compTIA network Flashcards

1
Q

An administrator is troubleshooting a control server, typically run as software on ordinary computers in a large-scale, multiple-site Internet Control System (ICS). What system is the administrator troubleshooting?

A

Supervisory control and data acquisition (SCADA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Web servers provide clients access using HyperText Transfer Protocol (HTTP) or its secure version (HTTPS). Which ports do the clients use to connect to HTTP or HTTPS servers? (Select all that apply.)

A

TCP port: 443 (HTPPS)

TCP port: 80 (HTTP) HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The system administrator recommends that a small business owner replace separate appliances with a UTM. What is the principal advantage of doing this? (Select all that apply.)

A
  1. To consolidate configuration, monitoring, and reporting multiple security functions to a single console or dashboard
  2. To provide additional functionality to security protocols not currently available together, such as intrusion detection, spam
    filtering, and data loss prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network technician plans a simplified network addressing scheme that autoconfigures Internet Protocol (IP). What mechanism(s) will the technician implement? (Select all that apply.)

A
  1. Dynamic Host Configuration Protocol (DHCP)

2. Domain name service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician troubleshoots the authentication, authorization, and accounting (AAA) system that consolidates service across multiple devices. What component is responsible for requesting access?

A

The supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician is responsible for a network with multiple servers that provide the same function. What solution could manage client requests across the servers to provide quick service to client requests?

A

Load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Client devices do not store credentials that need authentication when connecting to an enterprise network. Where would these credentials be found so the system can authenticate clients when connected?

A

AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability issues do not just affect PC operating systems and applications in enterprise networks. Any device or network appliance can be vulnerable to exploits from within and outside the network. With the rise of more personalized devices, the risks to embedded systems have become more evident. Which devices are considered a new and growing problem regarding these proposed risks? (Select all that apply.)

A
  1. Mobile devices
  2. Internet of Things (IoT)
  3. Any unpatched device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Appliances do not have to store any credentials to authenticate clients within the network. Where are these credentials held so that the network can authenticate clients as they connect if the appliances are just acting as a transit point?

A

AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The organization’s enterprise network, connected to the internet, requires protection against malicious threats. What purpose-built internet security appliance centralizes and simplifies configuration and reporting?

A

UTM

A unified threat management (UTM) appliance combines the work of multiple security functions, centralizing the threat management service. It provides simpler configuration and centralized reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT helpdesk technician has received a service call for a small home office worker experiencing network connectivity issues. The IPv4 network host can communicate with other local hosts but fails to reach the internet. What should the technician check?

A

The default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPv6, designed to replace IPv4, has proven challenging to implement in transition. Hosts and routers that can operate on IPv4 and IPv6 simultaneously are called what?

A

Dual stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In IPv6, it is possible to configure addresses statically. However, most hosts obtain their global and link-local addresses from the local router. In IPv6, the network and host portions are a fixed size. What part of this IPv6 IP address is the network ID 2001:0db8:0000:0000:0abc:0000:def0:1234?

A

2001:0db8:0000:0000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An IPv6 address is 128-bits, divided into two main parts. The first 64 bits and the second 64 bits are known as what?

A

Network ID, Interface ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is troubleshooting an IPv4 network that only allows hosts to communicate with other local hosts on the same network and notices the Dynamic Host Configuration Protocol (DHCP) service failed. What failover mechanism are the local hosts using to communicate on the network?

A

Automatic private IP addressing (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows machines will default to Automatic Private IP Addressing (APIPA), also known as link-local, if which Windows network service fails?

A

Dynamic Host Configuration Protocol (DHCP)

17
Q

Why would a network engineer choose a dynamic network addressing configuration over a static configuration in a large network? (Select all that apply.)

A
  1. Static addressing is prone to configuration errors in large networks.
  2. Static addressing can be time-consuming in large networks.
  3. Dynamic addressing provides automatic address allocation, reducing the time required to manage large networks.
18
Q

Why would hosts NOT need to be configured with a default gateway in an IPv6 implementation with Stateless Address Auto Configuration (SLAAC)?

A

ND allows hosts to discover a router and perform interface address querying functions.

Note: IPv6 uses a protocol called neighbor discovery (ND), implementing SLAAC and allowing a host to discover a router and perform interface address querying functions.

19
Q

What method of network addressing provides automatic address allocation, is less prone to errors, and requires less administration time?

A

Dynamic addressing

20
Q

To communicate on the internet, a network administrator must configure hosts with what type of unique IP address?

A

Public IP address

Note: A network administrator must configure a host with a unique public IP address to communicate on the internet. Public IP addresses are allocated to customer networks by internet service providers (ISPs).

21
Q

A class B IPv4 host configured with a private IP address will use what mechanisms to facilitate access to the internet? (Select all that apply.)

A
  1. Network address translation (NAT)
  2. Proxy device

Note 1: Hosts configured with a private address cannot access the internet directly. A host must use some mechanism to allow it to forward packets. Network address translation (NAT) is one. It shuttles traffic between the private and public addresses.

Note 2: A proxy device can fulfill requests for internet resources on behalf of clients configured with a private IP address, facilitating internet access.