Comp B1 Flashcards
A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output:
SRC MAC SRC IP DST MAC DST IP
00: 1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05: DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring?
A. Network
B. Application
C. Data link
D. Transport
A. Network
If we look at the Source Mac column, we can see two different MAC addresses. Every network interface card has a unique MAC address. These are the network cards in the two separate computers.
If we look in the Source IP column, we can see that the two network cards have been assigned the same IP address (192.168.1.10). This is the problem in this question. The error message on the screens will be saying that “An IP conflict exists”. Every network card connected to the network needs to be configured with a different IP address.
As the problem is with the IP address configuration of the two computers, we know that the problem is occurring at the Network layer (layer 3) of the OSI model. The network layer is responsible for Internet Protocol (IP) addressing and routing.
A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement?
A. High availability
B. MAN network
C. Quarantine
D. Honeynet
C. Quarantine
A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?
A. Content filter
B. Firewall
C. DNS
D. DHCP
B. Firewall
A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?
A. 10.5.4.0/22 B. 10.233.2.0/23 C. 172.16.0.0/22 D. 172.18.0.0/23 E. 192.168.25.0/24
D. 172.18.0.0/23
Peter, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives “Destination Unreachable”. Which of the following issues could this be?
A. Denial of service attack
B. Misconfigured DNS settings
C. Misconfigured Split Horizon
D. RADIUS authentication errors
C. Misconfigured Split Horizon
A network administrator recently installed a web proxy server at a customer’s site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue?
A. Update the DNS server with the proxy server information.
B. Implement a split horizon DNS server.
C. Reboot the web proxy and then reboot the DNS server.
D. Put the proxy server on the other side of the demarc.
A. Update the DNS server with the proxy server information.
Proxy servers act as an intermediary for requests from clients seeking resources from other servers. If the DNS server is not communicating with the proxy server, these requests are not forwarded. Therefore, updating the DNS server with the proxy server information will solve the problem.
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP
D. BGP
A collection of networks that fall within the same administrative domain is called an autonomous system (AS). In this question, each datacenter will be an autonomous system.
The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves. At the edges of an AS are routers that communicate with the other AS’s on the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network?
A. Reverse the fiber strands of the cable and reconnect them to the server
B. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
C. Replace the server’s single-mode fiber cable with multimode fiber
D. Move the fiber cable to different port on the switch where both strands function
A. Reverse the fiber strands of the cable and reconnect them to the server
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results?
A. A TACACS+ device and a RADIUS server
B. A TACACS and a proxy server
C. A RADIUS server and an access point
D. A RADIUS server and a network controller
C. A RADIUS server and an access point
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic?
A. Intrusion detection system
B. Application aware firewall
C. Stateful packet inspection
D. Stateless packet inspection
C. Stateful packet inspection
A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO)
A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n
A. 802.11a
B. 802.11ac
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
A. 192.168.0.55 B. 192.168.1.0 C. 192.168.1.1 D. 192.168.5.5 E. 255.255.255.0
C. 192.168.1.1
As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)
A. OSPF B. IS-IS C. RIPv1 D. BGP E. VRRP
A. OSPF
B. IS-IS
An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV’s with interconnected gaming systems in the office. Which of the following did the administrator set up?
A. CAN
B. MAN
C. WAN
D. LAN
A. CAN
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP: Interface A: IP address: 10.10.150.16 Subnet mask: 255.255.255.240 Default gateway: 10.10.150.32 Speed: 1000 Mbps Duplex: Auto State: No Shutdown
None of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO).
A. There is a duplex mismatch between the router and ISP.
B. The router interface is turned off.
C. The interface is set to the incorrect speed.
D. The router is configured with the incorrect subnet mask.
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.
E. The router interface is configured with the incorrect IP address.
F. The default gateway is configured incorrectly.
According to the IP Address Range Calculator, for the given subnet mask and the IP range address range assigned by the ISP, the first host address should be 10.10.150.17 and the broadcast address should be 10.10.150.31. Therefore, the router interface is configured with the incorrect IP address and the default gateway is configured incorrectly.
In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)
A. Memorandum of understanding B. Data classification document C. Service level agreement D. Interconnection security agreement E. Consent to monitor F. Acceptable use policy
A. Memorandum of understanding
F. Acceptable use policy
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
A. 66 block
B. BNC
C. F-connector
D. RJ-11
B. BNC
A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.
Which of the following is considered a classless routing protocol?
A. IGRP
B. IS-IS
C. RIPv1
D. STP
B. IS-IS
A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps?
A. Block echo replies inbound to the DMZ
B. Disable UDP on the servers
C. Block ICMP at the firewall
D. Disable TCP/IP on the server
C. Block ICMP at the firewall
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
A. DLP
B. AUP
C. NDA
D. SLA
A. DLP
Which of the following is a UC application?
A. Softphone
B. Intranet
C. Proxy
D. Facsimile
A. Softphone
Which of the following allows a telecommunication company to test circuits to customers remotely?
A. VLAN B. Toner Probe C. RDP D. Smart Jack E. VPN
D. Smart Jack
A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue?
A. Add a honeypot to reduce traffic to the server
B. Update the Ethernet drivers to use 802.3
C. Add additional network cards to the server
D. Disable CSMA/CD on the network
C. Add additional network cards to the server
A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following should the network administrator do to rule out any problems at Layer 1? (Choose two.)
A. Use a loopback at the demark and router, and check for a link light
B. Use an OTDR to validate the cable integrity
C. Use a pinout tester to validate the cable integrity
D. Use a multimeter to validate the cable integrity
E. Check for any devices that may be causing EMI on the cable
F. Clean the cables to be sure they are free of dust and debris
A. Use a loopback at the demark and router, and check for a link light
B. Use an OTDR to validate the cable integrity
A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building?
A. Use the same SSIDs on different channels and AP isolation
B. Use different SSIDs on different channels and VLANs
C. Use different SSIDs on the same channels with VLANs
D. Use the same SSIDs on same channels with AP isolation
A. Use the same SSIDs on different channels and AP isolation
See Pass Comptia
Net+
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
A. Frequency
B. Modulation
C. RF interference
D. Spectrum
B. Modulation
Which of the following requires the network administrator to schedule a maintenance window?
A. When a company-wide email notification must be sent.
B. A minor release upgrade of a production router.
C. When the network administrator’s laptop must be rebooted.
D. A major release upgrade of a core switch in a test lab.
B. A minor release upgrade of a production router.
During an update of a production router the router would not be able to route packages and the network traffic would be affected. It would be necessary to announce a maintenance window.
In information technology and systems management, a maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could cause disruption of service may be performed.
A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network?
A. Use SNMPv1 for all configurations involving the router
B. Ensure the password is 10 characters, containing letter and numbers
C. Copy all configurations to routers using TFTP for secuirty
D. Only allow administrators to access routers using port 22
D. Only allow administrators to access routers using port 22
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user?
A. The user is connected using the wrong channel.
B. The user is connected to the wrong SSID.
C. The user is experiencing an EMI issue.
D. The user is connected to the wrong RADIUS server.
B. The user is connected to the wrong SSID.
The user is connecting to an SSID assigned to a different subnet. Therefore, the user has access to SMB shares and printers that are not recognizable.
After a company rolls out software updates, Jane, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Jane can get back to work as quickly as possible?
A. Reformat and install the compatible drivers.
B. Reset Jane’s equipment configuration from a backup.
C. Downgrade the PC to a working patch level.
D. Restore Jane’s PC to the last known good configuration.
E. Roll back the drivers to the previous version.
E. Roll back the drivers to the previous version.
By rolling back the drivers Jane would be able to use her lab equipment again.
To roll back a driver in Windows means to return the driver to the version that was last installed for the device. Rolling back a driver is an easy way to return a driver to a working version when a driver update fails to fix a problem or maybe even causes a new problem. Think of rolling back a driver as a quick and easy way to uninstall the latest driver and then reinstall the previous one, all automatically.
Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)
A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n
B. 802.11ac
E. 802.11n
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
A. Routing loop
B. Routing table
C. Route redistribution
D. Dynamic routes
B. Routing table
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?
A. On the DMZ network
B. On the sandbox network
C. On the honeypot
D. On the quarantine network
D. On the quarantine network
A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue?
A. Grounding bar B. Rack monitoring C. UPS D. Air flow management E. Surge protector
C. UPS
A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application?
A. CAT5e cable
B. Coax cable
C. Fiber Optic cable
D. CAT6 cable
C. Fiber Optic cable
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?
A. WPA2 security key
B. SSL certificates
C. CSMA/CA
D. RADIUS
D. RADIUS
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?
A. APIPA
B. MAC
C. Static
D. Public
A. APIPA
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable. When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class B subnet mask of 255.255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
A. Tagging
B. Encapsulation
C. Tunneling
D. De-encapsulation
D. De-encapsulation
An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?
A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups
A. Fire suppression
Fire suppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different
ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the server room is to fill the server room with an inert gas such as carbon dioxide.