Net+ Flashcards
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
A. 192.168.0.55
B. 192.168.1.0
C. 192.168.1.1
D. 192.168.5.5
E. 255 255 255.0
C
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
A. SIP
B. BGP
C. LACP
D. LLDP
C
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?
A. Decreased performance of internal network
B. Loss of full control over data resources
C. Increased malware exposure
D. Incompatibility with the current network
B
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?
A. AUP
B. SLA
C. NDA
D. MOU
A
A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?
A. Light sensors are interfering with the network
B. EMI from the lights is interfering with the network cables
C. Network wiring is run perpendicular to electrical conduit
D. Temperature changes are causing attenuation in copper cabling
C
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an
issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
B. ping
C. nslookup
D. netstat
A
A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
A. Layer 2 switch
B. Layer 3 switch
C. Bridge
D. Load balancer
B
A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server
that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure
the Linux server can reach the backup location?
A. netstat
B. traceroute
C. route
D. dig
E. ifconfig
B
An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of
the following is needed to protect BOTH the employee and the company?
A. An NDA ensuring work data stored on the personal phone remains confidential
B. An AUP covering how a personal phone may be used for work matters
C. A consent to monitoring policy covering company audits of the personal phone
D. Real-time remote monitoring of the phone’s activity and usage
D
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
C.
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera
C.
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this
approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A
A network administrator wants to ensure sensitive data is not infiltrated from the system electronically. Which of the following should be implemented
A. DLP
B. AUP
C. NDA
D. SLA
C
A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the
business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the
application. Which of the following would be the MOST cost effective for the administrator to recommend?
A. Create Ethernet VLANs
B. Disable autonegotiation on the servers
C. Install 10Gb Ethernet NICs in the servers
D. Install Fibre Channel for the server network
C?
The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician
suspects the performance issues are network related Which of the following should the technician do to improve performance?
A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel
C
A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output:
Which of the following changes should be made to allow all customers to access the company’s secure website?
A. Allow any any 10.5.0.10 443
B. Allow any any 12.73.15.5 443
C. Allow 10.5.0.10 443 any any
D. Allow 10.5.0.10 any 10.5.0.10 30
C
A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular
connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician
need to complete the installation?
A. LC to SC
B. SC to ST
C. LC to ST
D. ST to ST
E. SC to SC
C
A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet
access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e
specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following
actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?
A. Place a switch at the hotel’s patch panel for connecting each room’s cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there
A
A technician is investigating a server performance issue, The technician has gathered the server utilization statistics. Which of the following should the
technician use to determine which statistics are not in the normal range?
A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs
A
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician
confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should
the technician use to reveal the location of the fault?
A. OTDR
B. Light meter
C. Tone generator
D. CSU/DSU
A
A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which
of the following threats is MOST likely involved?
A. Smurf attack
B. Rogue AP
C. Compromised system
D. Unintentional DoS
C
A technician is connecting a router directiy to a PC using the G1 /0/1 interface. Without the use of auto-sensing ports, which of the following cables should be
used?
A. Straight-through
B. Console
C. Rollover
D. Crossover
D
A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following shouId the technician perform to ensure another
cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all access points
D. Use TACACS+ authentication
B
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager
notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems
involved in security incidents?
A. Enforce port security to require system authentication
B. Implement a standardized UNC
C. Label existing systems with current hostnames
D. Forward the DHCP logs to the security manager every day
B