monthly)? A. Targeted software patch B. Hotfix C. Kernel fix kit D. Service pack
answer
Hotfix Explanation: A hotfix is an operating system patch that corrects a specific known problem. Microsoft typically releases hotfixes monthly. Service packs include a collection of hotfixes and other system updates. Service packs are not released as Often, but contain all hotfixes released to that time.
question
Which of the following are differences between RADIUS and TACACS+?
answer
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
question
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?
answer
Replace the network card in the user's computer.
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following are you most likely to experience?
answer
Attenuation.
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap
question
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
answer
TCP
question
What are the most common network traffic packets captured and used in a replay attack? DNS query File transfer Authentication Session termination
answer
Authentication
question
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
answer
CSU/DSU
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New