Dion #3 CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Flashcards

1
Q

What type of cable would you use to connect a switch to a hub?

A

When connecting a switch to a hub, you can use a crossover cable (unless they support MDIX). If this were a real question on the exam, you would have the words provided in a list, and you would drag them below the appropriate drawing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following port or ports does SIP use?

A

SIP works with other protocols over 5060/5061. 443 is HTTPS, 389/636 is LDAP, and 135/139/445 is NetBIOS and SMB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What describes an IPv6 address of ::1?

A

OBJ-1.3: In IPv6, ::1 is the loopback address, whereas, in IPv4, it is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination to diagnose problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dion Training has just installed a brand new email server. Which of the following DNS records would need to be created to allow the new server to receive email on behalf of diontraining.com?

A

An MX record is required in the DNS for a domain for the email server to accept emails on behalf of a registered domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following technologies deliver multiple voice calls over a copper wire if you have an ISDN or T-1 connection?

A

OBJ-2.5: Time-division multiplexing allows for two or more signals or bitstreams to be transferred in what appears to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel. This is the technology used in a single PRI (ISDN or T-1) service to essentially share a single cable but pass multiple voice calls over it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following protocols are designed to avoid loops on a Layer 2 network?

A

OBJ-1.3: The Spanning Tree Protocol is part of the 802.1d standard and avoids loops in the switching network (layer 2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes the ID of a specified native VLAN when traffic passes over a trunk?

A

OBJ-1.3: Trunk ports carry all traffic, regardless of VLAN number, between all switches in a LAN. The VLAN designation for a trunk port is its native VLAN. If the trunk port has a native VLAN that differs from the tag placed on the frame as it entered the access port, the switch leaves the tag on the frame and sends the tagged frame along to the next switch or switches. If the trunk port’s native VLAN is the same as the access ports VLAN, then the switch drops the tag and sends the untagged frame out the trunk port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

***A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switch port 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switch port 8) and switch 3 (switch port 8) are connected to Switch 1 (switch ports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router’s other interface port (FastEthernet0/1). Based on the configuration described here, how many broadcast domains are there within this network?

A

***OBJ-1.3: A broadcast domain is a logical division of a computer network in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment, or it can be bridged to other LAN segments. Routers break up broadcast domains. Therefore there are two broadcast domains in this network - one for each side of the router (the three switches make up one broadcast domain, and the hub makes up the second broadcast domain).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is testing a new web-based tool capable of generating an automatic teller machine (ATM) cash and service availability reports. A consortium of financial institutions developed the web-based tool. Which of the following cloud delivery models is being described in this scenario?

A

: A community or private delivery model would work best. A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The scenario described is a community cloud created tool by the banking industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician needs to ensure wireless coverage in the green space near the center of the college campus. The antenna is being installed in the middle of the field on a pole. Which type of antenna should be installed to ensure maximum coverage?

A

OBJ-2.2: Omnidirectional antennas send the signal out equally in all directions. Therefore it will provide the best coverage since it is located in the center of the field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company suffers an outage due to a bad module in a core switch. What is the NEXT step to conduct troubleshooting?

A

OBJ-5.1: The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, and (6) Verify full system functionality and if applicable implement preventative measures. Since the cause of the problem is already known (a bad module), we can skip directly to establishing a plan of action to solve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?

A

OBJ-4.2: AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company’s security policy states that its workstations must hide their internal IP addresses whenever they make a network request across the WAN. You have been asked to recommend a technology that would BEST implement this policy. Which of the following is the BEST solution for you to recommend?

A

OBJ-1.3: Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. Using NAT, you can have the internal IP address of each workstation mapped to a public IP address or port when it crosses the router to access the WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Michael has been tasked with assigning two IP addresses to WAN interfaces on connected routers. To conserve address space, which of the following subnet masks should he use for this subnet?

A

OBJ-1.4: An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address, and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address, and from that, we can calculate how many bits are used for the host addresses. In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing, and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 - 2), a /30 subnet mask will provide 2 usable IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?

A

: Patches should always be tested first. Once successfully tested, deployment to the production environment can then be accomplished.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network technician discovers an issue with the spanning tree on the core switch. Which step should the network technician perform NEXT when troubleshooting to resolve the issue?

A

OBJ-5.1: If the technician has already discovered the issue, the symptoms have already been identified. Testing the theory comes after you have established a theory, which can only come once the issue has been discovered. Establishing a theory of probable cause allows you to continue with the next steps in troubleshooting the issue.

17
Q

Janet is a system administrator who is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and must be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following would BEST resolve this issue?

A

OBJ-3.3: Using an event management tool will allow the administrator to clear the event logs and move them from the server to a centralized database, if needed.

18
Q

Which of the following connector types is used to terminate DS3 connections in a telecommunications facility?

A

Explanation
OBJ-2.1: Bayonet Neill-Concelman Connector (BNC connector) is a type of coaxial RF (Radiofrequency) electrical connector used in place of coaxial connectors. A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.

19
Q

Dion Training is trying to connect two geographically dispersed offices using a VPN connection. You have been asked to configure their networks to allow VPN traffic into the network. Which device should you configure FIRST?

A

OBJ-2.3: You should FIRST configure the firewall since the firewall is installed at the network’s external boundary (perimeter). By allowing the VPN connection through the firewall, the two networks can be connected and function as a single intranet (internal network).

20
Q

A network technician needs to install a server to authenticate remote users before accessing corporate network resources when working from home. Which kind of server should the network technician implement?

A

Explanation
OBJ-3.4: A remote access server is a type of server that provides a suite of services to connect users to a network or the Internet remotely. Usually, this will be an RDP or VNC server.

21
Q

Your company is using a T1 connection for its connectivity to the internet. When you arrived at work this morning, you found that your internet connection was not working properly. You began troubleshooting and verified that the network’s router is properly configured, the cable is connected properly between the router and the T1’s CSU/DSU, but the T1 remains down. You call your ISP, and they have requested that you test the interface on the CSU/DSU to ensure it hasn’t failed. Which tool should you utilize to perform this test?

A

OBJ-5.2: If you have a T1 for internet service, it is highly recommended that you have a T1 loopback adapter or plug for testing purposes if the line ever has trouble with it. Inserting the loopback adapter into the CSU/DSU will allow the ISP to remotely diagnosis if the connection between their central office and your demarcation point is working properly.

22
Q

A technician has punched down only the middle two pins (pins 4 and 5) on an Ethernet patch panel. Which of the following has the technician cabled this port to be used with?

A

OBJ-2.1: POTS is short for plain old telephone service. The technician made a cable for use with a telephone since it only requires two pins (send and receive).

23
Q

You are troubleshooting a wireless network. A user has complained that their iPad cannot connect to the wireless network from their desk in the building’s corner. The user has no issues connecting to the wireless network with the tablet when located in the break room area at the center of the building. You measured the distance from their office to the 802.11 AC wireless access point, and it is about 170 feet. What is MOST likely the cause of the tablet not connecting to the WAP?

A

OBJ-5.4: A general rule of thumb in home networking says that Wi-Fi routers operating on the traditional 2.4 GHz and 5.0 GHz bands can reach about 150 feet (46 m) indoors and 300 feet (92 m) outdoors. Since the distance is listed as 170 feet, the issue is likely caused by the user’s office being too far from the WAP.

24
Q

Question 54: Incorrect
A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network and is accessible from the Internet. The security personnel are concerned that the FTP server is compromised and is possibly being used to attack other company servers. What is the BEST way to mitigate this risk?

A

OBJ-4.6: The DMZ is the subnetwork of a network that hosts public-facing servers and has additional security mitigations in place.

25
Q

Which type of equipment should be used for telecommunications equipment and have an open design?

A

OBJ-2.1: The 2/4 post racks are open-framed, which are the most common type utilized with telecommunication equipment.

26
Q

An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. What is the employee MOST likely using?

A

OBJ-4.6: Proxy servers are just different computers that serve as a hub where Internet requests are processed. When you are connected to a proxy, your computer sends a request to that server and then returns your answers to the proxy server before forwarding the data to the requesting computer.

27
Q

Jason wants to use his personal cell phone for work-related purposes. Because of his position, Jason has access to sensitive company data, which might be stored on his cell phone during its usage. The company is concerned about this but believes that it might be acceptable with the proper security controls in place. Which of the following should be done to protect both the company and Jason if they allow him to use his personal cell phone for work-related purposes?

A

OBJ-3.3: While all four are good options, the BEST solution is to conduct real-time monitoring of the phone’s activity since it is a technical control that could quickly identify an issue. The other options are all administrative controls (policies), which are useful but would not actually identify if the sensitive data was leaked from Jason’s phone.

28
Q

A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?

A

OBJ-3.3: Captured packets show you the information that was traveling through certain files, etc. Packet sniffers detail the information they’ve received, so working through those shows if the external network shows or details software versions.

29
Q

Sally, in the web development group, has asked for your assistance in troubleshooting her latest website. When she attempts to connect to the web server as a user, her web browser issues a standard HTTP request but continually receives a timeout response in return. You decided to capture the entire TCP handshake between her workstation and the webserver to troubleshoot the issue best. Which of the following tools would BEST allow you to capture and then analyze the TCP handshake?

A

OBJ-5.2: A protocol analyzer or packet analyzer (like Wireshark) has the capability to capture the handshake and display it for analysis. A packet sniffer, though, will only capture the handshake. Neither a spectrum analyzer or a tone generator would be helpful in this situation.

30
Q

Which network element enables unified communication devices to connect to and traverse traffic onto the PSTN?

A

OBJ-2.3: Unified Communications (UC) enables people to use different modes of communication, media, and devices to communicate with anyone, anywhere, anytime. To accomplish this, a UC gateway is needed.

31
Q

Which of the following would require the network administrator to schedule a maintenance window?

A

OBJ-3.3: During an update of a production router, the router would not route packets, and the network traffic would be affected. It would be necessary to announce a maintenance window. A maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could disrupt service is allowed to be performed.

32
Q

Question 75: Incorrect
Workers in a company branch office must visit an initial web page and click the “I agree” button before being able to surf the web. Which of the following is this an example of?

A

OBJ-3.5: AUP stands for acceptable use policy. If you’re agreeing to what you can and can’t view, you accept the AUP. MOU is a memo of understanding which typically contains an agreement on certain actions. SLA is a service-level agreement that is usually made between two companies to state what level of service is expected if machines go down, etc., and when they can expect to be back up and running.