Practice Test 1 Flashcards
It is 3 am on a Saturday and you just received a call from a system administrator that reports multiple network outages across the office network. It is snowing heavily outside and the roads are inaccessible for you to get to the building to check the configuration of the network devices. What technology should you use to connect to the network from your home office in order to troubleshoot the network outages?
HTTP
TELNET
SNMP
SSH
SSH
You should use a VPN or a SSH connection to remotely connect to your office network remotely from home. Either of these options would provide you with an encrypted tunnel to the office network and allow you to begin troubleshooting remotely just as if you were physically located inside the building. SNMP isn’t used for troubleshooting, but instead for network monitoring and reporting. Telnet and HTTP are both insecure and should not be used to connect to your office network from home without the fear of the information being intercepted or changed.
Your company has two office buildings which are connected via copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?
Cross talk on the cable
An open circuit has been created
Electromagnetic interference on the cable
Signal attenuation on the cable
An open circuit has been created
Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut/broken by the construction workers. This can be verified using a Time-Domain Reflectometer to determine exactly where in the cable the break has occurred.
Mark is setting up a DHCP server on a segment of the corporate LAN. Which of the following options is NOT required in the DHCP scope in order to allow hosts on that LAN segment to be assigned a dynamic IP addresses and to still be able to access the Internet and internal company servers?
Default gateway
Reservations
DNS servers
Subnet mask
Reservations
In order to effectively access the Internet, the DHCP must provide a default gateway, DNS server, and subnet mask to each client. Using DHCP reservations is not required to be configured to meet the requirements provided in the question.
A technician added memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?
VTP
Driver Update
ESD
Halon particles
ESD
The most likely cause is that the memory chips are bad, because they have suffered from electrostatic discharge (ESD) during the installation and movement of the chips. (This question references a concept covered in-depth in your A+ curriculum, but is considered fair game on the Network+ exam.)
A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the Internet via the kiosk’s wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?
Firewall
Web filtering
MAC filtering
Host-based antivirus
Mac filtering
MAC Filtering will control access to the network by restricting access to only certain devices.
A technician has installed an 802.11n network and most users are able to see speeds of up to 300Mbps. There are few users who have an 802.11n network card but are unable to get speeds higher than 108Mbps. What should the technician do to fix the issue?
Upgrade the OS version to 64-bit
Roll back the firmware on WLAN card
Install a vulnerability patch
Upgrade the WLAN card driver
Upgrade the WLAN card driver
Wireless N networks can support up to 600Mbps with the proper software drivers for the network cards. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates.
A malicious user is blocking mobile devices from connecting to the Internet when other people are in the coffee shop. What is the malicious user implementing?
Removing the AP from the classroom ACL Jamming Firewall IPS
Jamming
Jamming is one of the many exploits used to compromise a wireless environment. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.
Which of the following provides origin authenticity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?
IPSEC
SHA
DES
CRC
IPSEC
Internet Protocol Security (IPSec) is a network protocol that encrypts and authenticates data sent over a network. All other choices offer encryption or authentication.
Routing prefixes, which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR), are known as what?
Network handle
Autonomous system number
Route aggregation
Top level domain
Autonomous system number
ASN (or Autonomous System Number) are used to control routing with BGP routing protocols to route traffic across the network.
Which of the following BEST describes how a DHCP reservation works?
By leasing a set of reserved IP addresses according to their category
By letting the network switches assign IP addresses from a reserved pool
By assigning options to the computers on the network by priority
By matching a MAC address to an IP address within the DHCP scope
By matching a MAC address to an IP address within the DHCP scope
When the client requests an IP address by sending a message on the network to the DHCP server, the DHCP server will assign an IP from its DHCP scope to the client and reserve it based on the client’s MAC address.
Which of the following is used to proxy client requests for IP configurations across different network segments?
DHCP relay
SOCKS
Teredo tunneling
Reverse proxy
DHCP relay
A DHCP client is an Internet host using DHCP to obtain configuration parameters such as an IP address. A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to forward requests and replies between clients and servers when they are not on the same physical subnet.
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?
Port scanner tool
Interface monitoring tool
Packet capture tool
Spectrum Analyzer tool
Spectrum Analyzer tool
A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is most like a spectrum interference issue.
A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. What is the cause of this issue?
Latency
Throttling
Interference
Split horizon
Interference
As a process of elimination, throttling slows down speed and latency slows down speed even further. Split horizon prevents loops so it only makes sense that interference is the choice. Also, interference causes drops in connections in many circumstances.
You are troubleshooting the network connectivity between a remote server and your workstation. Which of the following tools should you use to determine the connection path between your workstation and the remote server?
pathping
tcpdump
netstat
ping
Pathping
Pathping works on Windows systems from the command line. This command provides details of the path between two hosts and Ping-like statistics for each node in the path based on samples taken over a time period, depending on how many nodes are between the start and end host. The advantages of PathPing over ping and traceroute are that each node is pinged as the result of a single command, and that the behavior of nodes is studied over an extended time period, rather than the default ping sample of four messages or default traceroute single route trace. The disadvantage is that it takes a total of 25 seconds per hop to show the ping statistics. This makes pathping the best option to use.
In what type of attack does the potential intruder trick a user into providing sensitive information?
Social engineering
Bluesnarfing
Man in the middle
Evil Twin
Social engineering
Social engineering is the art of convincing people to reveal confidential information to the intruder.
Which of the following network protocols is used to send email from one server to another server?
RTP
SNMP
POP
SMTP
SMTP
Simple Mail Transfer Protocol (SMTP) is a well-known application that uses port 25 for sending email from one server to another server.
A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?
Use the same SSIDs on different channels and AP isolation
Use diff SSIDs on differ channels and VLANs
Use differ SSIDs on the same channels and VLANs
Use the same SIDs on same channels with AP isolation
Use the same SSIDs on different channels and AP isolation
For users to be able to seamlessly migrate between the two buildings, both Access Points (AP) must use the same SSIDs. They must be on different channels though. Otherwise, interference would occur. Access Point (AP) isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.
At which of the following OSI layer does QoS operate?
1
3
5
7
Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model.
You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and is allowing access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client that is preventing you from connecting to the router?
Change default credentials
Perform file hashing
Generate a new SSH key
Update firmware
Generate a new SSH key
When configuring your SSH connection, you must ensure that a key is established between your client and the server. If you never setup an SSH key, you will need to generate a new key to get SSH to connect properly. Since the other technician was able to connect on her machine, we can rule out a SSH server issue, so it must be an issue with your account or client. The only option that relates solely to your account or client is the possibility that a key was not generated.
Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?
Network
Session
Transport
Data Link
Data Link
In the data link layer (layer 2) of the OSI model, the basic unit of transfer is called a frame. In an ATM network, these frames are called cells and are of a fixed (53 octets or bytes) length that allows for faster switching of the cells across the network.
A technician is concerned about security and is asked to set up a network management protocol. Which network management protocol will provide the best security?
SLIP
SNMPv3
TKIP
SNMPv2
SNMPv3
Simple Network Management Protocol (SNMP) is an Internet-standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Three significant versions of SNMP have been created, with SNMPv3 being the most secure.
The UPS that provides backup power to your server is malfunctioning because its internal battery has died. To replace the battery, you must shut down the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the availability of the server in the future. Which of the following recommendations would BEST increase the availability of the server based on your experience with the UPS battery replacement?
Install a second UPS in the rack
Install a surge protector instead
Add a redundant power supply to the server
Replace the UPS with a generator
Add a redundant power supply to the server
The BEST recommendation would be to install a redundant power supply in the server. Adding a second UPS would not solve the problem if the server still only has one power supply available. Switching from a UPS to a generator will not solve this issue, either, because generators also requirement scheduled maintenance and downtimes. Finally, adding a surge protector won’t provide power when you need to power off a UPS for a battery replacement.
What tool would a network technician use to troubleshoot a span of single-mode fiber cable?
Punchdown tool
Spectrum analyzer
Ethernet tester
OTDR
OTDR
The other answers are used with copper cables (like CAT5). An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize an optical fiber. An OTDR is the optical equivalent of an electronic time domain reflectometer.
An offsite backup service is involved in an investigation currently. Because of this, they are not recycling the outdated tapes. Which of the following is the MOST likely reason for this?
The process of discovery
A chain of custody breach
A data transport request
A notice of a legal hold
A notice of a legal hold
A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted.
Your company has decided to upgrade its legacy phone system to use VoIP devices instead. The new phones will download the configurations from a server each time they boot up. Which of the following ports needs to be opened on the firewall to ensure the phones can communicate with the TFTP server?
21
53
69
161
TFTP uses port 69 to communicate.
Which of the following network concepts is prevented by using a split horizon?
Large routing tables
Duplicate addresses
Collisions
Loops
Loops
In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
Susan is a network administrator who is in the process of preparing and cleaning network switches for resale. She splashes the cleaning agent in her eye and needs to know the procedure to do in order to cleanse her eye. Where should she look to find the right procedure?
EULA
MSDS
SLA
MOU
MSDS
The Manufacturers Safety Data Sheet (MSDS) lists the chemical composition of the solution and states the relevant protocol for first aid treatment. (This is another concept covered by the A+ exam, but if you didn’t know it, you should have been able to guess it based on eliminating the other 3 options.
When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the copper conductor on several of the wire strands. These exposed wires come into contact with each other forming an electrical connection. Which of the following conditions was created?
Short
Open
Electrostatic discharge
Crosstalk
Short
A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail