Meyers CompTIA Network+ Certification (N10-007): Test 2 - Results Flashcards

1
Q

The boss has just read an article about zero-day attacks and rushes into your office in a panic, demanding to know what you’ll do to save the company network. What security technique would best protect against such attacks?

A

The best defense against zero-day attacks is to implement effective security policies.

Incorrect Answers:

Because a zero-day attack exploits previously unknown software vulnerabilities, updating virus definitions and keeping your software patched wouldn’t help at all.

By definition, there’s no patch out yet for the zero-day exploit!

User awareness will help because many zero-day attacks come through users accessing dodgy Web sites, but a good security policy that includes properly implemented firewalls and restrictions on access to those sites offers the best protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A website just changed its IP address, and a user is unable to reach it by typing the site’s domain name into their browser. What command can the user run to make the computer learn the website’s new IP address?

A

Correct Answer:

Ipconfig /flushdns will clear the DNS cache and force the computer to perform a fresh DNS lookup to get the current IP address of a domain name host.

Incorrect Answers:

Ipconfig /all displays most of the TCP/IP settings within a host but makes no changes.

/updatednscache and /dnsupdate are invalid Ipconfig switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An office would like to set up an unsecured wireless network for its customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office’s internal network resources. Which firewall configuration can accomplish this?

A

Correct Answer:

Among other things, packet filtering controls access to IP-addressed devices.

Incorrect Answers:

NAT enables private IP addressed devices to access the public Internet.

Stateful inspection confirms the integrity of connections.

Port security controls the types of activities that stations engage in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network technician Jan is assigned to install a wireless router in a company’s public common area. The company wants visitors to the company to be able to connect to the wireless network with minimal security, but they should not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?

A

Correct Answer:

Packet filtering on the wireless access point. Packet filtering on the WAP can enable inbound and outbound traffic to the Internet, but it can block traffic to and from the internal network.

Incorrect Answers:

Content filtering prevents access to sites based on keywords on the site.

Allowing wireless traffic just enables the use of the WAP.

Blocking traffic from wireless access point may be right or wrong, depending on the location of the “blockage.” In any case, it’s not the best answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Troubleshooting networks add which elements to the general troubleshooting model? (Choose three.)

A

Correct Answers:

Using the network model as a starting place to troubleshoot network issues is an effective approach and can be performed using a top-to-bottom, bottom-to-top, or most likely layer to least likely layer (divide-and-conquer) methodology.

Incorrect Answer:

Troubleshooting from the outsides to the insides of a network model would be poor troubleshooting, plus there is no such approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does QoS provide?

A

Correct Answer:

QoS enables the prioritization of different traffic types with bandwidth approaches a connection’s maximum capacity.

Incorrect Answers:

QoS does not increase the speed of data flow.

QoS is not a firewall - it reduces the bandwidth of some traffic type(s) when total traffic load is high.

QoS does not perform traffic redirection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Windows utility enables you to query information from the DNS server and change how your system uses DNS?

A

Nslookup is a handy, but rather complex utility that runs from the command-line and is used to both query various information from a DNS server and change how your system uses DNS.

Incorrect Answers:

The Arp command displays the contents of the ARP cache on the local machine.

Nbtstat will display the contents of the NetBIOS name cache.

Tracert will trace and display the path taken by a packet to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In terms of network security, what is the purpose of hashing?

A

Correct Answer:

Hashing verifies data integrity by generating a unique value for a given chunk of data.

Incorrect Answers:

Hashing does not encrypt or decrypt data.

Hash is an excellent side dish with eggs, but this has no value when it comes to network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which statement is true of inter-VLAN routing?

A

Correct Answer:

Inter-VLAN routing is implemented within switches to enable communication between VLANs.

Incorrect Answers:

Because of Inter-VLAN routing, external routers are not required to connect VLANs.

VLANs do not natively encrypt or decrypt traffic.

VPNs, not VLANs, enable remote networks to connect over a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which statement is not true of IPv6 addresses?

A

Correct Answer:

IPv4 and IPv6 are not automatically translated back and forth.

Incorrect Answers:

Windows and other operating systems randomize outbound IPv6 traffic to improve privacy.

EUI-64 addressing can be traced back to the source computer.

All IPv6 addresses (except for link-local addresses) are global addresses - equivalent to public IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network tech suspects a wiring issue in a work area. Which element does she not need to check?

A

Correct Answer:

The connection from the router to the ISP does not exist in the work area. It is found in the equipment room.

Incorrect Answers:

Verifying link lights, workstation configuration, and NIC function of the computer in the work area are all valid things to check for a possible failure of structured cabling in the work area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not a normal Windows log?

A

Correct Answer:

Windows does not log network events.

Incorrect Answers:

The application log notes events around launching, using, and closing applications.

The security log tracks events related to logging in, password changes, and the like.

The setup log tracks events regarding the Windows installation and updates.

The System log tracks events related to the Windows bootup process.

The forwarded events log receives logged events from other Windows computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stan tells you that he cannot get on the network. You know the link light on the NIC is green and you know the cable is good. He seems to be the only one on the network having this problem. What command line utility and address do you use to run an internal test?

A

Correct Answer:

Don’t let the link light and good cable fool you. The NIC could still be bad. Pinging the loopback address (127.0.0.1) runs an internal test to verify that the NIC and TCP/IP is working.

Incorrect Answers:

Pinging anything else won’t tell you if your NIC is working correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Every day at the office, we play Counter-Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action–our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring?

A

Correct Answer:

In Windows, the Tracert command shows the path a packet takes from one host to another, including how long it takes for each hop.

Incorrect Answers:

Traceroute has the same function but is only available in UNIX and Linux.

Ping will only confirm that we can connect to the other systems, and the ARP command will only give us a list of the IP addresses that have recently been resolved to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not an element of a route metric?

A

Correct Answer:

The physical distance between routers is not considered when defining a metric.

Incorrect Answers:

Maximum Transfer Unit (MTU) size, cost, and bandwidth are all metric considerations (not listed but worthy of note are hop count and latency, which are also metric considerations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not a characteristic of the BGP routing protocol?

A

Correct Answer:

Border Gateway Protocol (BGP) uses OSPF (and other routing protocols) WITHIN autonomous systems but NOT BETWEEN different ASes.

Incorrect Answers:

The other choices are all characteristics of BGP.

17
Q

Which choice is not a typical Wi-Fi problem?

A

Correct Answer:

WPS failure is a very uncommon problem in Wi-Fi networks.

Incorrect Answers:

Wrong WAP password, interference, and changed WAP configuration are typical reasons that stations cannot connect to or through a WAP.

18
Q

Which area does not require user training?

A

Correct Answer:

Recycle policies are important but don’t require a training class. They can be read and understood from a typical manual.

Incorrect Answers:

User training is important to the organization and employees in at least the following areas: acceptable use, password policies, social engineering, malware avoidance, and system/workplace security.

19
Q

Which field would not be found in an Ethernet frame?

A

Correct Answer:

Source and destination IP addresses would be found in the IP packet, not in the Ethernet frame.

Incorrect Answers:

Destination MAC, Source MAC, and Ethertype fields are all found in the Ethernet frame.

20
Q

Which of the following would enable someone to capture user names and passwords on a network?

A

Correct Answer:

A sniffer would be the tool of choice here, analyzing network traffic and searching for any user names and passwords that went out in cleartext.

21
Q

Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)?

A

Correct Answer:

C, B, C

Incorrect Answers:

The first octet of a Class A address goes from 1 to 126.

The first octet of a Class B address goes from 128 to 191.

The first octet of a Class C address goes from 192 to 223.

22
Q

Which symptom is not a result of an IP addressing problem?

A

Correct Answer:

There is nothing wrong with assigning static IP addresses so long as the rules of assigning addresses are followed.

Incorrect Answers:

Duplicate IP addresses and duplicate MAC addresses can cause one or both hosts with the duplicated address to lose communication.

Configuring a host to refer to the wrong gateway will result in no connection beyond the local area network (LAN).

23
Q

Before an Ethernet NIC may transmit data onto a medium, it must check to see if another NIC is transmitting data. What is this checking process called?

A

Correct Answer:

Carrier sense, also known as carrier detect, is the test that a NIC performs before transmitting on a network medium.

Incorrect Answers:

Multiple access means that when the station transmits, all stations on the segment will hear the transmission.

Collision detection means that a station sending data can tell when another station transmits at the same time.

Collision avoidance is the technique used by a network interface to recover from or prevent a collision.

24
Q

SIEM is comprised of which primary elements? (Choose two.)

A

Correct Answers:

Aggregation and correlation are the two primary components of security information and event management (SIEM).

Incorrect Answers:

Analysis and reporting are components of correlation.