Test 2 Flashcards

1
Q
  1. A junior network technician is working in the field and needs to connect to the company’s remote server, however, doing so will require the junior technician to use the public Internet. Because security is a concern, which of the following is the BEST method to use?

A. Telnet
B. SSH
C. SFTP
D. VNC

A

B. SSH

A. Telnet - not encrypted, not secure
B. SSH - secure shell, encrypted, port 22, typical secure way to access Linux servers
C. SFTP - FTP over ssh but only limited to file transfers
D. VNC - not encrypted by default, hence not secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A home user has purchased a new smart TV to stream online video services. The smart TV is unable to connect to the wireless network after several attempts. After returning from vacation, the home user tries again and can connect the TV to the wireless network. However, the user notices a laptop is no longer able to connect to the network. Which of the following is the MOST likely cause?

A. The DHCP scope has been exhausted.
B. The security passcode has been changed.
C. The SSID is hidden.
D. The AP configuration was reset.

A

A. The DHCP scope has been exhausted.

A. The DHCP scope has been exhausted.
B. The security passcode has been changed - eliminated
C. The SSID is hidden - eliminated
D. The AP configuration was reset - eliminated

the reason I support A is that all home routers I have come across can have their DHCP scope reduced to a handful of IPs. In my home that number is 10. To make sure my own devices always get an IP, I also add a DHCP reservation for their MAC addresses.

This behavior of not getting an IP is due to DHCP scope exhaustion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group. Which of the following security attacks is taking place?

A. Evil twin
B. Social engineering
C. Insider threat
D. Phishing

A

B. Social engineering
or
C. Insider threat

Somehow, I think they misspelt “authorized” instead of “unauthorized” which would then make a lot more sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following DNS record types allows IPv6 records to be resolved to DNS names?

A. PTR
B. A
C. AAAA
D. SRV

A

C. AAAA

AAAA address record maps hostname to IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A network technician has recently installed new VoIP phones at all employeeג€™s desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)
A. TCP 443 is allowed.
B. UDP 1720 is allowed.
C. UDP 5060 is allowed.
D. UDP 5061 is allowed.
E. TCP 8080 is allowed.
F. TCP 8181 is allowed.
A

C. UDP 5060 is allowed.
D. UDP 5061 is allowed.

the two ports 5060 & 5061 both are on UDP/TCP and are both associated SIP by IANA. In particular, port 5060 is assigned to clear text SIP, and port 5061 is assigned to encrypted SIP, also known as SIP-TLS (SIP over a TLS, Transport Layer Security, encrypted channel). Unfortunately, the standard TLS (successor of SSL) can only be established over TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following would allow a network technician to access files on a remote system? (Choose two.)
A. FTP
B. TFTP
C. VLSM
D. SIP
E. SMTP
F. IMAP
A

A. FTP
B. TFTP

File transfer protocol and trivial file transfer protocol,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following provides two-factor authentication?

A. Username + password
B. Smart card + PIN
C. Fingerprint + retina scan
D. Key fob + ID card

A

B. Smart card + PIN

Authentication factors

1) What you know such as username, passwords, pin
2) What you have such as keycard, token, badge
3) What you are such as retina scan, fingerprint , voice

2FA requires combination of any 1,2,3.
3 FA requires all 1,2,3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A technician set up a new SOHO network recently. The installed router has four Ethernet ports, however, the customer has seven devices that need wired connections. Which of the following should the technician do to BEST meet the customers requirements?

A. Install a six-port switch.
B. Configure port forwarding on the router.
C. Install WAPs near the devices.
D. Configure the switchports as EtherChannel ports.

A

A. Install a six-port switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A technician is performing a maintenance task on a weekly basis and wants to ensure the task is properly documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?
A. Standard operating procedure
B. Work order
C. Performance baseline
D. Logical diagram
E. Change management
A

A. Standard operating procedure

OP is a manual or set of detailed instructions to ensure anyone can come on the scene and conduct business as usual in the absence of management or other familiar persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A company is allowing its employees to use their personal computers, tablets, and IoT devices while at work. However, there are rules and guidelines to which employees must adhere. Which of the following documents applies to these employees?

A. NDA
B. SOP
C. BYOD
D. SLA

A

C. BYOD

Bring your own device (BYOD) basically what you can or can’t do on a personal device in someone’s/companies/business network. In this case, acceptable use policy (AUP) would work IF the answer choice was not an option, don’t forget that AUP is not only limited to personal devices but any device on the network! However, if both options (BYOD and AUP) BYOD would be a better answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are characteristics of jumbo frames? (Choose two.)

A. Commonly used on SAN
B. MTU size greater than 1500
C. MTU size greater than 10000
D. Commonly used on IaaS
E. MTU size greater than 12000
A

A. Commonly used on SAN
B. MTU size greater than 1500

A jumbo frame is defined as an Ethernet packet with a payload size greater than the standard maximum transmission unit (MTU) of 1500 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? (Choose two.)
A. FTP
B. SMTP
C. VPN
D. SSH
E. SNMP
A

C. VPN

D. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?

A. File hash
B. File date
C. File type
D. File size

A

A. File hash

Hash is used to checking integrity, for example, if a file before it was sent across the internet had the hash of “1243541” and after it was sent it had the hash of “1254341” you know something is up with the file, it might be altered or corrupted or whatnot, thus the file has lost its integrity and cant be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)
A. tracert
B. ping
C. tcpdump
D. pathping
E. netstat
F. nslookup
G. route
A

A. tracert
D. pathping

node is a point of redistribution, therefore the given answer is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?

A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF

A

A. CSMA/CD

Carrier Sense Multiple Access with Collision Detection is the most correct answer. CSMA/CD works by checking for active communications and attempting to transmit when clear. If a collision occurs, then it will use the back-off timer.
CSMA with Collision Avoidance is incorrect. Since it is not conventionally possible to determine if or when a device is transmitting, collisions are inevitable. To counter this, a timer mechanism is in place to regulate transmissions and will back-off pre-emptively, actively avoiding as many collisions as it can.
Multiprotocol Label Switching is incorrect; this relates to labelling switched traffic of different protocols and has no relevance to collision aversion.
Open Shortest Path First is incorrect; OSPF helps find the shortest path through a network for fast and efficient delivery of data and has no relevance to collision aversion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the MOST likely cause of this issue?

A. DHCP exhaustion
B. Channel overlapping
C. Interference
D. Overcapacity

A

D. Overcapacity

From Mike’s book:

We overwork WAPs in many different ways, but one of the most
common is by attaching too many devices to a single SSID over
time, what’s called device saturation. This creates overcapacity
issues, such as slow speeds and inability to connect to the network.
Avoid device saturation by adding more capacity. Careful
placement of extra WAPs in high-demand areas is a huge step in
the right direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Which of the following BEST describes an exploit?

A. A router with default credentials
B. An open mail relay server
C. An SNMPv1 private community
D. A privilege escalation script

A

D. A privilege escalation script

An exploit (concerning cybersecurity) is code generally written by a researcher or a malicious actor. It’s used to test or take advantage of software vulnerability/security flaws.

Question D is correct. Privilege escalation occurs when a malicious actor uses vulnerabilities (e.g., design flaws, configuration errors…).

Questions A, B, and C are incorrect; these are examples of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?

A. Load balancer
B. IDS
C. Proxy server
D. Wireless controller

A

C. Proxy server

Proxy server is the most correct answer. In addition to providing web filtering, proxy servers can also cache web sites for network users for faster access. These two features together meet the performance and security requirements of the scenario.
Load balancer is incorrect; while it will help optimize network performance at large, it does not explicitly provide any security features.
Intrusion Detection System is incorrect; while a prolific security feature, an IDS will not proactively defend a network, and may instead congest traffic.
Wireless controller is incorrect; wireless controllers are used to maintain and manage multiple wireless access points. As it is more of a management tool, it does not explicitly provide increased network performance or added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. A technician is setting up VoIP phones on a wireless network. Users report that calls are choppy and sometimes dropped. The technician has measured two characteristics using simple command-line tools that verify the problem. Which of the following characteristics did the technician measure? (Choose two.)
A. Reflection
B. Latency
C. Interference
D. Packet loss
E. Signal-to-noise ratio
F. Attenuation
A

B. Latency

D. Packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?
A. UDP port 22
B. TCP port 22
C. TCP port 25
D. UDP port 53
E. UDP port 69
A

E. UDP port 69
Trivial File Transfer Protocol (TFTP).
It is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.

A. UDP port 22
The IANA has assigned als UDP port 22 for SSH.
B. TCP port 22
SCP - Secure copy protocol. is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
Also SSH uses TCP port 22.
Also SFTP is a file transfer protocol built upon the SSH (Secure Shell). It uses also port 22.
C. TCP port 25
Simple Mail Transfer Protocol (SMTP), used for email routing between mail servers.
D. UDP port 53
DNS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customers requirements?

A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.

A

A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.

When bridge mode is enabled, it essentially turns the respective router into a switch. the best way to do this question is to do a logical topology with simple squares since we are pressed for time. so server,– router/switch,– modem connects to internet. Modem is buffer between internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?

A. The router has a time-based ACL, applied for the network segment.
B. A light source is creating EMI interference, affecting the UTP cabling.
C. Nightly backups are consuming excessive bandwidth.
D. The user has violated the AUP, and Internet access has been restricted.

A

D. The user has violated the AUP, and Internet access has been restricted.

With A B & C the whole network will be affected. Even though D seems wrong, it’s the only situation where only one system is affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to BEST meet this requirement?

A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
B. Install a BPDU guard on switchports and enable STP.
C. Create a DMZ for public servers and secure a segment for the internal network.
D. Install antivirus software and set an ACL on the servers.

A

A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?

A. iSCSI
B. Fibre Channel
C. NAS
D. InfiniBand

A

C. NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC- to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?

A. Replace SFP with a new one.
B. Fall back to the old switch.
C. Transpose the fiber pairs.
D. Replace multimode with single-mode cable.

A

C. Transpose the fiber pairs.

The TLDR definition of transpose means to flip. In this case change the pairs orientation going into the adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?

A. UTP
B. Multimode
C. Coaxial
D. Serial

A

C. Coaxial

DOCSIS modem uses coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?

A. PVC Cat 5
B. Plenum Cat 5e
C. Plenum Cat 6a
D. PVC Cat 7

A

C. Plenum Cat 6a

We need plenum cable because of fire safety requirements for an installation
Cat 6a supports data rates up to 10Gps.
Cat 5e supports data rates up to 1Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Which of the following physical security devices is used to detect unauthorized server room access?

A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance

A

D. Video surveillance

I think the point here is that both the Access badge and the smart card can be handed to someone to be used, and for the Biometrics access will not be granted if it isn’t an authorized person. so the option is left to the video surveillance which it record undeniable footage of the perpetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?

A. nmap
B. pathping
C. route
D. nslookup

A

A. nmap

Nmap (Network Mapper) is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection,vulnerability detection and other features.
Nmap can adapt to network conditions including latency and congestion during a scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?

A. Incident response policy
B. BYOD policy
C. DLP policy
D. Remote access policy

A

B. BYOD policy

Using a non company owned device for work is considered BYOD. It doesn’t really matter where the device is located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. A technician is allocating the IP address space needed for a new remote office. This office will contain the engineering staff with six employees and the digital marketing staff with 55 employees. The technician has decided to allocate the 192.168.1.0/24 block to the remote office. The engineering staff has been allocated the 192.168.1.64/29 subnet. Using the LEAST amount of space possible, which of the following would be the last usable IP address in the engineering subnet?

A. 192.168.1.62
B. 192.168.1.63
C. 192.168.1.70
D. 192.168.1.71

A

C. 192.168.1.70

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. An administrator is troubleshooting a users intermittent wireless connectivity issue. Other users across the hallway can connect and use the wireless network properly. Upon inspection of the connection details, the administrator finds the following:

Which of the following is MOST likely the cause of the poor wireless connection?

A. Channel overlap
B. Overcapacity
C. Incorrect antenna type
D. Latency

A

C. Incorrect antenna type

The signal strength is 5% which means the AP and/or WNIC has the wrong antenna type. A,B, & D do not account for poor signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. A VoIP system will require 23 concurrent voice channels and one signaling channel. Which of the following types of WAN service would provide the BEST connectivity to the PSTN?

A. PRI
B. BRI
C. E1/E3
D. DSL

A

A. PRI

PRI is the standard for providing telecommunication services to enterprises and offices. It is based on T-carrier (T1) transmission in the US, Canada, and Japan, while the E-carrier (E1) is common in Europe and Australia.
The T1 line consists of 23 bearer (B) channels and one data (D) channel for control purposes.
The E1 line consists of 30 B-channels and one D-channels.
The Primary Rate Interface channels are typically used by medium to large enterprises with digital private branch exchange (PBX) telephone systems to provide digital access to the public switched telephone network (PSTN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure?

A. Baseline report
B. Vulnerability report
C. Rollback plan
D. Business continuity plan

A

C. Rollback plan

If you have a failure you use a rollback plan, if you have a disaster you use a business continuity plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. A web application is unable to authenticate customers so they can access their bills. The server administrator has tested the LDAP query but is not receiving results. Which of the following is the NEXT step the server administrator should take to correct the problem?

A. Check port 636 to see if it is being blocked.
B. Change service port 636 to port 389.
C. Restart the web server.
D. Verify the browser is using port 443.

A

A. Check port 636 to see if it is being blocked.

Check port 636 to see if it is being blocked.
It is LDAP protocol over TLS/SSL.
It seems that LDAP query failed because port 636 is blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?

A. Wireless hub
B. Wireless firewall
C. Wireless access point
D. Wireless bridge

A

C. Wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. Which of the following devices are MOST often responsible for 802.1q tagging? (Choose two.)
A. Switch
B. Router
C. IDS
D. Hub
E. IPS
F. Network tap
A

A. Switch

B. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)
A. 802.11ac
B. 802.11b
C. 802.11g
D. 802.11n
E. Bluetooth
F. Z-Wave
A

A. 802.11ac
D. 802.11n

802.11ac and 802.11n are the most correct answers. Both standards are capable of operating at 5GHz. Even though 802.11n can also operate at 2.4GHz, because it can also use 5GHz, it qualifies.
802.11b, g, and Bluetooth use 2.4GHz to operate.
Z-Wave uses 908.42MHz to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer a critical application?

A. SaaS
B. IaaS
C. PaaS
D. CASB

A

C. PaaS

Platform as a service (PaaS) or application platform as a service (aPaaS) or platform-based service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app

SAAS = You control nothing… Vendor controls everything (Salesforce.com, Google apps, etc…)
PAAS = You control only the app… Vendor controls servers, storage, network, and OS (Azure, etc…)
IAAS = You control app & OS… Vendor controls servers, storage, and network (AWS, Rackspace, etc…)
On PREM = You control everything… Vendor controls nothing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. A content filter is set to analyze XML and JSON that users access from the Internet. At which of the following layers is this analysis taking place?
A. 1
B. 3
C. 5
D. 7
E. 6
A

E. 6

Presentation layer (6). Presentation layer involves decoding/translating data types like xml and JSON.

41
Q
  1. Ann, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, she can access the Internet. The network engineer has confirmed that Anns account has been set up the same as the others. There are no access lists restricting Anns access. Which of the following could be the issue for this lack of access?
A. Duplex/speed mismatch
B. VLAN mismatch
C. DNS server issue
D. DHCP server issue
E. Spanning tree blocked ports
A

B. VLAN mismatch

VLAN mismatch is caused by a switch configured incorrectly. Duplex/speed mismatch will cause collisions, slowing down the network.

42
Q
  1. A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport?

A. Perform a DNS lookup on the server.
B. Set up an SSH session to the desktop.
C. Reference the ARP table in the router.
D. Configure port security on the switch.

A

C. Reference the ARP table in the router.

Each switch has an ARP (Address Resolution Protocol) table to store the IP addresses and MAC addresses of the network devices. The ARP table is used to determine the destination MAC addresses of the network nodes, as well as the VLANs and ports from where the nodes are reached.

43
Q
  1. A router is set up to utilize RIPv2 to route traffic throughout the network. Which of the following routing metrics is used to determine the path?

A. Distance
B. Bandwidth
C. Speed
D. Hop count

A

D. Hop count

distance-vector routing does not mean actual distance, but rather the number of hops

44
Q
  1. A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public IP

A

B. Virtual IP

“A second router was installed on a network to be used as a backup for the primary router”
When you have two routers that are doing the same thing, you want to use a virtual IP that they would swap off on.

45
Q
  1. Which of the following can be done to implement network device hardening? (Choose two.)
A. Implement spanning tree
B. Perform VLAN hopping
C. Patch and update
D. Perform backups
E. Enable port mirroring
F. Change default admin password
A

C. Patch and update

F. Change default admin password

46
Q
  1. A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?

A. Change the default password
B. Use a firewall in front of the device.
C. Update the firmware.
D. Upgrade the configuration.

A

C. Update the firmware.

47
Q
  1. A technician has been alerted of incoming HTTP traffic on the LAN segment that should not contain any web servers. The technician has the IP address of the destination host and wants to determine if the socket for HTTP is open. Which of the following should the technician perform?

A. Baseline assessment
B. Packet analysis
C. Port scan
D. Patch-level assessment

A

C. Port scan

48
Q
  1. Which of the following creates a secure remote connection at the OSI network layer?

A. L2TP
B. SSL
C. DTLS
D. IPSec

A

D. IPSec

Transport Layer –> SSL
Network Layer –> IPSec
Data link layer –> PPTP, L2TP

49
Q
  1. A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?

A. The cables have an incorrect pin-out.
B. The cables are UTP instead of STP.
C. The cables are Cat 6 instead of Cat 5.
D. The cables are not plenum rated.

A

A. The cables have an incorrect pin-out.

cross over cable vs straight cable

50
Q
  1. A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks?

A. Install an IDS to monitor all traffic to and from the kiosks.
B. Install honeypots on the network to detect and analyze potential kiosk attacks before they occur.
C. Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks.
D. Create a new network segment with ACLs, limiting kiosks traffic with the internal network.

A

D. Create a new network segment with ACLs, limiting kiosks traffic with the internal network.

51
Q
  1. While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?

A. dig
B. iptables
C. ifconfig
D. traceroute

A

A. dig

Dig (Domain Information Groper) is a powerful command-line tool for querying DNS name servers.

The dig command, allows you to query information about various DNS records, including host addresses, mail exchanges, and name servers. It is the most commonly used tool among system administrators for troubleshooting DNS problems because of its flexibility and ease of use.

52
Q
  1. A network administrator has had difficulty keeping track of IP address assignments on networking devices and clients recently. Which of the following is the BEST technology to aid in this scenario?

A. DNS
B. DHCP
C. IPAM
D. NTP

A

C. IPAM

IPAM is just IP Address Management
IP address management (IPAM) tools are software products that integrate the management of
DHCP and DNS. It is used to plan, track, and manage the IP addresses. With the integration
of DNS ad DHCP each process is kept abreast of changes made to the other service. Many prod ucts offer additional functionality as well such as tracking of information such as IP addresses
in use, the devices an IP is assigned to at what time, as well as to which user an IP was assigned.

53
Q
  1. A technician is surveying a colleges network equipment rooms and connectivity. Which of the following types of documentation does the technician need to perform a detailed site survey? (Choose three.)
A. IDF/MDF documentation.
B. Cable run label documentation.
C. Network configuration documentation.
D. Performance baseline documentation.
E. Standard operating procedure documentation.
F. Change management documentation.
G. Rack diagram documentation.
A

A. IDF/MDF documentation.
C. Network configuration documentation.
G. Rack diagram documentation.

Based on the COMPTIA study book:
Given a scenario, use appropriate documentation
and diagrams to manage the network.
• Diagram symbols
• Standard operating procedures/work instructions
• Logical vs. physical diagrams
• Rack diagrams 16A
• Change management documentation 16A
• Wiring and port locations
• IDF/MDF documentation
• Labeling
• Network configuration and performance baselines
• Inventory management
54
Q
  1. A technician is connecting a PC to a switchport. At the wiring closet, the technician is unable to identify which cable goes from patch panel A connected to the switch to patch panel B connected to the PC. Which of the following tools should the technician use to resolve the issue?

A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR

A

C. Tone generator

The tone generator has 2 parts the fox and hound, one side connects to wire usually through alligator clips and the other side is a probe, you poke around multiple wires until 1 makes a sound letting you know that it’s the same wire. Extremely useful for when you are in an environment with a s*** ton of wires

55
Q
  1. A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?

A. EAP-PEAP
B. CCMP-AES
C. WPA2-PSK
D. TKIP-RC4

A

A. EAP-PEAP

EAP deals with both authentication and authorization
hough PSK would require a password. EAP-PEAP is related to RADIUS or the Remote Access Dial In User Service and would require not only a password but as well as a username.

56
Q
  1. Which of the following protocols are classified as connectionless? (Choose two.)
A. TFTP
B. FTP
C. HTTP
D. SNMP
E. SSH
F. IMAP
A

A. TFTP
D. SNMP

TFTP (Trivial File Transfer Protocol): TFTP is a a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP) and provides no security features. It has least amount of overhead, and as a result the fastest file transfer protocol.
SNMP uses UDP over IP. It Used to monitor and manage network devices

57
Q
  1. Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use.
    The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?

A. Plug in a second spare cable at each end to double the speed.
B. Replace the switches with ones that utilize port bonding and use the spare cables.
C. Replace the switches with 10Gb switches and utilize the existing cabling.
D. Plug in a second cable and set one port to TX and one port to RX.

A

B. Replace the switches with ones that utilize port bonding and use the spare cables.

CAT 5e cant support 10Gb Ethernet

58
Q
  1. A technician is downloading an ISO from a vendors website. To ensure the integrity of the download, which of the following should be verified?

A. File size
B. Vendor URL
C. File hashing
D. Encryption

A

C. File hashing

59
Q
  1. An administrator wants to implement an additional authentication factor to the remote SSH servers. Which of the following accomplishes this goal with the principle of something you have?

A. Certificate
B. Pattern
C. Password
D. Fingerprint

A

A. Certificate

Something you have - Smart card, certificate,
Something you are - Biometrics, fingerprint, retina scan
Something you know - Username and password

60
Q
  1. A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office. Of which of the following types of IoT technologies is this an example?

A. LAN
B. WAN
C. SAN
D. PAN

A

D. PAN

PAN (Personal Area Network) and is mainly used for connecting peripherals, like bluetooth.

61
Q
  1. Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?

A. Private IP
B. Static IP
C. APIPA
D. Loopback

A

C. APIPA

62
Q
  1. A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network. Which of the following should the administrator create?

A. Logical diagram
B. Physical diagram
C. Rack diagram
D. Configuration diagram

A

A. Logical diagram

A logical network diagram describes the way information flows through a network. Therefore, logical network diagrams typically show subnets (including VLAN IDs, masks, and addresses), network devices like routers and firewalls, and routing protocols.

63
Q
  1. Which of the following would indicate that a circuit speed should be increased?

A. Low latency
B. Low bandwidth consumption
C. High number of SIEM alerts
D. High packet drops

A

D. High packet drops

Low Latency and Low bandwidth consumption are actually GOOD for a network, Read the question guys LMFAO!!!!

64
Q
  1. A technician has installed an older IP camera as a temporary replacement for a recently failed newer one. The technician notices that when the cameras video stream is off, the ping roundtrip time between the camera and the network DVR is consistently less than 1ms without dropped packets. When the camera video stream is turned on, the ping roundtrip time increases dramatically, and network communication is slow and inconsistent. Which of the following is MOST likely the issue in this scenario?

A. VLAN mismatch
B. Duplex mismatch
C. Cat 6 RX/TX reversed
D. Damaged cable

A

B. Duplex mismatch

On an Ethernet connection, a duplex mismatch is a condition where two connected devices operate in different duplex modes, that is, one operates in half duplex while the other one operates in full duplex. The effect of a duplex mismatch is a link that operates inefficiently.

Camera streaming is off, half duplex is used for camera to DVR. Steaming is on = Full duplex

65
Q
  1. Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate. Which of the following wireless performance problem concepts defines this issue?

A. Interference
B. Distance limitation
C. Signal-to-noise ratio
D. Absorption

A

A. Interference

66
Q
  1. Which of the following BEST explains the purpose of signature management as a mitigation technique?

A. Hardening devices
B. Segmenting the network
C. Detecting malicious activity
D. Restricting user credentials

A

C. Detecting malicious activity

67
Q
  1. A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?

A. VLAN
B. DMZ
C. SNMP
D. NTP

A

B. DMZ

DMZ will separate the server from the network completely as an isolated point.

68
Q
  1. A Chief Information Officer (CIO) tasks the network engineer with protecting the network from outside attacks. Placing which of the following devices on the network perimeter would provide the MOST security for the system?

A. Firewall
B. NGFW
C. Content filter
D. IDS/IPS

A

B. NGFW

Next-generation firewall
A next-generation firewall is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection, an intrusion prevention system.

69
Q
  1. Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST thing the network technician should do?

A. Order equipment
B. Create network diagrams
C. Perform a site survey
D. Create an SSID.

A

C. Perform a site survey

70
Q
  1. A technician has deployed an additional DHCP server for redundancy. Clients in certain subnets are not receiving DHCP leases from the new DHCP server.
    Which of the following is the MOST likely cause?

A. The new DHCP servers IP address was not added to the routers IP helper list.
B. The new DHCP server is not receiving the requests from the clients.
C. The ARP cache of the new DHCP server needs to be updated.
D. The ARP table on the router needs to be cleared.

A

A. The new DHCP servers IP address was not added to the routers IP helper list.

71
Q
  1. Greater bandwidth and availability are required between two switches. Each switch has multiple 100Mb Ethernet ports available. Which of the following should a technician implement to help achieve these requirements?

A. Spanning tree
B. Clustering
C. Power management
D. Port aggregation

A

D. Port aggregation

Port aggregation lets you combine two Gigabit Ethernet ports on the Nighthawk router to improve the aggregated file transfer speed. If a device supports Ethernet aggregation like a NAS or managed network switch, you can use the Ethernet aggregate ports 1 and 2 to cable the device to your router.

72
Q
  1. A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?
A. 10.35.112.0/30
B. 10.35.112.0/24
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.255.0
A

C. 255.255.240.0

Now, I had to think about it for a moment, thinking that we only had to find the correct mask based on the subnet and IP addresses, then both 255.255.240.0 and 255.255.248.0 could be possible. I just did not bother to finish the actual question, the key aspect being: the MAXIMUM NUMBER OF HOSTS…
Answers A and B are IP addresses so we can get rid of them, not valid subnet masks.
Since the values 10 and 35 are the only ones repeated in both IP addresses we have to assume that the subnet mask will start with two full octet values: 255.255. That rules out answer E.
The number values for each bit of the third octet would run as follows:
128 192 224 240 248 252 254 255
1 1 1 1 1 1 1 1
a subnet mask of 255.255.248.0 leaves us with three bits for hosts (2046).
a subnet mask of 255.255.240.0 leaves us with 4 bits for possible host calculation (4094) and is the answer.

73
Q
  1. Ann, a customer, recently upgraded her SOHO Internet to gigabit fiber from cable. She was previously getting speeds around 75Mbps down and 25Mbps up. After the upgrade, Ann runs a speed test on her desktop and gets results of 1000Mbps down and 100Mbps up. A technician connects directly to the router and sees the correct 1000Mbps speeds. Which of the following is MOST likely the cause? (Choose two.)

A. All ports should be configured for full duplex.
B. There is a 10/100 switch on the network.
C. The connections are using Cat 5 cable.
D. The connections are using Cat 6 cable.
E. There is a transceiver mismatch at the fiber termination point.
F. Signal attenuation on the new fiber has reached the upper limits.

A

A. All ports should be configured for full duplex.

C. The connections are using Cat 5 cable.

74
Q
  1. A user reports intermittent performance issues on a segment of the network. According to the troubleshooting methodology, which of the following steps should the technician do NEXT after collecting initial information from the customer?

A. Document findings, actions, and outcomes.
B. Establish a theory of probable cause.
C. Establish a plan of action to resolve the problem.
D. Duplicate the problem, if possible.

A

D. Duplicate the problem, if possible.

Duplicating the problem is part of ‘Identifying the problem’ so you’re still on step one.

The six steps are:
Identify the problem.
Establish a theory of probable cause.
Test the theory to determine cause.
Establish a plan of action to resolve the problem and implement the solution.
Verify full system functionality and if applicable implement preventative measures.
Document findings, actions, and outcomes.

75
Q
  1. Which of the following protocols is associated with a three-way handshake?

A. UDP
B. ICMP
C. GRE
D. TCP

A

D. TCP

TCP’s 3-way handshake:
SYN
SYN/ACK
ACK

76
Q
  1. Which of the following would a company place at the edge of its network if it wants to view and control which Internet applications are being used?

A. VPN concentrator
B. NGFW
C. IDS/IPS
D. Proxy server

A

B. NGFW

Most/All the time they mention a network device that needs to be placed on the edge of the network it usually refers to a firewall, in this case it’s about Next Generation FireWall

77
Q
  1. A technician wants to physically connect two office buildingsג€™ networks. The office buildings are located 600ft (183m) apart. Which of the following cable types is the BEST choice?

A. Cat 5e
B. Cat 6a
C. Multimode
D. Coaxial

A

C. Multimode

Multimode and Singlemode is a kind of fiber. Multi has multiple lights/lasers being sent, while Single has 1 light/laser that is sent across the cable its benefit is the distance that it can go up to. Fiber while the distance is able to easily surpass copper, Singlemode fiber can go wayyyy longer distances than multimode.

78
Q
  1. A network engineer at a multinational company is asked to purchase mobile phones for senior executives who often travel internationally. The executives want their phones to work with wireless carriers in multiple countries when they travel. Which of the following cellular standards should these new phones support?

A. GSM
B. TDM
C. CDMA
D. PSTN

A

A. GSM

79
Q
  1. Which of the following should a network administrator use to configure Layer 3 routes? (Choose two.)
A. Multilayer switch
B. Firewall
C. Hub
D. Bridge
E. Modem
F. Media converter
A

A. Multilayer switch

B. Firewall

80
Q
  1. While logged into a financial application, a user gets errors when trying to write to the database. The network administrator is not familiar with the application and how it communicates with the database. Which of the following documentation types should the network administrator use to troubleshoot the data flow?

A. Logical diagram
B. Physical diagram
C. Network baseline
D. Change management log

A

A. Logical diagram

81
Q
  1. Joe, a network engineer, is attempting to install wireless in a large work area. He installs the access point in the middle of the work space. When testing, he notices a -60dB reading on one side of the room and a -92dB reading on the other side. Which of the following is MOST likely the issue?

A. External interference
B. Distance limitations
C. Channel overlap
D. Incorrect antenna type

A

D. Incorrect antenna type

The antenna type is clearly wrong as they are different readings in different directions meaning they are not omnidirectional :)

82
Q
  1. A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?

A. APIPA
B. MAC reservations
C. EUI-64
D. IPv4 to IPv6 tunnel

A

D. IPv4 to IPv6 tunnel

83
Q
  1. A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?

A. IPSec
B. IGRP
C. L2TP
D. PPTP

A

A. IPSec

84
Q
  1. A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following disaster recovery solutions is the appropriate choice?

A. Hot site
B. Business continuity
C. File backups
D. Virtual snapshot

A

B. Business continuity

Business continuity is the ongoing return to normalcy after an incident. A long term goal that takes place after an incident.

85
Q
  1. A network technician receives a new firmware update for a network device. The technician wants to ensure the file has not been tampered with. Which of the following techniques should the technician use to ensure the integrity of the file?

A. Cyclic redundancy check
B. System integrity check
C. Hash comparison
D. Root guard

A

C. Hash comparison

86
Q
  1. An AP is configured to authenticate clients by using their Active Directory username and password. The AP uses UDP to connect to the authentication service, which then queries Active Directory. Which of the following authentication services is being used by the AP in this scenario?

A. RADIUS
B. TACACS+
C. LDAP
D. Kerberos

A

A. RADIUS

RADIUS uses UDP while TACACS+ uses TCP.

Radius is a protocol that enables a single server to become responsible for all remote-access authentication, authorization, and auditing (or accounting) services. It is an authentication and accounting system used by many Internet Service Providers (ISPs). When you dial in to the ISP you must enter your username and password. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access to the ISP system. RADIUS implements a client/server architecture, where typical client is a router, switch, or AP and the typical server is a Windows or Unix device that is running RADIUS software.

87
Q
  1. Which of the following should be configured on the network to achieve performance for the FCoE storage traffic?

A. PoE
B. DHCP snooping
C. Jumbo frames
D. Virtual IP

A

C. Jumbo frames

88
Q
  1. A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?
A. 10.10.50.0/30
B. 172.16.20.0/30
C. 192.1.0.124/30
D. 192.168.0.192/24
E. 192.170.10.0/24
A

C. 192.1.0.124/30

Key is in the question “narrow scope” and “class C”. This eliminates all choices apart from ones that start with 192. Now that is the class C. For the narrow scope we want fewest available amount of ip addresses which is a /30.

We deduce the class of an IP address from the number in the first octet, see below
[0-127].x.x.x - Class A
[128-191].x.x.x - Class B
[192-223].x.x.x - Class C
This makes C the only correct answer from the above options

89
Q
  1. A network technician notices that most of the nodes in the 10.10.74.0/23 address space return either 1 or 2 node hop after running a tracert; however, some of the new servers are showing a hop count larger than 10. Which of the following is the MOST likely reason for this?

A. New servers are being provisioned in the cloud.
B. Those servers have host-based firewalls.
C. Some of the servers are configured to use different gateways.
D. Part of the subnet is configured to use different VLANs.

A

A. New servers are being provisioned in the cloud.

90
Q
  1. A technician has a remote site that often has congestion issues. When this happens, the remote router cannot be managed using SSH because the session drops. Which of the following is a possible solution to the issue?

A. Out-of-band management
B. HTTPS management URL
C. Client-to-site VPN
D. Router ACL

A

A. Out-of-band management

91
Q
  1. A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?

A. DHCP scope
B. DHCP lease
C. Default gateway
D. DNS zone

A

A. DHCP scope

92
Q

Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?

A. ATM
B. Frame relay
C. MPLS
D. PPP

A

C. MPLS

Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path “labels” rather than long network addresses, thus avoiding complex lookups in a routing table and speeding traffic flows.

93
Q
  1. A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?

A. CDMA
B. GSM
C. TDMA
D. CSMA

A

B. GSM

94
Q
  1. A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

A. Confirm the patches MD5 hash prior to the upgrade.
B. Schedule the switches to reboot after an appropriate amount of time.
C. Download each switches current configuration before the upgrade.
D. Utilize FTP rather than TFTP to upload the patch.

A

C. Download each switches current configuration before the upgrade.

95
Q
  1. A network technician is segmenting network traffic into various broadcast domains. Which of the following should the network technician utilize?

A. VLAN
B. STP
C. ACL
D. BPDU

A

A. VLAN

96
Q
  1. After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of 169.254.112.137. Which of the following is MOST likely causing the issue?

A. DHCP scope exhaustion
B. Improper DNS setting
C. Incorrect ACL setting
D. Port-security violation

A

A. DHCP scope exhaustion

97
Q
  1. A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?

A. TLS
B. Remote file access
C. Split tunnelling
D. HTTPS

A

C. Split tunnelling

VPN split tunneling lets you route some of your device or app traffic through the encrypted VPN tunnel while other devices or apps access the internet directly.

98
Q
  1. A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users devices to the company network. To complete this step, which of the following should be used to secure the remote network location?

A. Host-based firewalls
B. WPA2/WPA
C. Open access
D. Port filtering

A

B. WPA2/WPA

99
Q
  1. The length of an IPv6 address is:

A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits

A

C. 128 bits