Test 1 Flashcards
- Which of the following is a system of notation that uses base 16 rather than base 10?
A. Hex
B. Octal
C. Binary
D. CIDR
A. Hex
hexadecimal is known as base-16, hex alone is base-6.
The question is formatted wrong.
- A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?
A. authpriv
B. SHA
C. MD5
D. Authentication passphrase
A. authpriv
AuthPriv is the most correct answer. SNMPv3 defines communication with authentication and privacy (AuthPriv) as one of three mechanisms available. It uses MD5 and SHA for authentication and either DES or AES for privacy.
While both SHA and MD5 are used in the solution, they are insufficient on their own.
A passphrase would be insufficient to sustain confidentiality of the data.
- The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organizationג€™s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?
A. Session hijacking B. Blocking C. Throttling D. Data usage limits E. Bandwidth quotas
C. Throttling
Throttling: is the intentional slowing or speeding network (internet service)
- A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network.
Which of the following components should the technician check on the Windows workstations? (Choose two.)
A. Start the Wired AutoConfig service in the Services console
B. Enable IEEE 802.1q Authentication in Network Interface Card Properties
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
D. Start the Wireless AutoConfig service in the Services console
E. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties
A. Start the Wired AutoConfig service in the Services console
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
- The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?
A. Enforce port security to require system authentication
B. Implement a standardized UNC
C. Label existing systems with current hostnames
D. Forward the DHCP logs to the security manager every day
B. Implement a standardized UNC
A Universal Naming Convention (UNC) format name defines the location of files and other resources that exist on a network. UNC provides a format so that each shared resource can be identified with a unique address.
- A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?
A. Light sensors are interfering with the network
B. EMI from the lights is interfering with the network cables
C. Network wiring is run perpendicular to electrical conduit
D. Temperature changes are causing attenuation in copper cabling
C. Network wiring is run perpendicular to electrical conduit
- A network technician configures a firewalls ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewalls deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?
A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389
B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
C. Set the firewall to operate in transparent mode
D. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123
B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
- A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?
A. Smurf attack
B. Rogue AP
C. Compromised system
D. Unintentional DoS
C. Compromised system
- Which of the following would be the MOST efficient subnet mask for a point-to-point link?
A. /28
B. /29
C. /31
D. /32
C. /31
/31 is correct for Point to Point links because you dont need a network ID or a Broadcast address.
- An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig command:
Which of the following would MOST likely allow the network drives to be accessed?
A. Update the WLAN adapter driver
B. Disable the WLAN adapter
C. Check the wireless DHCP configuration
D. Disable the LAN adapter
B. Disable the WLAN adapter
If you look at the DNS Suffix you can see that one of the domains is guestwifi.local whilst the other one is comtia.net. Assuming that Guest Wifi is segmented from the rest of the corporate network, you wouldnt be able to access corporate resources on the guest wifi.
- Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?
A. Bend radius exceeded
B. Fiber cable mismatch
C. Fiber type mismatch
D. Bad fiber switch
A. Bend radius exceeded
- Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)
A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n
B. 802.11ac
E. 802.11n
Mu mimo Supports devices that use 5GHz
so 802.11ac and 802.11n are correct though typically 802.11n is dual band and seen only as mimo. A,G,B dont support mimo.
- A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?
A. 10.5.4.0/22 B. 10.233.2.0/23 C. 172.16.0.0/22 D. 172.18.0.0/23 E. 192.168.25.0/24
D. 172.18.0.0/23
Class B IP (between 128.0.0.1 - 191.255.255.254)
/23 Allows 510 Hosts 172.18.0.1 - 172.18.1.254
There’s additional subnets of the same size for future use
e.g 172.18.2.1 - 172.18.3.254 for hosts
/22 is a waste, therefore C is incorrect
- A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?
A. Air flow and cooling
B. UPS capability
C. Circuit labeling
D. Power redundancy
A. Air flow and cooling
They specify an “old building”. I believe the point here is to check the ventilation of the actual room where the rack will be placed.
- Which of the following DNS records needs to be configured for SMTP traffic?
A. MX
B. CNAME
C. AAAA
D. PTR
A. MX
MX is the most correct answer.
MX records are for mail exchangers.
CNAME is the canonical name record, which maps one domain to another.
AAAA records are for human names to IPv6 domains or hosts.
PTR records are for pointers, which give the hostname for an IP address (reverse lookup).
- In which of the following ways does a DDoS attack differ from a spoofing attack?
A. DDoS attacks target multiple networks
B. Spoofing attacks originate from a single host
C. DDoS attacks are launched from multiple hosts
D. Spoofing attacks require physical presence
C. DDoS attacks are launched from multiple hosts
A DDoS targets a single host or server or any part of the network from ‘multiple’ sources
- A user checks an IP address using an external website. The address is different than the one the user sees when opening a command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses. This is BEST explained by the interworking of:
A. network devices
B. packet flow
C. public/private networks
D. traffic-routing protocols
C. public/private networks
NAT translation.
- Which of the following communication media can carry many voice, data, and video channels simultaneously over multiple frequencies?
A. Broadband
B. Baseband
C. Analog modem
D. CSMA
A. Broadband
- To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?
A. Add a redundant power supply to the switch
B. Implement stacking on the switches in the rack
C. Add a second UPS into the rack
D. Install a power converter for the switch
A. Add a redundant power supply to the switch
A redundant power supply is when a single piece of networking equipment operates using two or more physical power supplies. Each of the power supplies will have the capacity to run the device on its own. This makes sure that the device could operate normally even if one power supply fails.
- A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST?
A. Document the scene
B. Take pictures upon arrival
C. Secure the area
D. Implement chain of custody
C. Secure the area
From Mike Meyer’s book:
In general, when you are in a situation where you are the first
responder, you need to
- Secure the area
- Document the scene
- Collect evidence
- Interface with authorities
- A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?
A. LAN
B. PAN
C. MAN
D. WAN
C. MAN
MAN stands for metropolitan area network. It covers the largest area than LAN such as small towns, cities, etc. MAN connects two or more computers that reside within the same or completely different cities. MAN is expensive and should or might not be owned by one organization.
LAN stands for local area network. It is a group of network devices that allow communication between various connected devices. Private ownership has control over the local area network rather than the public. LAN has a short propagation delay than MAN as well as WAN. It covers the smallest area such as colleges, schools, hospitals, and so on.
WAN stands for wide area network. It covers a large area than LAN as well as a MAN such as country/continent etc. WAN is expensive and should or might not be owned by one organization. PSTN or satellite medium is used for wide area networks.
- An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?
A. An NDA ensuring work data stored on the personal phone remains confidential
B. An AUP covering how a personal phone may be used for work matters
C. A consent to monitoring policy covering company audits of the personal phone
D. Real-time remote monitoring of the phoneגs activity and usage
D. Real-time remote monitoring of the phoneג€™s activity and usage
- Which of the following protocols can be both connection-oriented and connectionless?
A. 20 FTP
B. 53 DNS
C. 67 DHCP
D. 80 HTTP
B. 53 DNS
DNS is the most correct answer, using both TCP and UDP ports 53 natively.
FTP uses TCP port 20 and 21.
DHCP uses UDP ports 67 and 68.
HTTP uses TCP port 80, but can also use UDP if adapted to do so. DNS remains the most correct answer because HTTP must be adapted to support UDP, while DNS has always supported both.
- Which of the following BEST describes the differences between VLAN hopping and session hijacking?
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a users web connection to execute commands
B. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection
C. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges
D. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a users web connection to execute commands
- An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organizations network. As part of the attack, the analyst launches a fake access point matching the SSID of the organizations guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for the latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?
A. Bluesnarfing B. Session hijacking C. MAC spoofing D. VLAN hopping E. Man-in-the-middle
E. Man-in-the-middle
- A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)
A. Document the reason for the request
B. Scan the file for malware to protect the sales departments computers
C. Follow the company’s approval process for the implementation
D. Install a TFTP server for the customers to use for the transfer
E. Create a honeypot to store the file on for the customers to use
F. Write the SLA for the sales department authorizing the change
A. Document the reason for the request
C. Follow the company’s approval process for the implementation
- A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network?
A. Wireless switch toggled off
B. WAP settings
C. WLAN IP address out of scope
D. Wireless controller misconfiguration
A. Wireless switch toggled off
- A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
B. Adding a fingerprint reader and retina scanner
C. Using a smart card and RSA token
D. Enforcing a stronger password policy and using a hand geometry scan
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
There are three common factors used for authentication: Something you know (such as a password)
Something you have (such as a smart card)
Something you are (such as a fingerprint or other biometric method)
- A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?
A. DOCSIS modem
B. Wireless router
C. DSL modem
D. Access point
A. DOCSIS modem
- A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
D. Change management
- Which of the following VPN protocols establishes a secure session that can be initiated using a browser?
A. IPSec
B. SSL VPN
C. PTP
D. PPTP
B. SSL VPN
A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)
A. Enable SSID broadcasting to identify the guest network
B. Configure visitor devices to use static IP addresses
C. Enable two-factor authentication on visitor devices
D. Configure the access point to use WPA2-AES encryption
E. Ensure the access point is not running in mixed mode
A. Enable SSID broadcasting to identify the guest network
E. Ensure the access point is not running in mixed mode
- When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
A. iSCSI
B. Fibre Channel
C. NAS
D. DAS
C. NAS
- A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?
A. LC B. ST C. SC D. MTRJ E. MTP
B. ST
ST (Straight Tip) connections twist similar to BNC
ST connectors: These connectors are the most common type of commercial fiber optic connector. These connectors utilize an exposed plastic tube housing the optical fiber. This requires a connection to a matching cable on the other side, incorporating a connector that mates to the other. These combine in a spring-loaded twist, reminiscent of BNC connectors, and are noted for their reliability. ST connector is very popular in communication applications, such as LANs and CCTV systems.
- Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?
A. ISDN B. MPLS C. PRI D. Broadband cable E. Frame relay
E. Frame relay
Answer is fram relay, remember to answer what comptia wants you to hear. When they talk about MPLS they will mention labels
- A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following BEST explains this response?
A. The ports belong to an active system and are denying requests
B. The ports are associated with deprecated services
C. The ports do not belong to a live system
D. The ports replied with a SYN/ACK response
B. The ports are associated with deprecated services
B is correct. Popular port scanner “Nmap” defines a closed port as follows:
“A closed port is accessible (it receives and responds to Nmap probe packets), but there is no application listening on it.”
- Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?
A. There is interference from small appliances
B. The signal coverage area is too small
C. Not enough DHCP addresses have been allotted
D. The DNS cache on the users computers has become corrupt
C. Not enough DHCP addresses have been allotted
An exhausted DHCP pool would also suggest a lot of users taking up bandwidth which would cause slow speeds. The exhausted DHCP pool would prevent others from accessing the network all together.
- A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?
A. Network
B. Physical
C. Transport
D. Application
A. Network
Looks like physical layer but it does not say any cable but the wired network (device). So, network is the issue.
- Which of the following physical security controls is MOST likely to be susceptible to a false positive?
A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera
C. Proximity reader
a proximity reader will grant access to a user with proximity card that it recognizes. It doesn’t need to know if the user is legitimate or not.