Network+ Practice test questions Flashcards
A technician added memory to a router, but the router never recognizes that memory. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?
A) VTP (VLAN Trunking Protocol)
B) Driver Update
C) ESD (electrostatic discharge)
D) Halon particles
Answer:
The most likely cause is that the memory chips are faulty because they have suffered from electrostatic discharge (ESD) during the chips’ installation and movement.
A technician has installed an 802.11n network, and most users can see speeds of up to 300Mbps. A few of the users have an 802.11n network card but cannot get speeds higher than 108Mbps. What should the technician do to fix the issue?
A) Upgrade the OS version to 64-bit
B) Roll back the firmware on the WLAN card
C) Install a vulnerability patch
D) Upgrade the WLAN care driver
Answer:
Wireless N networks can support up to 600Mbps with the network cards’ proper software drivers. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates.
Which of the following provides origin authenticity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?
A) IPSEC
B) SHA
C) DES
D) CRC
Answer:
OBJ-3.4: Internet Protocol Security (IPSec) is a network protocol that encrypts and authenticates data sent over a network. All other choices offer encryption or authentication.
Routing prefixes, which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR), are known as what?
A) Network handle
B) Autonomous system number
C) Route aggregation
D) Top level domain
Answer:
OBJ-1.3: An ASN (or Autonomous System Number) is used to control routing with BGP (Border Gateway Protocol) routing protocols to route traffic across the network.
Which of the following is used to proxy client requests for IP configurations across different network segments?
A) DHCP relay
B) SOCKS
C) Teredo tunneling
D) Reverse proxy
Answer:
OBJ-1.8: A DHCP client is an Internet host using DHCP to obtain configuration parameters such as an IP address. A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents forward requests and replies between clients and servers when they are not on the same physical subnet.
A technician installs a new WAP, and users in the area begin to report poor performance. The technician uses ping, and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?
A) Port scanner
B) Interface Monitoring tool
C) Packet capture tool
D) Spectrum analyzer tool
Answer:
OBJ-5.2: A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is almost like a spectrum interference issue.
A network technician connects three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up, and the network technician can ping devices in all office trailers. However, connectivity is sporadic. What is the cause of this issue?
A) Latency
B) Throttling
C) Interference
D) Split horizon
Answer:
OBJ-5.4: As a process of elimination, throttling slows down the speed, and latency slows down speed even further. Split horizon prevents loops, so it only makes sense that interference is the choice. Also, interference causes drops in connections in many circumstances.
You are troubleshooting the network connectivity between a remote server and your workstation. Which of the following tools should you use to determine the connection path between your workstation and the remote server?
A) pathping
B) tcpdump
C) netstat
D) ping
Answer:
OBJ-5.2: Pathping works on Windows systems from the command line. This command provides details of the path between two hosts and Ping-like statistics for each node in the path based on samples taken over a time period, depending on how many nodes are between the start and end host. The advantages of PathPing over ping and traceroute are that each node is pinged as the result of a single command and that nodes’ behavior is studied over an extended time period, rather than the default ping sample of four messages or default traceroute single route trace. The disadvantage is that it takes a total of 25 seconds per hop to show the ping statistics. This makes pathping the best option to use.
Which of the following network protocols is used to send email from one server to another server?
A) RTP
B) SNMP
C) POP
D) SMTP
Answer:
OBJ-1.1: Simple Mail Transfer Protocol (SMTP) is a well-known application that uses port 25 for sending email from one server to another server.
A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?
A) Use the same SSIDs on different channels and AP isolation.
B) Use the same SSIDs on different channels and VLANS
C) Use the same SSIDs on the same channels with VLANS
D) Use the same SSIDs on the same channels with AP isolation.
Answer:
OBJ-1.6: For users to be able to seamlessly migrate between the two buildings, both Access Points (AP) must use the same SSIDs. They must be on different channels, though. Otherwise, interference would occur. Access Point (AP) isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.
At which of the following OSI layer does QoS operate?
A) Layer 1
B) Layer 3
C) Layer 5
D) Layer 7
Answer:
OBJ-1.2: Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model.
You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and allows access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client preventing you from connecting to the router?
A) Change default credentials
B) Perform file hashing
C) Generate a new SSH key
D) Update firmware
Answer:
OBJ-3.4: When configuring your SSH connection, you must ensure that a key is established between your client and the server. If you never setup an SSH key, you will need to generate a new key to get SSH to connect properly. Since the other technician was able to connect on her machine, we can rule out a SSH server issue, so it must be an issue with your account or client. The only option that relates solely to your account or client is the possibility that a key was not generated.
Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?
A) Network
B) Session
C) Transport
D) Data Link
Answer:
OBJ-2.5: In the data link layer (layer 2) of the OSI model, the basic unit of transfer is called a frame. In an ATM network, these frames are called cells and are of a fixed (53 octets or bytes) length that allows for faster switching of the cells across the network.
What tool would a network technician use to troubleshoot a span of single-mode fiber cable?
A) Punchdown tool
B) Spectrum analyzer
C) Ethernet tester
D) OTDR (optical time-domain reflectometer
Answer:
Explanation
OBJ-5.2: The other answers are used with copper cables (like CAT5). An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize an optical fiber. An OTDR is the optical equivalent of an electronic time-domain reflectometer.
Which of the following network concepts is prevented by using a split-horizon?
A) Large routing tables
B) Duplicate addresses
C) Network collisions
D) Routing loops
Answer:
OBJ-4.6: In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposed the copper conductor on several of the wire strands. These exposed wires come into contact with each other forming an electrical connection. Which of the following conditions was created?
A) Short
B) Open
C) Electrostatic discharge
D) Crosstalk
Answer:
OBJ-2.1: A short in electrical terms is an abbreviation for a short circuit. This generally means an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected, causing the cable to fail.
The company’s corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department’s needs.
What is the correct CIDR notation for the Marketing department’s subnet which requires 11 devices?
Since the Marketing department needs 11 devices plus a network ID and broadcast IP, it will require 13 IP addresses. The smallest subnet that can fit 13 IPs is a /28 (16 IPs).
What can be issued from the command line to find the layer 3 hops to a remote destination?
Traceroute will determine every hop between the host and the destination using ICMP. Traceroute is used for Linux and UNIX systems. Tracert is used for Windows systems.
A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage?
High gain antennas put out increased signal strengths and can reach further with fewer WAPs.
You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?
In SNMPv3, the authPriv option ensures that the communications are sent with authentication and privacy. This uses MD5 and SHA for authentication and DES and AES for privacy and encryption.